WO2012144707A1 - 무선랜 기반 피어투피어 응용간 연결 방법, 무선랜 기반 피어투피어 응용간 연결성 유지 방법 및 무선랜 기반 피어 단말 - Google Patents
무선랜 기반 피어투피어 응용간 연결 방법, 무선랜 기반 피어투피어 응용간 연결성 유지 방법 및 무선랜 기반 피어 단말 Download PDFInfo
- Publication number
- WO2012144707A1 WO2012144707A1 PCT/KR2011/007997 KR2011007997W WO2012144707A1 WO 2012144707 A1 WO2012144707 A1 WO 2012144707A1 KR 2011007997 W KR2011007997 W KR 2011007997W WO 2012144707 A1 WO2012144707 A1 WO 2012144707A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- peer
- terminal
- reader
- leader
- pseudo
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 65
- 238000004891 communication Methods 0.000 claims description 37
- 238000012546 transfer Methods 0.000 claims description 11
- 230000004044 response Effects 0.000 claims description 9
- 230000000977 initiatory effect Effects 0.000 claims description 8
- 238000001514 detection method Methods 0.000 claims description 4
- 238000012423 maintenance Methods 0.000 claims 1
- 238000005259 measurement Methods 0.000 abstract description 5
- 230000008569 process Effects 0.000 description 10
- 238000005516 engineering process Methods 0.000 description 7
- 239000000284 extract Substances 0.000 description 6
- 230000004913 activation Effects 0.000 description 5
- 238000000605 extraction Methods 0.000 description 3
- 238000005192 partition Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000011156 evaluation Methods 0.000 description 2
- 230000014509 gene expression Effects 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 238000002360 preparation method Methods 0.000 description 2
- 230000003213 activating effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/14—Direct-mode setup
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W92/00—Interfaces specially adapted for wireless communication networks
- H04W92/16—Interfaces between hierarchically similar devices
- H04W92/18—Interfaces between hierarchically similar devices between terminal devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/16—Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/20—Services signaling; Auxiliary data signalling, i.e. transmitting data via a non-traffic channel
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/005—Discovery of network devices, e.g. terminals
Definitions
- the present invention relates to a peer-to-peer application connection, and more particularly, a WLAN-based peer-to-peer connection method and a WLAN-based peer for easily and securely discovering and connecting a peer terminal existing within a transmission area of a WLAN-based peer. It relates to a two-peer connectivity maintaining method and a WLAN-based peer terminal.
- Peer-to-peer refers to a technology for sharing digital resources together through direct exchange without a server between peer terminals.
- Peer-to-peer services may include messages, music sharing, file sharing, sharing of user created content (UCC), and multimedia streaming.
- WLAN-based peer-to-peer is such a peer-to-peer technology applied to a wireless terminal such as a mobile phone.
- on-demand data distribution technology is an essential element in ubiquitous environment.
- the existing WLAN-based peer-to-peer has a network connection step between the WLAN terminals in which an application is installed, a peer-to-peer application running step, mutual discovery and call establishment step between peer-to-peer peer terminals, and peer-to-peer application operations (file sharing and Messaging services, etc.).
- the complicated procedure before the peer-to-peer operation as described above has a problem that the convenience of connection between WLAN-based peer-to-peer applications is reduced.
- connection of WLAN-based peer-to-peer application in mobile environment should be frequently and not limited to time and place, it is less convenient for connection between WLAN-based peer-to-peer application due to the complicated procedure before the aforementioned peer-to-peer operation. The problem is worsened.
- UPnP Universal Plug & Play
- Bonjour protocols that support peer-to-peer discovery and connection have to go through a networking connection step, a peripheral device browsing step, a terminal selection step, and a connection step.
- UPnP Universal Plug & Play
- Bonjour protocols that support peer-to-peer discovery and connection have to go through a networking connection step, a peripheral device browsing step, a terminal selection step, and a connection step.
- the complexity of the connection between the peer-to-peer applications as described above is particularly deep in a situation where different peer-to-peer applications are concentrated, such as downtown, and there is a problem in that the connection between the user and the user is difficult to connect quickly.
- a peer terminal running a plurality of identical peer-to-peer applications has a peer (member terminal or supplicant) different from one subject peer (leader or registrar) terminal for secure connection. It has a topology that is connected to a terminal.
- WPS / WPA2 WiFi Positioning System / WiFi Protected Access2
- AP access point
- An object of the present invention for solving the above problems is to provide a connection method between WLAN-based peer-to-peer applications to quickly automate the connection between WLAN peer-to-peer applications.
- another object of the present invention is to provide a WLAN-based peer-to-peer connectivity maintaining method for maintaining a topology between previously connected WLAN peer-to-peer applications even in the absence of a reader terminal.
- another object of the present invention is to provide a WLAN-based peer terminal to quickly automate the connection between the WLAN peer-to-peer application, and to maintain the topology of the connected WLAN peer-to-peer application even in the absence of the reader terminal. To provide.
- the peer terminal extracts the application information from the peer-to-peer application, the peer terminal is extracted Generating service start information from application information, determining whether there is at least one other peer terminal corresponding to the service start information for a predetermined waiting time, and at least one corresponding to the service start information. If there is another peer terminal of the terminal having the highest reader pseudo-values based on the reader pseudo-values included in the service start information and the reader pseudo-values received from each of the at least one other peer terminal is set to the reader terminal And setting the other terminal as the member terminal.
- the application information may include at least one of a unique tag of the peer-to-peer application, an information protection ID, an application driving time point, an application driving place, and a terminal operation state value.
- the reader pseudo-value may be generated high when at least one of the CPU clock number of the peer terminal is high, the battery capacity is large, and the peer terminal is continuously supplied with power.
- the service start information may include at least one of a call setup channel, a service tag, and an information protection certificate in addition to the reader pseudo number.
- the determining whether the peer terminal exists for the at least one other peer terminal corresponding to the service start information for a predetermined time includes at least one of the call setup channel, a service tag, and an information protection certificate and the at least one.
- the peer terminal may be a peer terminal when the other peer terminal corresponding to the service start information does not exist. And setting the peer terminal as the leader terminal, determining whether the at least one other peer terminal corresponding to the service start information is connected, and when the at least one other peer terminal is connected.
- the terminal having the highest reader pseudo-value is set as the reader terminal based on the reader pseudo-value received from the at least one other peer terminal connected to the reader pseudo-value included in the service start information, and the other terminal is a member.
- the method may further include setting the terminal.
- a peer terminal having the highest leader pseudo-value as a leader when two or more terminals having the same leader pseudo-value exist, an arbitrary terminal is set as a leader terminal and other terminals are referred to as member terminals. Can be set.
- the reader terminal determines the leader transfer when the explicit termination of the reader is detected; Selecting a member terminal having the highest leader pseudo number based on the received reader pseudo number, after receiving the leader pseudo values from each of the plurality of terminals; And transmitting a leader acceptance request message to a member terminal having a leader acceptance message, and determining whether a reader acceptance message in response to the leader acceptance request message has been received, and the reader terminal having the highest reader pseudo-value when the reader acceptance message is received. Providing information used for the current connection to the member terminal.
- the detection of the explicit termination of the reader may be performed when the signal-to-interference noise ratio (SINR) of the reader terminal is lowered below a preset value, when the battery capacity of the reader terminal is lowered below a preset value, and the reader terminal. If at least one of the cases in which the peer-to-peer application is terminated may be detected as an explicit termination of the leader.
- the determining whether the leader acceptance message is received if the leader acceptance message is not received, selecting a member terminal having a next-order leader pseudo value, and accepting a leader to a member terminal having the next-order leader pseudo value.
- a WLAN-based peer-to-peer application including a reader terminal and a plurality of member terminals
- the member terminal determines whether a beacon signal is received from the reader terminal within a preset time, and when the member terminal does not receive the beacon signal within the preset time, the reader terminal Determining whether there is at least one other member terminal corresponding to the service start information of the member terminal for a predetermined waiting time and the at least one other member terminal corresponding to the service start information exists. If the reader doctors included in the service start information and the enemy Also on the basis of the reader doctor value received from each of one terminal of the other member comprises the step of setting the terminal having the highest value to the reader the reader doctor terminal.
- a WLAN-based peer terminal for achieving another object of the present invention, extracting the application information from the peer-to-peer application, and generates service start information from the extracted application information Then, it is determined through the communication unit whether there is at least one other peer terminal corresponding to the service start information for a predetermined waiting time, and if there is at least one other peer terminal corresponding to the service start information, the service A control unit for setting a peer terminal having the highest reader pseudo-value as a reader terminal based on the reader pseudo-value included in the start information and the reader pseudo-value received from the at least one other peer terminal, respectively, and the service start information from the controller.
- the pseudo pseudo value may be generated when the CPU clock number of the WLAN-based peer terminal is high, when at least one of a large amount of remaining battery power and a case where the peer terminal continues to receive power.
- the service start information may include at least one of a call setup channel, a service tag, and an information protection certificate in addition to the reader pseudo-value
- the control unit may include the call setup channel, service tag, and information protection certificate and the at least one.
