US20080031185A1 - Tracking multiple interface connections by mobile stations - Google Patents

Tracking multiple interface connections by mobile stations Download PDF

Info

Publication number
US20080031185A1
US20080031185A1 US11/819,138 US81913807A US2008031185A1 US 20080031185 A1 US20080031185 A1 US 20080031185A1 US 81913807 A US81913807 A US 81913807A US 2008031185 A1 US2008031185 A1 US 2008031185A1
Authority
US
United States
Prior art keywords
switch
station
repeater
network
mobile station
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/819,138
Inventor
Harry Bims
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Avago Technologies International Sales Pte Ltd
Original Assignee
Broadcom Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Broadcom Corp filed Critical Broadcom Corp
Priority to US11/819,138 priority Critical patent/US20080031185A1/en
Assigned to BROADCOM CORPORATION reassignment BROADCOM CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: AIRFLOW NETWORKS INC.
Publication of US20080031185A1 publication Critical patent/US20080031185A1/en
Assigned to AIRFLOW NETWORKS, INC. reassignment AIRFLOW NETWORKS, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BIMS, HARRY
Assigned to BANK OF AMERICA, N.A., AS COLLATERAL AGENT reassignment BANK OF AMERICA, N.A., AS COLLATERAL AGENT PATENT SECURITY AGREEMENT Assignors: BROADCOM CORPORATION
Assigned to AVAGO TECHNOLOGIES GENERAL IP (SINGAPORE) PTE. LTD. reassignment AVAGO TECHNOLOGIES GENERAL IP (SINGAPORE) PTE. LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BROADCOM CORPORATION
Assigned to BROADCOM CORPORATION reassignment BROADCOM CORPORATION TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS Assignors: BANK OF AMERICA, N.A., AS COLLATERAL AGENT
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
    • H04B7/022Site diversity; Macro-diversity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • H04L69/32Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
    • H04L69/322Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
    • H04L69/324Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the data link layer [OSI layer 2], e.g. HDLC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B17/00Monitoring; Testing
    • H04B17/30Monitoring; Testing of propagation channels
    • H04B17/309Measuring or estimating channel quality parameters
    • H04B17/318Received signal strength
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • H04L69/32Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Definitions

  • the present invention relates to the field of wireless communications; more particularly, the present invention relates to a single frequency wireless communication system.
  • FIG. 1 illustrates an exemplary network environment used today.
  • a corporate Local Area Network (LAN) backbone 102 interfaces to a number of desktop computers 103 1 - 103 n and may interface to Internet 101 .
  • corporate LAN backbone 102 may comprise a firewall 102 A, corporate server 102 B, and a standard Ethernet switch 102 C.
  • Ethernet switch 102 C includes an interface by which desktops 103 1 - 103 n are coupled to the corporate LAN backbone 102 for access to corporate sever 102 B and to Internet 101 (via firewall 102 A).
  • WLANs wireless LANs
  • 802.11 Standard the protocol set forth in the 802.11 Standard, particularly as more enterprises are adopting the 802.11 Standard.
  • FIG. 2 illustrates one embodiment of an 802.11, based WLAN (LAN) system.
  • the Internet or other LAN 201 is coupled to an 802.11 server 203 via firewall (FW) 202 .
  • Server 203 communicates with mobile stations in a number of 802.11 cells 206 1 - 206 n n using an access point in each of cells 206 1 - 206 n , such as access point 204 .
  • Server 203 is coupled to access points such as access point 204 , via an Ethernet connection. There is one access point for each of the 802.11 cells 206 1 - 206 n .
  • Mobile stations in each of the 802.11 cells communicate wirelessly with the access points via the 802.11 protocol.
  • the communications from mobile stations in the 802.11 cells to the access points are forwarded through to server 203 and potentially to Internet/LAN 201 , while communications from Internet/LAN 201 are forwarded through server 203 to the mobile stations via the access points.
  • the 802.11 standard sets forth a number of solutions to handle the issue of mobility of mobile stations between the 802.11 cells.
  • these schemes do not work effectively as there is no standard solution in place and users haven't indicated a desire for long-term proprietary solutions.