- the controller sets the peer terminal as a leader terminal and then, at least one other peer corresponding to the service start information. It is determined whether the terminal is connected through the communication unit, and when the at least one other peer terminal is connected through the communication unit, respectively received from the at least one other peer terminal connected to the reader pseudo-value included in the service start information.
- a terminal having the highest leader pseudovalue can be set as a leader terminal based on one leader pseudovalue and another terminal can be set as a member terminal.
- the controller determines the leader transfer, and after receiving the reader pseudo-values from each of the plurality of member terminals, Selecting a member terminal having the highest reader pseudo-value based on the reader pseudo-value, sending a leader acceptance request message to the member terminal having the highest reader pseudo-value through the communication unit, and responding to the leader acceptance request message.
- the information used for the current connection may be provided to the member terminal having the highest reader pseudo number through the communication unit.
- the detection of the explicit termination of the reader may be performed when the signal-to-interference noise ratio (SINR) of the peer terminal is lowered below a preset value, when the battery capacity of the peer terminal is lowered below a preset value, and the peer terminal. If at least one of the cases in which the peer-to-peer application is terminated may be detected as an explicit termination of the leader.
- SINR signal-to-interference noise ratio
- the peer terminal performs the function of the member terminal, if the beacon signal is not received from the reader terminal within a preset time period, the controller terminates the connection with the reader terminal and the service for the predetermined waiting time.
- the reader pseudo-value included in the service start information and the at least one other The terminal having the highest reader pseudovalue based on the reader pseudovalues received from the member terminals may be set as the reader terminal.
- the peer terminal According to the connection method between WLAN-based peer-to-peer applications according to an embodiment of the present invention as described above, the peer terminal generates service initiation information using application information extracted from a peer-to-peer application and corresponds to the service initiation information. By automatically determining whether at least one other peer terminal exists within an operating channel or transmission radius, the WLAN peer-to-peer application can be quickly connected.
- FIG. 1 is a flowchart illustrating a connection method between WLAN-based peer-to-peer applications according to an embodiment of the present invention.
- FIG. 2 is a diagram illustrating extracting service start information through a hash function of a WLAN-based peer-to-peer application connection method according to an embodiment of the present invention.
- FIG. 3 is a flowchart illustrating a process of transferring a reader in case of explicit termination of a reader in a method of maintaining connectivity between WLAN-based peer-to-peer applications according to an embodiment of the present invention.
- FIG. 4 is a flowchart illustrating a re-election process of a leader in case of implicit termination of a reader in a method of maintaining connectivity between WLAN-based peer-to-peer applications according to an embodiment of the present invention.
- FIG. 5 is a flowchart illustrating an automatic connection process between peers executing the same application on WiFi-Direct according to an embodiment of the present invention.
- FIG. 6 is a flowchart illustrating a reader transfer process in case of explicit termination of a reader on WiFi-Direct according to an embodiment of the present invention.
- FIG. 7 is a flowchart illustrating a process of re-electing a leader in case of implicit termination of a reader on WiFi-Direct according to an embodiment of the present invention.
- FIG. 8 shows a configuration of a WLAN-based peer terminal according to an embodiment of the present invention.
- FIG. 9 shows a performance evaluation result of a connection method between WLAN-based peer-to-peer applications according to an embodiment of the present invention.
- first and second may be used to describe various components, but the components should not be limited by the terms. The terms are used only for the purpose of distinguishing one component from another.
- the first component may be referred to as the second component, and similarly, the second component may also be referred to as the first component.
- FIG. 1 is a flowchart illustrating a connection method between WLAN-based peer-to-peer applications according to an embodiment of the present invention
- FIG. 2 is a hash function of a WLAN-based peer-to-peer application connection method according to an embodiment of the present invention. Indicates that service start information is generated through.
- a peer terminal extracts application information from a peer to peer application (step 105).
- the extracted application information may include a unique tag of the peer-to-peer application, an information protection ID, an application driving time point, an application driving place, and a terminal operation state value.
- the unique tag of the peer-to-peer application may be composed of a unique ID of the application, an application specific content ID, and a terminal manufacturer ID. If a unique tag of the peer-to-peer application does not exist, a wildcard value is used. In addition, different applications have different unique IDs, but even in the same application, different application IDs have different unique IDs.
- any peer-to-peer application wants to interoperate regardless of the manufacturer ID of the terminal, it may be applied to the hash function by setting the manufacturer ID as an initial value.
- the information protection ID may consist of a personal identification number (PIN) or a user settable string. If the information protection ID does not exist, a wildcard value is used.
- PIN personal identification number
- a wildcard value is used.
- the information protection ID means, for example, a password in a file sharing application.
- the information protection ID only users with the same ID can be found.
- the same P2P applications can be easily and securely found and connected.
- the application start time may consist of a digitized code of weeks, days, hours or minutes of the current time. Wildcard value is used when the application start time is not set.
- the application driving time point is used to automatically select a peer to connect according to the application driving time point.
- the application driving place may use GPS coordinates (for example, using a digitized code such as Gangnam-gu, Seoul? 00100), and use relative coordinates when GPS is absent (for example, the highest signal strength among neighboring WLAN AP lists. Using an AP address).
- the device operating state values are measured by measurement information (eg CPU clock count, etc.) of the current device's computational performance, and the current device state (e.g., remaining battery capacity, power supply status, signal-to-interference noise ratio (SINR), etc.). Can be configured. If there is no instrument operation status value, the default value is used.
- measurement information eg CPU clock count, etc.
- the current device state e.g., remaining battery capacity, power supply status, signal-to-interference noise ratio (SINR), etc.
- the peer terminal generates service start information using the hash function for the application information extracted in step 105 (step 110).
- the generated service start information may include a service tag, a call setup channel, an information protection certificate, and a reader pseudo number.
- the service tag and the information protection certificate correspond to the service information and may be generated through a unique tag of a peer-to-peer application, an information protection ID, an application driving time, and an application driving location among application information inputted to the hash function.
- the call setup channel may be generated through the unique tag of the peer-to-peer application among the application information inputted to the hash function and the application driving time, and the reader pseudo-value is determined through the device operation state information among the application information inputted to the hash function. Can be generated.
- the reader pseudo-value is generated higher when the number of CPU clocks, the remaining battery capacity, and the power is continuously supplied.
- the peer terminal proposed for fast connection may limit the call setup channel of the terminal to prevent the terminal from hopping several call setup channels in the inter-application connection.
- the service tag and the information protection certificate are set differently even when the same application is executed.
- the peer terminal When the service start information is generated in step 110, the peer terminal independently determines a predetermined waiting time (backoff time) and starts the determined backoff time (step 115).
- the backoff time is a timer that produces a linear output with respect to the currently set reader pseudo value.
- the peer terminal starts the backoff time in step 115 and then determines whether there is at least one other peer terminal corresponding to the service start information of the peer terminal (step 120).
- the determination of whether there is at least one other peer terminal corresponding to the service start information includes at least one of the call setup channel, the service tag, and the information protection certificate and the call setup channel, the service tag, and the at least one other peer terminal.
- the information protection certificates is the same, it may be determined that at least one other peer terminal corresponding to the service start information exists.
- the peer terminal stops the backoff time when it is determined in step 120 that at least one other peer terminal corresponding to the service start information of the peer terminal exists (step 120).
- step 120 determines whether the backoff time has ended (step 130), and if the backoff time has ended, the peer terminal Set as the reader terminal and waits for connection of at least one other peer terminal (step 135).
- the peer terminal set as the leader determines whether at least one other peer terminal corresponding to the service start information is connected (step 140).
- the reader pseudo values are received and compared from at least one other peer terminal, respectively, and then the highest A peer terminal having a leader pseudovalue is set as a leader terminal (step 145), and other peer terminals are set as member terminals.
- a peer terminal having the highest leader pseudovalue is continuously reset by using the random number generation algorithm until the same reader pseudovalue does not occur.
- the extracted peer terminal is set as the reader terminal.
- the communication between the terminal is 802.11x (for example, 802.11a, 802.11b, 802.11g, 802.11n, 802.11ac, etc.), Bluetooth, Zigbee (Uigma), Ultra Wide Band (UWB: Ultra Wide Band), short-range wireless Communication may be performed using various wireless communication technologies such as Near Field Communication (NFC) and Binary Division Multiple Access (B-CDMA).
- 802.11x for example, 802.11a, 802.11b, 802.11g, 802.11n, 802.11ac, etc.
- Bluetooth Zigbee
- Uigma Ultra Wide Band
- UWB Ultra Wide Band
- short-range wireless Communication may be performed using various wireless communication technologies such as Near Field Communication (NFC) and Binary Division Multiple Access (B-CDMA).
- NFC Near Field Communication
- B-CDMA Binary Division Multiple Access
- FIG. 3 is a flowchart illustrating a process of relocating a reader terminal in case of explicit termination of a reader terminal in a method for maintaining connectivity between WLAN-based peer-to-peer applications according to an embodiment of the present invention.
- the reader terminal monitors operation status information of the reader terminal (step 310).
- the operation state information may include, for example, signal-to-interference noise ratio (SINR), battery capacity, peer-to-peer application operation information, and the like.