  • the method comprises allowing a mobile station to have a first connection to a network over a first interface and determining that the mobile station is attempting to have a second connection to the network over a second interface other than the first interface.
  • FIG. 1 illustrates an exemplary network environment used today.
  • FIG. 2 illustrates one embodiment of an 802.11 based wireless LAN-based (LAN) system.
  • FIG. 3 illustrates one embodiment of a network architecture.
  • FIG. 4A is a flow diagram of one embodiment of a receiver diversity processing performed by a repeater.
  • FIG. 4B is a flow diagram of one embodiment of a receiver diversity processing performed by a switch.
  • FIG. 4C is a process for managing repeaters using a token-based mechanism.
  • FIG. 4D is one embodiment of a token-based process for handling packets.
  • FIG. 5A illustrates one technique for location tracking by RSSI.
  • FIG. 5B is a flow diagram of one embodiment of a process for performing location tracking by a switch.
  • FIG. 6 illustrates mobility supported by routing.
  • FIG. 7 illustrates one embodiment of a network system.
  • FIG. 8 illustrates one embodiment of a protocol architecture.
  • FIG. 9A illustrates one embodiment of a switch.
  • FIG. 9B illustrates one embodiment of a repeater.
  • FIG. 10 illustrates one embodiment of a hardware architecture for a repeater.
  • FIG. 11 is a block diagram of one embodiment of the base stand processor of a repeater.
  • FIG. 12A is a block diagram of one embodiment of a switch.
  • FIG. 12B is a flow diagram of one embodiment of a process for reconfiguring the wireless communication system.
  • FIG. 13 is one embodiment of a distributed MAC architecture.
  • FIG. 14 illustrates one embodiment of the switching plane.
  • FIG. 15 illustrates the communication network and exemplary data traffic process.
  • FIG. 16 illustrates an exemplary process for transferring data traffic from a mobile station to a desktop.
  • FIG. 17 illustrates an exemplary process for transferring data traffic between two mobile stations.
  • FIG. 18 illustrates an exemplary process for transferring data traffic from a desktop to a mobile station.
  • FIG. 19 is a data flow diagram of one embodiment of an association and token assignment process.
  • FIG. 20 is a block diagram of two MAC sublayer instances in a switch.
  • FIG. 21 is a data flow diagram of one embodiment of a re-association process.
  • FIG. 22 is a flow diagram on one embodiment of a disassociation process.
  • FIG. 23A is a flow diagram of one embodiment of the process of tracking multiple mobile station interfaces.
  • FIG. 23B is an alternative embodiment of a switch.
  • the communication system comprises a mobile station having a transmitter to transmit packets wirelessly according to a protocol and multiple repeaters communicably coupled with the mobile station.
  • Each of the repeaters may receive one or more packets of the wirelessly transmitted packets from one or more mobile station and forwards them to a switch.
  • the switch sends one or more packets to the one or more mobile stations via the repeaters.
  • a technique is disclosed herein that tracks when a mobile station is attempting to connect to the network over more than one mobile station interface.
  • a switch described herein allows a mobile station to have one connection to a network over one of its interfaces (e.g., a 802.11 wireless interface). Thereafter, the switch determines that the mobile station is attempting to have a second connection to the network over another mobile station interface (e.g., a wired interface).
  • the switch makes the determination by checking a table (e.g., an active stations list) of mobile stations along with a list of the interfaces available for each of the listed mobile stations to determine if media access control (MAC) addresses of both interfaces (e.g., the wireless and the wired interfaces) are listed as belonging to the same mobile station.
  • MAC media access control
  • the switch enforces a security policy in response to determining that a mobile station is attempting to connect to the network over one interface when already connected over another interface.
  • the present invention also relates to apparatus for performing the operations herein.
  • This apparatus may be specially constructed for the required purposes, or it may comprise a general purpose computer selectively activated or reconfigured by a computer program stored in the computer.
  • a computer program may be stored in a computer readable storage medium, such as, but is not limited to, any type of disk including floppy disks, optical disks, CD-ROMs, and magnetic-optical disks, read-only memories (ROMs), random access memories (RAMS), EPROMs, EEPROMs, magnetic or optical cards, or any type of media suitable for storing electronic instructions, and each coupled to a computer system bus.