- SINR signal-to-interference noise ratio
- battery capacity battery capacity
- peer-to-peer application operation information peer-to-peer application operation information
- the reader terminal determines whether an explicit termination of the reader terminal is detected while monitoring the operation status information of the reader terminal in step 310 (step 320).
- the explicit termination of the reader terminal when the explicit termination of the reader terminal is detected, for example, when the distance from the member terminals is far away and the signal-to-interference noise ratio (SINR) of the reader terminal is lowered below a preset value, the battery capacity of the reader terminal is previously set. If the value is lower than the set value, the peer-to-peer application of the reader terminal may be terminated.
- SINR signal-to-interference noise ratio
- step 320 when the leader terminal detects an explicit termination of the leader terminal, the leader terminal determines the leader transfer and receives leader pseudo values from each of the plurality of member terminals, and then, based on the received reader pseudo values, the highest reader pseudo value.
- a member terminal having a terminal is selected (step 330).
- the reader pseudo-value is generated higher when the number of CPU clocks, the remaining battery capacity, and the power is continuously supplied.
- the leader terminal transmits a leader acceptance request message to the selected member terminal (step 340), and receives a leader acceptance message in response to the leader acceptance request message. Determine (step 350).
- the leader terminal selects the member terminal having the next highest reader pseudo number (step 360), and performs steps 340 and 350 again.
- the reader terminal When the reader acceptance message in response to the reader acceptance request message is received in step 350, the reader terminal provides the member terminal which transmitted the reader acceptance message with the security key and network setting information used for the current connection (step 370).
- the reader terminal transmits a disconnection message to all member terminals and terminates the connection (step 380).
- the terminal-to-device communication is 802.11x (for example, 802.11a, 802.11b, 802.11g, 802.11n, 802.11ac, etc.), Bluetooth, Zigbee (UgB), Ultra Wide Band (UWB), Near Field Wireless Communication may be performed using various wireless communication technologies such as Near Field Communication (NFC) and Binary Division Multiple Access (B-CDMA).
- 802.11x for example, 802.11a, 802.11b, 802.11g, 802.11n, 802.11ac, etc.
- Bluetooth Zigbee
- UgB Ultra Wide Band
- UWB Ultra Wide Band
- NFC Near Field Communication
- B-CDMA Binary Division Multiple Access
- the topology between the WLAN peer-to-peer applications already connected through the transfer of the reader may be maintained.
- the peer-to-peer connection is already connected. This breaking problem can be solved.
- FIG. 4 is a flowchart illustrating a process of reselecting a leader in case of implicit termination of a reader terminal in a WLAN-based peer-to-peer connectivity maintaining method according to an embodiment of the present invention.
- the member terminal when connected to a reader terminal, the member terminal starts a local timer (step 405) and determines whether a beacon signal is received from the reader terminal (step 410).
- starting the local timer is for determining whether the end of the reader terminal is implicit (eg, network partition due to sudden power shutdown of the reader terminal or movement of the position of the reader terminal).
- the beacon signal refers to a signal that the reader terminal broadcasts periodically to inform its presence.
- the member terminal If the beacon signal is received from the reader terminal in step 410, the member terminal resets the local timer (step 415), and performs steps 405 and 410 again.
- step 410 If the beacon signal is not received from the reader terminal in step 410, it is determined whether the local timer has expired (step 420). If the beacon signal is not received from the reader terminal by the end of the local timer, the member terminal terminates the connection with the reader terminal. (Step 425), the backoff time is started (step 430).
- the backoff time is a time for outputting a linear output with respect to the currently set reader pseudo value.
- the member terminal determines whether at least one other member terminal corresponding to the service start information of the member terminal exists (step 435).
- the determination of whether there is at least one other member terminal corresponding to the service start information includes at least one of the call setup channel, the service tag, and the information protection certificate, the call setup channel, the service tag, and the at least one other member terminal.
- the information protection certificates is the same, it may be determined that at least one other member terminal corresponding to the service start information exists.
- step 435 If it is determined in step 435 that at least one other member terminal corresponding to the service start information of the member terminal exists, the member terminal stops the backoff time (step 440).
- the member terminal determines whether the backoff time has ended (step 445), and the backoff time has ended. If the member terminal is set as a leader and waits for access of at least one other member terminal (step 450).
- the member terminal set as the leader terminal determines whether at least one other member terminal corresponding to the service start information is connected (step 455).
- At least one other member terminal or at least one other peer terminal when at least one other member terminal corresponding to the service start information of the member terminal exists or at least one other peer terminal is connected through step 435 or 455.
- the terminal having the highest reader pseudovalue is set as the leader terminal (step 460), and other terminals are set as member terminals.
- the reader pseudo-value is generated higher when the number of CPU clocks, the remaining battery capacity, and the power is continuously supplied.
- the terminal having the highest leader pseudo-value is extracted by continuously resetting the leader pseudo-value until the same leader pseudo-value does not occur using a random number generation algorithm.
- a messaging service music sharing, file sharing, sharing of User Created Content (UCC), multimedia streaming, etc. are performed between the set reader terminal and the member terminal.
- applications having different service information are limited to access even if they exist in the same channel.
- the terminal-to-device communication is 802.11x (for example, 802.11a, 802.11b, 802.11g, 802.11n, 802.11ac, etc.), Bluetooth, Zigbee (UgB), Ultra Wide Band (UWB), Near Field Wireless Communication may be performed using various wireless communication technologies such as Near Field Communication (NFC) and Binary Division Multiple Access (B-CDMA).
- 802.11x for example, 802.11a, 802.11b, 802.11g, 802.11n, 802.11ac, etc.
- Bluetooth Zigbee
- UgB Ultra Wide Band
- UWB Ultra Wide Band
- NFC Near Field Communication
- B-CDMA Binary Division Multiple Access
- the reader terminal when the reader terminal is implicitly terminated, the topology between the WLAN peer-to-peer applications already connected through the re-election of the reader may be maintained, and when the reader terminal is conventionally excluded from the topology, the peer-to-peer connection is already connected. This breaking problem can be solved.
- FIG. 5 is a flowchart illustrating an automatic connection process between peers executing the same application on WiFi-Direct according to an embodiment of the present invention.
- WiFi-Direct terminal 1 (hereinafter, abbreviated to terminal 1) and WiFi-Direct terminal 3 (hereinafter, abbreviated to terminal 3) is a peer-to-peer application-1 is driven
- WiFi-Direct terminal 2 (hereinafter, abbreviated to terminal 2) is running peer-to-peer application-2.
- each terminal extracts the application information from the application that is driven first, and applies the hash function to the extracted application information to generate service start information (call setup channel, service tag, information protection certificate, reader pseudo-value).
- service start information call setup channel, service tag, information protection certificate, reader pseudo-value.
- the reader pseudo-value is generated higher when the number of CPU clocks, the remaining battery capacity, and the power is continuously supplied.
- Terminal 1 succeeds in discovering terminal 2 present in the same call setup channel as terminal 1 (510).
- the service information of the terminal 1 that is, the service tag is # 1
- the information protection certificate is AAA
- the service tag of the terminal 2 is # 2
- the information protection certificate is BA
- the terminal 1 succeeds in discovering the terminal 3 existing in the same call setup channel as the terminal 1 (540).
- terminal 1 and terminal 3 have the same service tag # 1 and information protection certificate as AAA, automatic connection is successful (550).
- the terminal 1 After successful completion of the automatic connection, the terminal 1 receives and compares the reader pseudo-values from the terminal 3, and sets the terminal 3 having the high reader pseudo-value as the leader terminal and the terminal 1 having the low reader pseudo-value as the member terminal (560).
- the peer terminal having the highest leader pseudo-value is extracted by continuously resetting the reader pseudo-values until the same leader pseudo-value does not occur using a random number generation algorithm. And set the extracted peer as the reader terminal.
- the terminal 1 and the terminal 3 perform a messaging service, music sharing, file sharing, sharing of User Created Content (UCC), multimedia streaming, and the like (570).
- a messaging service music sharing, file sharing, sharing of User Created Content (UCC), multimedia streaming, and the like (570).
- UCC User Created Content
- FIG. 6 is a flowchart illustrating a reader transfer process in case of explicit termination of a reader on WiFi-Direct according to an embodiment of the present invention.
- the call setup channels of the terminal 1, the terminal 2, and the terminal 3 are ⁇ 1 ⁇ , the service tag is # 1, and the information protection certificate is AAA.
- each terminal extracts application information from the driven application, and applies the hash function to the extracted application information to generate service start information (call setup channel, service tag, information protection certificate, reader pseudo-value).
- service start information call setup channel, service tag, information protection certificate, reader pseudo-value.
- the reader pseudo value is mapped higher when the number of CPU clocks is higher and the capacity of the remaining battery is larger, when power is continuously supplied.
- Terminal 1 succeeds in discovering terminal 2 present in the same call setup channel as terminal 1 (605).
- the automatic connection is successful (610). After receiving and comparing the reader pseudo values from each other terminal, the terminal 2 having a high reader pseudo value is compared.
- the leader terminal and the terminal 1 are set as member terminals (615).
- the terminal 1 and the terminal 2 performs a messaging service, music sharing, file sharing, sharing of User Created Content (UCC), multimedia streaming, and the like (620).
- a messaging service music sharing, file sharing, sharing of User Created Content (UCC), multimedia streaming, and the like (620).
- UCC User Created Content
- the terminal 2 succeeds in discovering the terminal 3 existing in the same call setup channel as the reader terminal (625), and succeeds in automatic connection since the service information is the same (630). Thereafter, the terminal 3 becomes a member terminal and performs messaging service, music sharing, file sharing, UCC sharing, multimedia streaming, etc. with the terminal 1 and / or the terminal 2 (635).
- the terminal 2 When the terminal 2 detects the termination of the application-1 of the reader terminal while performing the role of the reader terminal (640), the security key, network setting information, member list, etc. used for the current connection to the terminal 3 having a high reader pseudo number is displayed. Provide a leader transfer (645).
- the explicit termination of the reader terminal is determined when the distance between the reader terminal and the member terminals is far apart from when the application of the reader terminal is terminated so that the signal-to-interference noise ratio (SINR) of the reader terminal is lower than a preset value.
- SINR signal-to-interference noise ratio
- the terminal 2 transmits a connection cancellation message to the terminal 1 and the terminal 3, and terminates the connection with the terminal 1 and the terminal 3 (650).
- the newly elected terminal 3 as the leader terminal sets its own terminal as the reader terminal and invites terminal 1 (655), resets the WiFi connection, and then performs file sharing (660).
- the topology between WLAN peer-to-peer applications that are already connected may be maintained by transferring the reader to UE 3, so that if the reader terminal is previously excluded from the topology, This can solve the problem of disconnected peer-to-peer connection.
- FIG. 7 is a flowchart illustrating a process of re-electing a leader in case of implicit termination of a reader on WiFi-Direct according to an embodiment of the present invention.
- the call setup channels of the terminal 1, the terminal 2, and the terminal 3 are ⁇ 1 ⁇ , the service tag is # 1, and the information protection certificate is AAA.
- each terminal extracts application information from the driven application, and applies the hash function to the extracted application information to generate service start information (call setup channel, service tag, information protection certificate, reader pseudo-value).
- service start information call setup channel, service tag, information protection certificate, reader pseudo-value.
- the reader pseudo value is mapped higher when the number of CPU clocks is higher and the capacity of the remaining battery is larger, when power is continuously supplied.
- Terminal 2 succeeds in the automatic connection with the terminal 1 and terminal 3
- terminal 2 is a reader terminal
- terminal 1 and terminal 3 is a member terminal to perform the messaging service, music sharing, file sharing, UCC sharing, multimedia streaming, etc.
- Up to now described in Figure 6 will be omitted.
- the local timer starts and determines whether a beacon signal is received from the terminal 2.
- the terminal 1 and the terminal 3 drives the local timer to determine whether the terminal 2 is implicitly terminated (eg, a network partition due to sudden power termination of the terminal 2 or a positional movement of the reader terminal).
- the terminal 1 and the terminal 3 terminate the connection connected to the terminal 2 and start the backoff time (710).
- the terminal 1 and the terminal 3 discover the terminal of the other party in the same call setup channel (720), and the automatic connection is successful because the service information is the same (730).
- the terminal 1 having the high reader pseudo-value is set to the terminal 3 having the low reader pseudo-reader value as the member terminal (740).
- the terminal 1 and the terminal 3 perform a messaging service, music sharing, file sharing, UCC sharing, multimedia streaming, and the like (750).
- the reader terminal when the reader terminal is implicitly terminated, the topology between the WLAN peer-to-peer applications already connected through the re-election of the reader may be maintained, and when the reader terminal is conventionally excluded from the topology, the peer-to-peer connection is already connected. This breaking problem can be solved.
- FIG. 8 shows a configuration of a WLAN-based peer terminal according to an embodiment of the present invention.
- a WLAN-based peer terminal may include a control unit 810 and a communication unit 820.
- the controller 810 may include an application information extraction module 811, a service start information generation module 813, and a driving module 815.
- the application information extraction module 811 extracts application information from a peer-to-peer application.
- the extracted application information may include a unique tag of the peer-to-peer application, an information protection ID, an application driving time point, an application driving place, and a terminal operation state value.
- the unique tag of the peer-to-peer application may include a unique ID of the application, an application specific content ID, and a terminal manufacturer ID. If a unique tag of the peer-to-peer application does not exist, a wildcard value is used. In addition, different applications have different unique IDs, but even in the same application, different application IDs have different unique IDs.
- the peer ID can be interlocked by applying the manufacturer ID to the hash function by setting an initial value.
- the information protection ID may consist of a PIN number or a user settable character string. If the information protection ID does not exist, a wildcard value is used.
- the information protection ID means a secret room number in a file sharing application, for example.
- the information protection ID only users with the same ID can be found.
- the same P2P applications can be easily and securely found and connected.
- the application start time may consist of a digitized code of weeks, days, hours or minutes of the current time. Wildcard value is used when the application start time is not set.
- the application driving time point is used to automatically select a peer to connect according to the application driving time point.
- the application driving place may use GPS coordinates (for example, using a digitized code such as Gangnam-gu, Seoul-> 00100), and use relative coordinates when GPS is absent (for example, the highest signal among neighboring WLAN AP lists. AP address having strength).
- the device operating state values are measured by measurement information (eg CPU clock count, etc.) of the current device's computational performance, and the current device state (e.g., remaining battery capacity, power supply status, signal-to-interference noise ratio (SINR), etc.). Can be configured. If there is no instrument operation status value, the default value is used.
- measurement information eg CPU clock count, etc.
- the current device state e.g., remaining battery capacity, power supply status, signal-to-interference noise ratio (SINR), etc.
- the service information generation module 813 generates a service start information by applying a hash function (HASH FUNCTION) to the application information extracted by the application information extraction module 811.
- HASH FUNCTION a hash function
- the generated service start information may include a service tag, a call setup channel, an information protection certificate, and a reader pseudo number.
- the service tag and the information protection certificate may be generated through a unique tag of a peer-to-peer application, an information protection ID, an application driving time, and an application driving location among application information inputted to the hash function.
- the call setup channel may be generated through the unique tag of the peer-to-peer application among the application information inputted to the hash function and the application driving time, and the reader pseudo-value is determined through the device operation state information among the application information inputted to the hash function. Can be generated.
- the reader pseudo value is mapped higher when the number of CPU clocks is higher and the capacity of the remaining battery is larger, when power is continuously supplied.
- the peer terminal proposed for fast connection may limit the call setup channel of the terminal to prevent the terminal from hopping several call setup channels when connecting between applications.
- the service tag and the information protection certificate are set differently even when the same application is executed.
- the driving module 815 independently determines the backoff time and starts the determined backoff time.
- the backoff time may output a linear output with respect to the currently set reader pseudo value.
- the driving module 815 determines whether there is at least one other peer terminal corresponding to the service start information of the peer terminal through the communication unit 820 after starting the backoff time.
- the determination of whether there is at least one other peer terminal corresponding to the service start information includes at least one of the call setup channel, the service tag, and the information protection certificate and the call setup channel, the service tag, and the at least one other peer terminal.
- the information protection certificates is the same, it may be determined that at least one other peer terminal corresponding to the service start information exists.
- the driving module 815 stops the backoff time when it is determined through the communication unit 820 that at least one other peer terminal corresponding to the service start information of the peer terminal exists.
- the driving module 810 determines whether the backoff time has ended, and if the backoff time has ended, the driving module 810. Set as a reader terminal and wait for connection of at least one other peer terminal.
- the driving module 815 receives and compares the leader pseudovalues from at least one other peer terminal and then compares the peer with the highest reader pseudovalue.
- the terminal is set as a reader terminal, other peer terminals are set as member terminals, and other peer terminals are set as member terminals.
- the driving module 815 continuously resets the reader pseudovalue until the same reader pseudovalue does not occur using a random number generation algorithm and thus the highest reader.
- a peer terminal having a pseudo value is extracted and the extracted peer is set as a reader terminal.
- the driving module 815 monitors operation status information of the reader terminal.
- the operation state information may include, for example, signal-to-interference noise ratio (SINR), battery capacity, peer-to-peer application operation information, and the like.
- SINR signal-to-interference noise ratio
- the driving module 815 determines whether an explicit termination of the reader terminal is detected while monitoring the operation status information of the reader terminal.
- the explicit termination of the reader terminal for example, when the distance from the plurality of member terminals is reduced and the signal-to-interference noise ratio (SINR) of the reader terminal is lowered below a preset value, the battery capacity of the reader terminal is preset. If the value is lower than the set value, the peer-to-peer application of the reader terminal may be terminated.
- SINR signal-to-interference noise ratio
- the driving module 815 determines leader transfer and receives leader pseudo values from each of the plurality of member terminals, and then, based on the received leader pseudo values, the driving module 815 determines the leader leader value.
- the branch selects a member terminal.