  • a machine-readable medium includes any mechanism for storing or transmitting information in a form readable by a machine (e.g., a computer).
  • a machine-readable medium includes read only memory (“ROM”); random access memory (“RAM”); magnetic disk storage media; optical storage media; flash memory devices; electrical, optical, acoustical or other form of propagated signals (e.g., carrier waves, infrared signals, digital signals, etc.); etc.
  • FIG. 3 illustrates one embodiment of a network architecture.
  • a LAN backbone 102 interfaces a number of desktops 103 1 - 103 n to Internet 101 .
  • the present invention does not require that a LAN backbone be included. All that is necessary is that there be a communication mechanism that is capable of receiving packets from other devices and/or sending packets to other devices.
  • LAN backbone 102 includes firewall 102 A, corporate server 102 B and Ethernet switch 102 C. However, in contrast to FIG. 1 , LAN backbone 102 also includes switch 301 which interfaces to repeaters 302 1 - 302 3 . Although only three repeaters are shown, alternative embodiments may utilize any number of repeaters with a minimum of one. In one embodiment, switch 301 is coupled to repeaters 302 1 - 302 3 via a wired connection, such as cabling. In one embodiment, the wired connection may comprise CATS cabling.
  • Each of repeaters 302 1 - 302 3 receives wireless communications from devices (e.g., mobile stations such as, for example, a mobile phone, a cellular phone, a cordless phone, a headset, a voice-enabled mobile station, a laptop computer system, a personal digital assistant, a computer-data-enabled mobile station, a speakerphone, video game controller, a DVD controller, a stereo controller, a TV controller, etc.) in the coverage areas of the repeaters.
  • these wireless communications are performed according to the 802.11 protocol. That is, each of the mobile stations in each of cells 310 1 - 310 n exchanges packets with repeaters 302 1 - 302 3 using the 802.11 protocol.
  • switch 301 includes 802.11 MAC (medium access control) protocol software and/or hardware that allows switch 301 to communicate with repeaters 302 1 - 302 3 .
  • 802.11 MAC medium access control
  • some of the 802.11 MAC functionality typically associated with the access points, as described above in the Background section, are not in repeaters 302 1 - 302 3 and are, instead, centralized in switch 301 .
  • the MAC layer is split between repeater 302 1 - 302 3 and switch 301 to enable transfer of messages over wiring (e.g., CAT5 cabling).
  • repeaters 302 1 - 302 3 and switch 301 coordinate to perform functionality of the 802.11 MAC layer as described below.
  • switch 301 includes one or more Ethernet connectors (e.g., external Ethernet connector) to enable a computer system, such as desktop computer system 303 , or other device, to have an Ethernet connection to LAN backbone 102 via switch 301 .
  • one or more of repeaters 302 1 - 302 3 includes an Ethernet connector to enable a device (e.g., computer system, such as desktop computer system 304 ) to gain access, via a repeater, such as repeater 302 3 , to switch 301 and the rest of the communication system.
  • the wiring coupling switch 301 to repeaters 302 1 - 302 3 may combine 802.11 information, including management and control (as opposed to solely data) information, with traditional Ethernet packets on the same wiring (e.g., CATS).
  • the network architecture described above allows for overlapping coverage between cells supported by the repeaters. This overlapping coverage allows for receiver diversity.
  • the packets from the mobile stations in each of the cells are broadcast and may be received by multiple repeaters.
  • multiple repeaters By allowing multiple repeaters to receive packets from one of the mobile stations, collisions and dropped packets may be reduced or avoided. For example, if a collision occurs or if a packet is dropped by one of the repeaters, then a particular packet can still be received by other repeaters. In this manner, the use of repeaters described herein provides for higher reliability.
  • each packet from a mobile station includes an Ethernet MAC address, which is embedded in the packet.
  • Each packet may be received by one or more repeaters.
  • Each repeater that receives a packet from a mobile station without errors (i.e., cleanly) determines the received signal strength of the packet in a manner well-known in the art.
  • the received signal strength is converted into an indication, such as a received signal strength indicator (RSSI).
  • RSSI received signal strength indicator
  • the RSSI is specified in a value from 1 to 127. These 128 discrete values can be mapped to dB signal strength values based on the particular implementation being used.
  • all repeaters send their RSSI for the packet to switch 301 .
  • the repeater that is assigned to the mobile station sends the packet along with the RSSI.
  • the repeater encapsulates the packet into an Ethernet packet with the RSSI in a header and forwards the Ethernet packet to switch 301 .
  • each repeater receiving the packet without error forwards the packet, along with the RSSI to the switch.
  • Switch 301 knows which repeater sent the packet(s) because it is received on its preassigned port.
  • the fact that a particular repeater received a packet without errors is communicated to all other repeaters. In one embodiment, this is accomplished by having the repeater send each encapsulated packet and its RSSI as a broadcast packet to switch 301 .
  • This broadcast packet is similar to those broadcast packets used in Ethernet and includes a special broadcast address, which is recognized by switch 301 .
  • only the header of the packet, which includes the RSSI and uniquely identifies the packet is encapsulated and sent as a broadcast packet to the other repeaters. In this case, the data portion of the packet is not forwarded.
  • switch 301 In response to receiving the broadcast packet with the specific broadcast address, switch 301 broadcasts the packet on all of the other ports used for communication between switch 301 and the other repeaters.
  • the repeater upon receiving a packet without error from a particular mobile station, the repeater sets a timer within which it is to receive packets received by other repeaters that are duplicates to the packet it has already received. When the timer expires, the repeater examines the RSSI of the packet it received (without error) with the RSSI values of duplicate packets received by other repeaters. Based on that information, the repeater determines if it is to send an acknowledgement packet for the subsequent transmission from the mobile station. Thus, if the time expires without receiving a duplicate packet, the repeater sends the acknowledgement. If the timer expires and the repeater receives a duplicate packet, thereafter, it is treated as a new packet. To avoid this, the timer time out value is set to handle the worst case time delay that a repeater may face in receiving duplicate packets.
  • the communication protocol used between the mobile stations and the repeater is a modified version of the 802.11 protocol in which acknowledgement packets are disabled and thus, not sent.
  • a repeater that is assigned to a particular mobile station in response to receiving a packet at a larger received signal strength than any other repeater may not be delayed in handling the packet, and thereby avoids missing a portion of a packet from the mobile station.
  • switch 301 forwards each packet received from repeaters (note duplicates) to the remainder of the communication system (e.g., LAN backbone, other mobile stations, the Internet, etc.). In one embodiment, this occurs after de-duplication of packets so that only one copy of each packet is forwarded.
  • each repeater selects the packet with the highest RSSI and determines the repeater that received it. In other words, each repeater performs a comparison on the received signal strength of the packets it received that were also received by one or more other repeaters. For each of the packets that a repeater receives at a power level higher than any of the other repeaters that received that packet, that repeater sends an acknowledgement back to the mobile station acknowledging that the packet was received without errors. This prevents all the repeaters that receive the packet cleanly from sending multiple acknowledgements to the mobile station.
  • the repeater with the lower port number is the repeater that is selected to send the acknowledgement to the mobile station. In this manner, only one repeater is selected to send the acknowledgement to the mobile station and, thus, the receiver diversity is handled in the network architecture in a distributed fashion.
  • each packet includes identification information, such as its switch port number, to enable the determination of which has the lowest port number.
  • the repeater with the highest port number may be the one to send the acknowledgement or other pre-assigned priority information may be used by the repeaters in such situations.
  • the repeater MAC address may be used instead of using the port number to determine which repeater is to send the acknowledgement when two repeaters have the same received signal strength.
  • the repeater MAC address may be used instead of using the port number to determine which repeater is to send the acknowledgement when two repeaters have the same received signal strength.
  • the repeater MAC address may be used.
  • the repeater with the lowest MAC address may send the acknowledgement packet, or alternatively, the repeater with the highest MAC address may send the acknowledgement packet.