- the driving module 815 transmits a reader acceptance request message to the selected member terminal through the communication unit 820, and determines whether a reader acceptance message in response to the reader acceptance request message has been received through the communication unit 820.
- the driving module 815 selects the member terminal having the next highest reader pseudo-value, transmits the leader acceptance request message to the selected member terminal, and responds to the leader acceptance request message. It is determined whether is received through the communication unit 820.
- the driving module 815 When an acceptance message is received in response to the reader acceptance request message, the driving module 815 provides the member terminal which transmitted the reader acceptance message with the security key and network setting information used for the current connection.
- the driving module 815 transmits a disconnection message to all member terminals through the communication unit 820 and terminates the connection.
- the topology between the WLAN peer-to-peer applications already connected through the transfer of the reader may be maintained.
- the peer-to-peer connection is already connected. This breaking problem can be solved.
- the driving module 815 starts a local timer and determines whether a beacon signal is received from the reader terminal.
- the member terminal drives the local timer to determine whether the reader terminal is implicitly terminated (eg, a network partition due to sudden power shutdown of the reader terminal or a positional movement of the reader terminal).
- the beacon signal refers to a signal that the reader terminal broadcasts periodically to inform its presence.
- the driving module 815 resets the local timer and determines whether the local timer starts and the beacon signal is received again.
- the driving module 815 terminates the connection with the reader terminal and starts the backoff time.
- the backoff time is a timer that produces a linear output with respect to the currently set reader pseudo value.
- the driving module 815 determines whether there is at least one other peer terminal corresponding to the service start information after starting the backoff time.
- the determination of whether there is at least one other member terminal corresponding to the service start information includes at least one of the call setup channel, the service tag, and the information protection certificate, the call setup channel, the service tag, and the at least one other member terminal.
- the information protection certificates is the same, it may be determined that at least one other member terminal corresponding to the service start information exists.
- the driving module 815 stops the backoff time when it is determined that at least one other member terminal corresponding to the service start information exists.
- the driving module 815 sets the member terminal as a leader and determines whether at least one other member terminal is connected. do.
- the driving module 815 obtains a reader pseudo-value from at least one member terminal or at least one other peer terminal. After receiving and comparing with each other, the terminal which has the highest reader pseudovalue is set as a reader terminal, and the other terminal is set as a member terminal.
- the terminal having the highest leader pseudo-value is extracted by continuously resetting the leader pseudo-value until the same leader pseudo-value does not occur using a random number generation algorithm. Set the extracted terminal as a reader terminal.
- the reader terminal and the member terminal configured here perform messaging service, music sharing, file sharing, UCC (User Created Content) sharing, multimedia streaming, and the like.
- applications having different service information are limited to access even if they exist in the same channel.
- the reader terminal when the reader terminal is implicitly terminated, the topology between the WLAN peer-to-peer applications already connected through the re-election of the reader may be maintained, and when the reader terminal is conventionally excluded from the topology, the peer-to-peer connection is already connected. This breaking problem can be solved.
- the peer-to-peer communication is 802.11x (for example, 802.11a, 802.11b, 802.11g, 802.11n, 802.11ac, etc.), Bluetooth, Zigbee (UWB), Ultra Wide Band (UWB), Near Field It may be performed using various wireless communication technologies such as Near Field Communication (NFC) and Binary Division Multiple Access (B-CDMA).
- 802.11x for example, 802.11a, 802.11b, 802.11g, 802.11n, 802.11ac, etc.
- Bluetooth Zigbee
- UWB Ultra Wide Band
- UWB Ultra Wide Band
- NFC Near Field Communication
- B-CDMA Binary Division Multiple Access
- FIG. 9 shows a performance evaluation result of a connection method between WLAN-based peer-to-peer applications according to an embodiment of the present invention.
- FIG. 9 illustrates a case where a WLAN-based peer-to-peer application according to the prior art (WiFi-Direct) is connected 1: 1 and a WLAN-based peer-to-peer application according to an embodiment of the present invention. If 1: 1 is connected, this indicates the average time from the WLAN device activation until the data sharing preparation time.
- WiFi-Direct WiFi-Direct
- the WLAN-based peer-to-peer application according to the prior art is connected 1: 1, it can be confirmed that the average time required to prepare for data sharing after activation of the WLAN device is 9.3 seconds (sec).
- the average time required does not include user intervention time.
- the average time required to prepare for data sharing after activating the WLAN device is 6.1 seconds (sec), which is less than that in the prior art. You can see that it takes time.
- FIG. (b) shows a case where a WLAN-based peer-to-peer application according to the prior art (WiFi-Direct) is connected to a plurality of peer-to-peer applications and a plurality of WLAN-based peer-to-peer applications according to an embodiment of the present invention.
- WiFi-Direct a WLAN-based peer-to-peer application according to the prior art
- this indicates the average time from the WLAN device activation until the data sharing preparation time.
- the average time required to prepare for data sharing after activation of the WLAN device may be 25 seconds (sec). .
- the average time required does not include user intervention time.
- the average time required to prepare data sharing after activation of the WLAN device is 8.7 seconds (sec). It can be seen that it takes less time than.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
Description
Claims (18)
- 복수의 피어 단말을 포함하는 무선랜 기반 피어투피어 연결 방법에 있어서,피어 단말이 피어투피어 응용으로부터 응용 정보를 추출하는 단계;상기 피어 단말이 추출된 상기 응용 정보로부터 서비스 개시정보를 생성하는 단계;상기 피어 단말이 미리 결정된 대기 시간 동안 상기 서비스 개시정보에 상응하는 적어도 하나의 다른 피어 단말이 존재하는지 판단하는 단계; 및상기 서비스 개시정보에 상응하는 적어도 하나의 다른 피어 단말이 존재하는 경우 상기 서비스 개시정보에 포함된 리더 의사수치와 상기 적어도 하나의 다른 피어 단말로부터 각각 수신한 리더 의사수치에 기초하여 가장 높은 리더 의사수치를 가지는 단말을 리더 단말로 설정하고 그 이외의 단말을 멤버 단말로 설정하는 단계를 포함하는 무선랜 기반 피어투피어 연결 방법.
- 제 1항에 있어서, 상기 응용 정보는,피어투피어 응용의 고유 태그, 정보 보호 ID, 응용구동 시점, 응용구동 장소 및 단말 동작 상태 수치 중 적어도 하나를 포함하는 것을 특징으로 하는 무선랜 기반 피어투피어 응용간 연결 방법.
- 제 1항에 있어서, 상기 리더 의사수치는,상기 피어 단말의 CPU 클럭수가 높은 경우, 잔류 배터리 양이 많은 경우 및 상기 피어 단말이 전력을 계속 공급받는 경우 중 적어도 하나에 해당하는 경우 높게 생성되는 것을 특징으로 하는 무선랜 기반 피어투피어 응용간 연결 방법.
- 제 1항에 있어서, 상기 서비스 개시정보는,상기 리더 의사수치 이외에도 호설정 채널, 서비스 태그 및 정보보호 증명서 중 적어도 하나를 포함하는 것을 특징으로 하는 무선랜 기반 피어투피어 응용간 연결 방법.
- 제 4항에 있어서, 상기 피어 단말이 미리 결정된 시간 동안 상기 서비스 개시정보에 상응하는 상기 적어도 하나의 다른 피어 단말이 존재하는지 판단하는 단계는,상기 호설정 채널, 서비스 태그 및 정보보호 증명서 중 적어도 하나와 상기 적어도 하나의 다른 피어 단말의 호설정 채널, 서비스 태그 및 정보보호 증명서 중 적어도 하나가 동일한 경우 상기 서비스 개시정보에 상응하는 상기 적어도 하나의 다른 피어 단말이 존재하는 것으로 판단하는 것을 특징으로 하는 무선랜 기반 피어투피어 응용간 연결 방법.
- 제 1항에 있어서, 상기 피어 단말이 미리 결정된 시간 동안 상기 서비스 개시정보에 상응하는 다른 피어 단말이 존재하는지 판단하는 단계는,상기 서비스 개시정보에 상응하는 상기 다른 피어 단말이 존재하지 않는 경우 상기 피어 단말을 리더 단말로 설정하는 단계;상기 피어 단말을 리더 단말로 설정한 후, 상기 서비스 개시정보에 상응하는 상기 적어도 하나의 다른 피어 단말의 접속 여부를 판단하는 단계; 및상기 적어도 하나의 다른 피어 단말이 접속한 경우 상기 서비스 개시정보에 포함된 리더 의사수치와 접속한 상기 적어도 하나의 다른 피어 단말로부터 각각 수신한 리더 의사수치에 기초하여 가장 높은 리더 의사수치를 가지는 단말을 리더 단말로 설정하고 그 이외의 단말을 멤버 단말로 설정하는 단계를 더 포함하는 것을 특징으로 하는 무선랜 기반 피어투피어 연결 방법.
- 제 1항에 있어서, 상기 가장 높은 리더 의사수치를 가지는 피어 단말을 리더로 선정하는 단계는,상기 리더 의사수치가 동일한 단말이 2 이상 존재하는 경우 임의의 단말을 리더 단말로 설정하고 그 이외의 단말을 멤버 단말로 설정하는 것을 특징으로 하는 무선랜 기반 피어투피어 연결 방법.
- 리더 단말과 복수의 멤버 단말을 포함하는 무선랜 기반 피어투피어 응용간 연결성 유지 방법에 있어서,상기 리더 단말은 리더의 명시적 종료가 감지된 경우 리더 이전을 결정하고, 상기 복수의 단말로부터 각각 리더 의사수치를 수신한 후, 수신한 상기 리더 의사수치에 기초하여 가장 높은 리더 의사수치를 가지는 멤버 단말을 선정하는 단계;상기 리더 단말은 상기 가장 높은 리더 의사수치를 가지는 멤버 단말로 리더 수락 요청 메시지를 전송하고 상기 리더 수락 요청 메시지에 응답하는 리더 수락 메시지가 수신되었는지 판단하는 단계; 및상기 리더 단말은 상기 리더 수락 메시지가 수신된 경우, 상기 가장 높은 리더 의사수치를 가지는 멤버 단말에 현재 연결에 사용되는 정보를 제공하는 단계를 포함하는 무선랜 기반 피어투피어 응용간 연결성 유지방법.
- 제 8항에 있어서, 상기 리더의 명시적 종료의 감지는,상기 리더 단말의 신호대 간섭잡음비(SINR)가 미리 설정된 값 이하로 낮아진 경우, 상기 리더 단말의 배터리 용량이 미리 설정된 값이 이하로 낮아진 경우 및 상기 리더 단말의 피어투피어 응용이 종료된 경우 중 적어도 하나에 해당하는 경우 상기 리더의 명시적 종료로 감지되는 것을 특징으로 하는 무선랜 기반 피어투피어 응용간 연결성 유지방법.
- 제 8항에 있어서, 상기 리더 수락 메시지가 수신되었는지 판단하는 단계는,상기 리더 수락 메시지가 수신되지 않는 경우, 차순위 리더 의사수치를 가지는 멤버 단말을 선정하는 단계;상기 차순위 리더 의사수치를 가지는 멤버 단말로 리더 수락 요청 메시지를 전송하고 상기 리더 수락 요청 메시지에 응답하는 리더 수락 메시지가 수신되었는지 판단하는 단계; 및상기 리더 수락 메시지가 수신된 경우, 상기 차순위 리더 의사수치를 가지는 멤버 단말에 현재 연결에 사용되는 정보를 제공하는 단계를 더 포함하는 것을 특징으로 하는 무선랜 기반 피어투피어 응용간 연결성 유지방법.
- 리더 단말과 복수의 멤버 단말을 포함하는 무선랜 기반 피어투피어 응용간 연결성 유지 방법에 있어서,멤버 단말은 미리 설정된 시간 이내에 상기 리더 단말로부터 비콘 신호가 수신되는지를 판단하는 단계;상기 멤버 단말은 상기 미리 설정된 시간 이내에 상기 비콘 신호가 수신되지 않는 경우, 상기 리더 단말과 접속을 해지하고 미리 결정된 대기 시간 동안 상기 멤버 단말의 서비스 개시정보에 상응하는 적어도 하나의 다른 멤버 단말이 존재하는지 판단하는 단계; 및상기 서비스 개시정보에 상응하는 상기 적어도 하나의 다른 멤버 단말이 존재하는 경우 상기 서비스 개시정보에 포함된 리더 의사수치와 상기 적어도 하나의 다른 멤버 단말로부터 각각 수신한 리더 의사수치에 기초하여 가장 높은 리더 의사수치를 가지는 단말을 리더 단말로 설정하는 단계를 포함하는 무선랜 기반 피어투피어 응용간 연결성 유지방법.
- 제어부 및 통신부를 포함하는 무선랜 기반 피어 단말에 있어서,피어투피어 응용으로부터 응용 정보를 추출하고, 추출된 상기 응용 정보로부터 서비스 개시정보를 생성한 후, 미리 결정된 대기 시간 동안 상기 서비스 개시정보에 상응하는 적어도 하나의 다른 피어 단말이 존재하는지 상기 통신부를 통하여 판단하고, 상기 서비스 개시정보에 상응하는 적어도 하나의 다른 피어 단말이 존재하는 경우 상기 서비스 개시정보에 포함된 리더 의사수치와 상기 적어도 하나의 다른 피어 단말로부터 각각 수신한 리더 의사수치에 기초하여 가장 높은 리더 의사수치를 가지는 피어 단말을 리더 단말로 설정하는 제어부; 및상기 제어부로부터 상기 서비스 개시정보를 제공받아 상기 서비스 개시정보에 상응하는 상기 적어도 하나의 다른 피어 단말이 존재하는지의 정보를 수신하여 상기 제어부에 제공하는 통신부를 포함하는 무선랜 기반 피어 단말.
- 제 12항에 있어서, 상기 리더 의사수치는,상기 무선랜 기반 피어 단말의 CPU 클럭수가 높은 경우, 잔류 배터리 양이 많은 경우 및 상기 피어 단말이 전력을 계속 공급받는 경우 중 적어도 하나에 해당하는 경우 높게 생성되는 것을 특징으로 하는 무선랜 기반 피어투피어 응용간 연결 방법.
- 제 12항에 있어서,상기 서비스 개시정보는 상기 리더 의사수치 이외에도 호설정 채널, 서비스 태그 및 정보보호 증명서 중 적어도 하나를 포함할 수 있고, 상기 제어부는 상기 호설정 채널, 서비스 태그 및 정보보호 증명서와 상기 적어도 하나의 다른 피어 단말의 호설정 채널, 서비스 태그 및 정보보호 증명서가 동일한 경우, 상기 서비스 개시정보에 상응하는 적어도 하나의 다른 피어 단말이 존재하는 것으로 판단하는 것을 특징으로 하는 무선랜 기반 피어 단말.
- 제 12항에 있어서, 상기 제어부는,상기 서비스 개시정보에 상응하는 상기 적어도 하나의 다른 피어 단말이 존재하지 않는 경우, 상기 피어 단말을 리더 단말로 설정한 후, 상기 서비스 개시정보에 상응하는 상기 적어도 하나의 다른 피어 단말의 접속 여부를 상기 통신부를 통하여 판단하고, 상기 통신부를 통해 상기 적어도 하나의 다른 피어 단말이 접속한 경우 상기 서비스 개시정보에 포함된 리더 의사수치와 접속한 상기 적어도 하나의 다른 피어 단말로부터 각각 수신한 리더 의사수치에 기초하여 가장 높은 리더 의사수치를 가지는 단말을 리더 단말로 설정하고 그 이외의 단말을 멤버 단말로 설정하는 것을 특징으로 하는 무선랜 기반 피어 단말.
- 제 12항에 있어서, 상기 제어부는,상기 피어 단말이 리더 단말의 기능을 수행하던 중 리더의 명시적 종료가 감지된 경우 리더 이전을 결정하고, 복수의 멤버 단말로부터 각각 리더 의사수치를 수신한 후, 수신한 상기 리더 의사수치에 기초하여 가장 높은 리더 의사수치를 가지는 멤버 단말을 선정하고 상기 통신부를 통하여 상기 가장 높은 리더 의사수치를 가지는 멤버 단말로 리더 수락 요청 메시지를 전송하고 상기 리더 수락 요청 메시지에 응답하는 리더 수락 메시지가 수신된 경우, 상기 통신부를 통하여 상기 가장 높은 리더 의사수치를 가지는 멤버 단말에 현재 연결에 사용되는 정보를 제공하는 것을 특징으로 하는 무선랜 기반 피어 단말.
- 제 16항에 있어서, 상기 리더의 명시적 종료의 감지는,상기 피어 단말의 신호대 간섭잡음비(SINR)가 미리 설정된 값 이하로 낮아진 경우, 상기 피어 단말의 배터리 용량이 미리 설정된 값이 이하로 낮아진 경우 및 상기 피어 단말의 피어투피어 응용이 종료된 경우 중 적어도 하나에 해당하는 경우 상기 리더의 명시적 종료로 감지되는 것을 특징으로 하는 무선랜 기반 피어 단말.
- 제 12항에 있어서, 상기 제어부는,상기 피어 단말이 멤버 단말의 기능을 수행하는 경우 미리 설정된 사간 이내에 상기 리더 단말로부터 비콘 신호가 수신되지 않은 경우, 상기 리더 단말과 접속을 해지하고 상기 미리 결정된 대기 시간 동안 상기 서비스 개시정보에 상응하는 적어도 하나의 다른 피어 단말이 존재하는지 판단하여, 상기 서비스 개시정보에 상응하는 적어도 하나의 다른 피어 단말이 존재하는 경우 상기 서비스 개시정보에 포함된 리더 의사수치와 상기 적어도 하나의 다른 멤버 단말로부터 각각 수신한 리더 의사수치에 기초하여 가장 높은 리더 의사수치를 가지는 단말을 리더 단말로 설정하는 것을 특징으로 하는 무선랜 기반 피어 단말.