  • Using the repeater MAC address for the determination is preferred in cases where a layer 2 network is communicatively coupled between the repeaters and the switch such that a single port is used by multiple repeaters.
  • FIG. 4A is a flow diagram of one embodiment of a receiver diversity process performed by a repeater.
  • the process is performed by processing logic that may comprise hardware (circuitry, dedicated logic, etc.), software (such as is run on a general purpose computer system or a dedicated machine), or a combination of both.
  • processing logic initially receives an 802.11 packet (processing block 401 ).
  • processing logic determines the received signal strength (e.g., RSSI) (processing block 402 ).
  • this processing logic comprises a hardware mechanism, such as a radio frequency (RF) device (e.g., integrated circuit (e.g., RF IC 1002 in FIG. 10 )) in the repeater.
  • RF radio frequency
  • the RF device sends the RSSI to a baseband processor in the repeater.
  • processing logic encapsulates 802.11 packet and RSSI in an Ethernet packet (processing block 403 ) and sends the Ethernet packet to the switch (processing block 404 ).
  • a baseband processor e.g., baseband processor 1001 in FIG. 10 ) performs the encapsulation and sends the Ethernet packet to the switch.
  • processing logic receives one or more packets from the switch that are duplicates of the 802.11 packet. These duplicate packets are transmitted by other repeaters and encapsulated by those repeaters, along with their RSSIs (processing block 405 ). Processing logic in the repeater compares RSSIs for the duplicate packets (processing block 406 ). In one embodiment, a baseband processor (e.g., baseband processor 1001 in FIG. 10 ) performs the comparison. If the repeater determines it received the 802.11 packet with the highest RSSI, then processing logic sends the acknowledgment packet to the mobile station (processing block 407 ).
  • a baseband processor e.g., baseband processor 1001 in FIG. 10
  • FIG. 4B is a flow diagram of one embodiment of a receiver diversity processing performed by a switch.
  • the process is performed by processing logic that may comprise hardware (circuitry, dedicated logic, etc.), software (such as is run on a general purpose computer system or a dedicated machine), or a combination of both.
  • processing logic initially receives a packet from a repeater (processing block 411 ). In response to the packet, processing logic determines that the packet is to be sent to the other repeaters and re-broadcasts the received packet to other repeaters (processing block 412 ). Then processing logic sends only one copy of the packet to the rest of the network (processing block 413 ).
  • receiver diversity procedure is particularly useful when gigabit or faster Ethernet communication exists between switch 301 and repeaters 302 1 - 302 3 .
  • another technique for receiver diversity may be utilized.
  • a token-based receiver diversity procedure may be used.
  • switch 301 has a token for every mobile station on the 802.11 network and it gives the token to one of the repeaters.
  • switch 301 pre-assigns the token before a packet is even transmitted by a mobile station.
  • the repeater stores the token in a table that lists all mobile stations for which it has a token.
  • the repeater with the token sends the acknowledgement packet to the mobile stations listed in the table when those mobile stations send packets that are received by the repeater.
  • switch 301 includes a database with a listing of mobile stations and repeater numbers corresponding to the repeater that has been designated to acknowledge packets received from the mobile station and, thus, has the token.
  • the table may also include additional information describing the repeater itself.
  • switch 301 can determine the closest repeater to a particular mobile station. If the repeater determined to be closest to the particular mobile station is different than the one previously identified as closest (e.g., based on RSSI of packets received from the mobile station), then switch 301 moves the token to a new repeater, i.e. the one that is closer to the mobile station.
  • the token may be moved on a packet-by-packet basis or every predetermined number of the packets (e.g., 10 packets, 100 packets, etc.).
  • Switch 301 may employ a timer to indicate the time during which duplicate RSSI values for the same packet may be received in much the same manner the timer is used by the repeaters in the distributed approach described above.
  • FIG. 4C is a process for managing repeaters using a token-based mechanism.
  • the process is performed by processing logic that may comprise hardware (circuitry, dedicated logic, etc.), software (such as is run on a general purpose computer system or a dedicated machine), or a combination of both.