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2014506313A JP5815840B2 (ja) | 2011-04-21 | 2011-10-25 | 無線lan基盤ピアツーピアアプリケーション間の接続方法、無線lan基盤ピアツーピアアプリケーション間の接続性の維持方法および無線lan基盤ピア端末 |
CN201180070310.5A CN103503556A (zh) | 2011-04-21 | 2011-10-25 | 在无线局域网上连接点对点应用程序的方法,在无线局域网上保持点对点应用程序之间的连接的方法以及基于无线局域网的对等点终端 |
US14/112,894 US20140314059A1 (en) | 2011-04-21 | 2011-10-25 | Method for connecting peer-to-peer applications over a wireless lan, and method for maintaining a connection between the peer-to-peer applications over the wireless lan, and wireless lan-based peer terminal |
EP11863938.4A EP2701457A4 (en) | 2011-04-21 | 2011-10-25 | METHOD FOR CONNECTING APPROVED APPLICATIONS TO A WIRELESS LOCAL NETWORK, AND METHOD FOR MAINTAINING A CONNECTION BETWEEN APPROVED APPLICATIONS ON THE WIRELESS LOCAL NETWORK, AND THE WIRELESS LOCAL NETWORK BASED HOMOLOGIST TERMINAL |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR10-2011-0037292 | 2011-04-21 | ||
KR20110037292 | 2011-04-21 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2012144707A1 true WO2012144707A1 (ko) | 2012-10-26 |
Family
ID=47041779
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2011/007997 WO2012144707A1 (ko) | 2011-04-21 | 2011-10-25 | 무선랜 기반 피어투피어 응용간 연결 방법, 무선랜 기반 피어투피어 응용간 연결성 유지 방법 및 무선랜 기반 피어 단말 |
Country Status (6)
Country | Link |
---|---|
US (1) | US20140314059A1 (ko) |
EP (1) | EP2701457A4 (ko) |
JP (1) | JP5815840B2 (ko) |
KR (1) | KR101267983B1 (ko) |
CN (1) | CN103503556A (ko) |
WO (1) | WO2012144707A1 (ko) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014069868A1 (ko) * | 2012-10-29 | 2014-05-08 | 엘지전자 주식회사 | 엔에프씨를 이용한 와이파이 다이렉트 서비스 방법 및 이를 위한 장치 |
JP2014089714A (ja) * | 2012-10-29 | 2014-05-15 | Samsung Electronics Co Ltd | 電子装置及びその印刷制御方法 |
JP2016503606A (ja) * | 2012-11-05 | 2016-02-04 | エルジー エレクトロニクス インコーポレイティド | 直接通信システムにおいてサービス探索又は広告方法及びそのための装置 |
JP2016508263A (ja) * | 2013-05-08 | 2016-03-17 | インテル コーポレイション | アプリケーションサービスプラットフォーム(asp)ピアツーピア(p2p)グループを設定する機器、システム、及び方法 |
JP2016533670A (ja) * | 2013-07-10 | 2016-10-27 | コンヴィーダ ワイヤレス, エルエルシー | コンテキスト認識近接サービス |
US10135759B2 (en) | 2013-06-12 | 2018-11-20 | Convida Wireless, Llc | Context and power control information management for proximity services |
US10230790B2 (en) | 2013-06-21 | 2019-03-12 | Convida Wireless, Llc | Context management |
Families Citing this family (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101915314B1 (ko) | 2011-10-25 | 2018-11-07 | 삼성전자주식회사 | 휴대단말기에서 WPS(Wi-Fi Protecte d Setup)을 이용한 와이파이 연결 방법 및 장치 |
US9510378B2 (en) * | 2012-03-07 | 2016-11-29 | Intel Corporation | Systems and methods for implementing a peer-to-peer connection |
KR20150017848A (ko) | 2013-08-08 | 2015-02-23 | 삼성전자주식회사 | 와이파이 다이렉트 연결 방법 및 장치 |
KR102013373B1 (ko) * | 2013-08-28 | 2019-08-23 | 삼성전자주식회사 | 외부 단말과의 연동을 실행하는 방법, 장치 및 기록매체 |
KR102158693B1 (ko) * | 2014-01-14 | 2020-10-14 | 엘지전자 주식회사 | 비콘 신호를 이용한 전자 디바이스 간 네트워크 연결 방법 및 이를 위한 전자 디바이스 |
KR102314867B1 (ko) * | 2014-03-04 | 2021-10-20 | 삼성전자주식회사 | 자동 스위칭 방법 및 장치 |
US20150257188A1 (en) * | 2014-03-06 | 2015-09-10 | Samsung Electronics Co., Ltd. | Method and system for establishing a service session between seeker device and advertiser device |
US9430667B2 (en) | 2014-05-12 | 2016-08-30 | Microsoft Technology Licensing, Llc | Managed wireless distribution network |
US9384335B2 (en) | 2014-05-12 | 2016-07-05 | Microsoft Technology Licensing, Llc | Content delivery prioritization in managed wireless distribution networks |
US10111099B2 (en) | 2014-05-12 | 2018-10-23 | Microsoft Technology Licensing, Llc | Distributing content in managed wireless distribution networks |
US9384334B2 (en) | 2014-05-12 | 2016-07-05 | Microsoft Technology Licensing, Llc | Content discovery in managed wireless distribution networks |
US9874914B2 (en) | 2014-05-19 | 2018-01-23 | Microsoft Technology Licensing, Llc | Power management contracts for accessory devices |
US10037202B2 (en) | 2014-06-03 | 2018-07-31 | Microsoft Technology Licensing, Llc | Techniques to isolating a portion of an online computing service |
US9367490B2 (en) | 2014-06-13 | 2016-06-14 | Microsoft Technology Licensing, Llc | Reversible connector for accessory devices |
CN104105169B (zh) * | 2014-07-25 | 2015-10-14 | 小米科技有限责任公司 | 自动连接无线局域网的方法及装置 |
US9866602B2 (en) * | 2014-10-16 | 2018-01-09 | Kollective Technology, Inc. | Adaptive bit rates during broadcast transmission in distributed content delivery networks |
CN104270732B (zh) * | 2014-10-23 | 2020-02-07 | 广州三星通信技术研究有限公司 | 呼叫转移的配置方法和装置 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20090005649A (ko) * | 2007-07-09 | 2009-01-14 | 삼성전자주식회사 | 이동통신 시스템에서 피어투피어 통신을 위한 상태천이방법 |
KR20100066274A (ko) * | 2008-12-08 | 2010-06-17 | 한국전자통신연구원 | 인터넷 서비스 제공 서버 및 피어 투 피어 통신 서버 사이의 협업에 의한 데이터 통신 방법 |
KR20100089238A (ko) | 2009-02-03 | 2010-08-12 | 광주과학기술원 | 무선 피어투피어 네트워크에서의 멀티미디어 데이터 전송을위한 분산형 피어 발견 방법 |
KR20110040025A (ko) * | 2009-10-13 | 2011-04-20 | 삼성전자주식회사 | 이동통신 단말기에서 무선랜을 이용한 피어투피어 연결 방법 및 장치 |
Family Cites Families (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020169539A1 (en) * | 2001-03-28 | 2002-11-14 | Menard Raymond J. | Method and system for wireless tracking |
US6580704B1 (en) * | 1999-08-26 | 2003-06-17 | Nokia Corporation | Direct mode communication method between two mobile terminals in access point controlled wireless LAN systems |
JP2001103570A (ja) * | 1999-09-30 | 2001-04-13 | Toshiba Corp | 通信システム、この通信システムに用いられる通信装置及び通信方法 |
GB0004919D0 (en) * | 2000-03-02 | 2000-04-19 | Koninkl Philips Electronics Nv | Ad-hoc radio communication system |
WO2002057917A2 (en) * | 2001-01-22 | 2002-07-25 | Sun Microsystems, Inc. | Peer-to-peer network computing platform |
US6704584B2 (en) * | 2002-04-16 | 2004-03-09 | Thomson Licensing S.A. | Mechanism for a wireless device to relinquish its network master status based on its power reserve |
US6879574B2 (en) * | 2002-06-24 | 2005-04-12 | Nokia Corporation | Mobile mesh Ad-Hoc networking |
JP3848235B2 (ja) * | 2002-10-04 | 2006-11-22 | ソニー株式会社 | 通信処理装置、通信処理システム、および方法、並びにコンピュータ・プログラム |
US7245947B2 (en) * | 2003-09-16 | 2007-07-17 | Nokia Corporation | Method and system for power-based control of an ad hoc wireless communications network |
WO2005034434A1 (ja) * | 2003-10-03 | 2005-04-14 | Sharp Kabushiki Kaisha | 通信装置、その装置の動作モード起動方法、通信方法、通信システム、プログラム、および、そのプログラムを記録した記録媒体 |
KR100594429B1 (ko) | 2004-04-21 | 2006-06-30 | 한국전자통신연구원 | 무선 개인 네트워크 시스템, 그 네트워크의 코디네이터 및 그 코디네이터의 핸드오버를 위한 코디네이터 선택방법 |