  • processing logic first determines the location of mobile stations with respect to repeaters (processing block 451 ). Processing logic then assigns a token for each of the mobile stations to one of the repeaters (processing block 452 ) and stores an indication of the repeater assigned to each mobile station (processing block 453 ). This information is stored in a table in memory. This table is referred to herein as an active station list. In one embodiment, this table includes a listing of mobile stations and an indication of which repeater and/or switch port number is assigned to the mobile station. The table may be the same data structure used for location tracking described below.
  • the switch assigns a token by sending an Add Token command to the repeater, which causes the repeater to add a new mobile station to its table of mobile stations that the repeater supports.
  • This command includes the MAC address of the mobile station.
  • processing logic periodically tests whether the repeater assigned the token for a particular mobile station is still the closest repeater to that mobile station (processing block 454 ). If so, then the processing is complete. If not, then processing logic moves the token to the closest repeater (processing block 455 ) and updates the table (e.g., the active station list) to reflect the new repeater that is closest to the mobile station (processing block 456 ). Processing logic also updates the switch port to reflect the new repeater for use when sending packets to the mobile station from the switch.
  • the table e.g., the active station list
  • the switch moves the token by sending a Delete Token command to the repeater that currently has it, causing the repeater to delete the token (and assorted MAC Address) from its list of supported mobile stations, and by sending an Add Token command to the repeater that is currently closest to the mobile station.
  • FIG. 4D is one embodiment of a token-based process for handling packets.
  • the process is performed by processing logic that may comprise hardware (circuitry, dedicated logic, etc.), software (such as is run on a general purpose computer system or a dedicated machine), or a combination of both.
  • processing logic receives a token from the switch (processing block 470 ) and stores the token in a table stored in a repeater memory that indicates all the mobile stations for which the repeater has a token (processing block 471 ).
  • processing logic when processing logic receives a packet from mobile station (processing block 472 ), processing logic compares the MAC address of the 802.11 packet from the mobile station with the address in the table (processing block 473 ). Then, processing logic tests whether the MAC address of a packet equals an address in the table (processing block 474 ). If so, processing logic provides an acknowledgment (ACK) packet to the mobile station (processing block 475 ). If not, processing logic ignores the packet.
  • ACK acknowledgment
  • switch 301 since all repeaters communicate the fact that they received a packet from a mobile station along with the received signal strength to switch 301 , switch 301 is able to determine the coverage area of the transmission of the mobile station.
  • each packet received by switch 301 from the repeaters terminates in a network processor in switch 301 (e.g., network processor 1206 of FIG. 12 ), which determines the coverage area because it has access to the RSSI values.
  • switch 301 is able to track the location of a particular device.
  • the repeater transmissions are scheduled to reduce collisions. This scheduling is useful because repeaters can be close enough to interfere with one another. Because of this, switch 301 schedules the transmissions to prevent the collisions when the repeaters are actually transmitting.
  • switch 301 For example, if a packet is destined for a particular IP address, then switch 301 performs an address translation to translate, for example, the IP address into an Ethernet MAC address. Switch 301 uses the Ethernet MAC address to search in a location tracking database to determine which repeater is closest to the mobile station having the Ethernet MAC address. Once the repeater is identified by switch 301 , then switch 301 knows the switch port on which the packet should be sent so that it is sent to the repeater listed in the location tracking database (for forwarding by the repeater to the mobile station).
  • switch 301 checks whether an interference problem would be created if the packet is sent by switch 301 to the mobile station at that time. An interference problem would be created if there are other transmissions that would be occurring when the packet is forwarded onto its destination mobile station. If no interference problem would exist, switch 301 sends the packet through the identified port to the repeater most recently determined to be closest to the mobile station. However, if an interference problem would be created by sending the packet immediately, then switch 301 delays sending the packet through the identified port to the repeater most recently determined to be closest to the mobile station.
  • switch 301 determines if an interference problem would exist if a packet is sent immediately upon determining the switch port number on which the packet is to be sent.
  • One of the databases indicates which of the repeaters interfere with each other during their transmissions. This database is examined for every downstream packet that is to be sent and switch 301 schedules the transmission of downstream packets so that the repeaters that interfere with each other when they transmit at the same time do not transmit at the same time.