PL1762041T3 (pl) * | 2004-06-29 | 2011-12-30 | Nokia Technologies Oy | Sterowanie bezprzewodowym terminalem krótkiego zasięgu |
JP2006304117A (ja) * | 2005-04-22 | 2006-11-02 | Mitsubishi Electric Corp | 通信方法、基地局、無線区間制御装置および端末 |
JP4829600B2 (ja) * | 2005-11-28 | 2011-12-07 | キヤノン株式会社 | 通信装置及び通信装置の制御方法 |
US8401535B2 (en) * | 2006-06-19 | 2013-03-19 | Samsung Electronics Co., Ltd. | System, a method, and an apparatus for sharing an updated content with peers |
JP4281925B2 (ja) * | 2006-06-19 | 2009-06-17 | 株式会社スクウェア・エニックス | ネットワークシステム |
US7787426B2 (en) * | 2006-11-10 | 2010-08-31 | Powerwave Cognition, Inc. | Adaptive control channel initialization operations for autonomous dynamic spectrum access systems |
WO2008103103A2 (en) * | 2007-02-19 | 2008-08-28 | Telefonaktiebolaget Lm Ericsson (Publ) | A method and apparatus for enabling user group services in a communication network |
US8401001B2 (en) * | 2007-03-28 | 2013-03-19 | Intel Corporation | Method and apparatus of connectivity recovery in wireless network |
CN101668029B (zh) * | 2008-09-04 | 2012-08-08 | 华为技术有限公司 | 一种网络设备和网络通讯的方法 |
JP5705415B2 (ja) * | 2009-04-06 | 2015-04-22 | ソニー株式会社 | 無線通信装置、通信システム、通信方法及びプログラム |
US20110082939A1 (en) * | 2009-10-02 | 2011-04-07 | Michael Peter Montemurro | Methods and apparatus to proxy discovery and negotiations between network entities to establish peer-to-peer communications |
US8489948B2 (en) * | 2010-04-02 | 2013-07-16 | Nokia Corporation | Methods and apparatuses for facilitating error correction |
US20120173620A1 (en) * | 2010-12-29 | 2012-07-05 | Microsoft Corporation | Creation and management of resilient wireless groups |
-
2011
- 2011-08-02 KR KR1020110077126A patent/KR101267983B1/ko not_active IP Right Cessation
- 2011-10-25 EP EP11863938.4A patent/EP2701457A4/en not_active Withdrawn
- 2011-10-25 US US14/112,894 patent/US20140314059A1/en not_active Abandoned
- 2011-10-25 CN CN201180070310.5A patent/CN103503556A/zh active Pending
- 2011-10-25 WO PCT/KR2011/007997 patent/WO2012144707A1/ko active Application Filing
- 2011-10-25 JP JP2014506313A patent/JP5815840B2/ja not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20090005649A (ko) * | 2007-07-09 | 2009-01-14 | 삼성전자주식회사 | 이동통신 시스템에서 피어투피어 통신을 위한 상태천이방법 |
KR20100066274A (ko) * | 2008-12-08 | 2010-06-17 | 한국전자통신연구원 | 인터넷 서비스 제공 서버 및 피어 투 피어 통신 서버 사이의 협업에 의한 데이터 통신 방법 |
KR20100089238A (ko) | 2009-02-03 | 2010-08-12 | 광주과학기술원 | 무선 피어투피어 네트워크에서의 멀티미디어 데이터 전송을위한 분산형 피어 발견 방법 |
KR20110040025A (ko) * | 2009-10-13 | 2011-04-20 | 삼성전자주식회사 | 이동통신 단말기에서 무선랜을 이용한 피어투피어 연결 방법 및 장치 |
Non-Patent Citations (1)
Title |
---|
See also references of EP2701457A4 |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014069868A1 (ko) * | 2012-10-29 | 2014-05-08 | 엘지전자 주식회사 | 엔에프씨를 이용한 와이파이 다이렉트 서비스 방법 및 이를 위한 장치 |
JP2014089714A (ja) * | 2012-10-29 | 2014-05-15 | Samsung Electronics Co Ltd | 電子装置及びその印刷制御方法 |
JP2016503606A (ja) * | 2012-11-05 | 2016-02-04 | エルジー エレクトロニクス インコーポレイティド | 直接通信システムにおいてサービス探索又は広告方法及びそのための装置 |
JP2016508263A (ja) * | 2013-05-08 | 2016-03-17 | インテル コーポレイション | アプリケーションサービスプラットフォーム(asp)ピアツーピア(p2p)グループを設定する機器、システム、及び方法 |
US9641607B2 (en) | 2013-05-08 | 2017-05-02 | Intel Corporation | Apparatus, system and method of setting up an application service platform (ASP) peer to peer (P2P) group |
US10135759B2 (en) | 2013-06-12 | 2018-11-20 | Convida Wireless, Llc | Context and power control information management for proximity services |
US10531406B2 (en) | 2013-06-12 | 2020-01-07 | Convida Wireless, Llc | Context and power control information management for proximity services |
US10230790B2 (en) | 2013-06-21 | 2019-03-12 | Convida Wireless, Llc | Context management |
JP2016533670A (ja) * | 2013-07-10 | 2016-10-27 | コンヴィーダ ワイヤレス, エルエルシー | コンテキスト認識近接サービス |
US10791171B2 (en) | 2013-07-10 | 2020-09-29 | Convida Wireless, Llc | Context-aware proximity services |
Also Published As
Publication number | Publication date |
---|---|
KR20120119959A (ko) | 2012-11-01 |
JP2014512153A (ja) | 2014-05-19 |
CN103503556A (zh) | 2014-01-08 |
US20140314059A1 (en) | 2014-10-23 |
KR101267983B1 (ko) | 2013-05-27 |
EP2701457A4 (en) | 2016-03-02 |
EP2701457A1 (en) | 2014-02-26 |
JP5815840B2 (ja) | 2015-11-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2012144707A1 (ko) | 무선랜 기반 피어투피어 응용간 연결 방법, 무선랜 기반 피어투피어 응용간 연결성 유지 방법 및 무선랜 기반 피어 단말 | |
WO2013073838A4 (ko) | 와이파이 다이렉트 네트워크를 통한 지원 서비스 탐색 방법 및 디바이스 | |
WO2016148534A1 (en) | Method and apparatus for configuring connection between devices in communication system | |
WO2014200240A1 (en) | Method and apparatus for registering wireless device in wireless communication system | |
WO2013089438A1 (en) | Image forming apparatus supporting peer to peer connection and method of performing image forming operation thereof | |
WO2011062404A2 (ko) | Wifi direct 네트워크에서의 wifi 디스플레이 서비스 탐색 방법 및 장치 | |
WO2017018823A1 (ko) | 무선 통신 시스템에서 어플리케이션 서비스 플랫폼 세션 형성 방법 및 장치 | |
WO2011087210A2 (ko) | 전자기기 및 전자기기의 동작 방법 | |
WO2016167618A9 (ko) | 무선 통신 시스템에서 서비스 디스커버리를 수행하는 방법 및 장치 | |
WO2011155732A2 (ko) | 장치가 다른 장치와 통신 하는 방법 | |
WO2016148406A1 (ko) | 무선 통신 시스템에서 어플리케이션 서비스 플랫폼을 이용하여 서비스를 지원하는 방법 및 장치 | |
WO2014098437A1 (ko) | 무선랜 시스템에서 서비스 발견 방법 및 장치 | |
WO2016148523A1 (ko) | 무선 통신 시스템에서 서비스 디스커버리를 수행하는 방법 및 장치 | |
WO2017014579A1 (ko) | 무선 통신 시스템에서 디스커버리를 수행하는 방법 및 장치 | |
WO2019177231A1 (ko) | 무선랜 시스템에서 타겟 액세스 포인트에 대한 정보를 전달하기 위한 방법 및 이를 이용한 액세스 포인트 | |
WO2015108378A1 (en) | Device to device communication method and apparatus | |
WO2017039376A1 (ko) | 무선 통신 시스템에서 연결 능력 정보를 교환하는 방법 및 장치 | |
WO2014010883A1 (ko) | 라디오 주파수 대역을 고려한 무선네트워크 접속 장치 및 방법 | |
WO2019235813A1 (en) | Electronic device supporting multiple wireless communication protocols and method therefor | |
JP2013005188A (ja) | 無線通信装置 | |
WO2012091528A2 (ko) | 신뢰도 있는 ap를 선택할 수 있는 단말기 및 방법 | |
WO2016190618A1 (ko) | 무선 통신 시스템에서 세션 핸드오버를 수행하는 방법 및 장치 | |
WO2013122395A1 (ko) | 무선랜 시스템에서 고속 링크 셋업 방법 및 장치 | |
WO2019194391A1 (ko) | 무선랜 시스템에서 무선 장치에 관한 정보를 전달하기 위한 방법 및 이를 이용한 구성자 단말 | |
WO2022025614A1 (ko) | 스마트홈 환경의 무선랜 시스템에서 다중 제어기를 설정하는 방법 및 장치 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 11863938 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2014506313 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
REEP | Request for entry into the european phase |
Ref document number: 2011863938 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2011863938 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 14112894 Country of ref document: US |