  • the other database is a listing of mobile stations and the corresponding set of repeaters that last received the transmissions. If two mobile stations have overlapping sets, then it is possible for their acknowledgement packets to interfere when they simultaneously receive non-interfering data packets from different repeaters.
  • Switch 301 takes this information into account during scheduling and schedules downstream packets to the mobile stations to reduce the occurrence of mobile stations interfering with other when sending acknowledgment packets.
  • the information in these two databases may be collected by sending out test packets to the WLAN to determine which repeaters and mobile devices cause the interference described above.
  • the same databases used for downstream traffic scheduling may be used for upstream traffic scheduling to enable the switch to schedule upstream communications.
  • the switch is able to determine when parallel communication may take place based on the overlap described above.
  • This scheduling may be used to implement quality of service (QoS) where a period of time when traffic is scheduled is used (bypassing the CSMA algorithm).
  • QoS quality of service
  • RSSI Received Signal Strength
  • FIG. 5A illustrates one technique for location tracking by RSSI.
  • switch 301 obtains the RSSI for each packet received by the repeaters and may have multiple RSSI values for a packet when that packet is received by two or more different repeaters. More specifically, a mobile station communicates with two (or more) repeaters and one repeater is going to have a stronger received signal strength than the other for the same packet. Based on this information, switch 301 is able to determine that a mobile station is closer to one repeater than the other. By continually monitoring the received signal strength, switch 301 can track the movement of a mobile station with respect to the repeaters.
  • FIG. 5B is a flow diagram of one embodiment of a process for performing location tracking by a switch.
  • the process is performed by processing logic that may comprise hardware (circuitry, dedicated logic, etc.), software (such as is run on a general purpose computer system or a dedicated machine), or a combination of both.
  • the processing logic comprises a network processor in the switch (e.g., network processor 1206 of FIG. 12 ).
  • processing logic compares the RSSI for the duplicate packets received by different repeaters from a mobile station (processing block 550 ) and tests whether the repeater with the highest RSSI for the packet is the repeater listed as closest to the mobile station in a location tracking table (e.g., database) (processing block 551 ). If not, processing logic updates the table to indicate that the repeater that received the packet with the highest RSSI is the closest repeater (processing block 552 ). Processing logic also switches port assignment for the mobile station to the port of new repeater (if the port is different than the port of the previously assigned repeater).
  • a location tracking table e.g., database
  • the location tracking table may include a listing of mobile stations and their individually assigned repeaters.
  • the location tracking table may also be referred to herein as the active station list.
  • This table may also include, or include instead of the assigned repeater, an indication of the switch port by which the switch is to communicate with the repeater assigned to each mobile station.
  • FIG. 6 illustrates mobility supported by routing.
  • the dotted arrow path for communication from switch 301 to mobile station 601 through repeater 302 2 is the original communication path with the network.
  • switch 301 reroutes the packet to a different port. For example, if the first communication path illustrated as the dotted line arrow was on port 1 , switch 301 may switch the packet to port 5 , the port that associated with the communication path through repeater 302 1 .
  • the mobility is supported by simply moving a packet to a different port of switch 301 that is assigned to a different repeater. In such a situation, the mobility provisions of the 802.11 protocol may be ignored. Note that for embodiments where multiple repeaters are on the same port, the repeater MAC address may be changed instead of changing the port number.
  • switch 301 determines that a particular mobile station is closer to a different repeater (by monitoring the received signal strength of duplicate packets). As described above, switch 301 maintains a table (e.g., database, active station list, etc.) of all mobile stations in the 802.11 network and includes an indication of the repeater closest to each mobile station. Switch 301 performs port-based routing and may use the table in the same manner an IP routing table is used. Switch 301 has an Ethernet port for each repeater. When switch 301 determines that a mobile station is closer to a repeater that is different than the one listed in the database (based on the received signal strength of duplicate packets among multiple repeaters), then switch 301 updates the database. Thereafter, if a packet is received by switch 301 for that mobile station, switch 301 merely sends it out on the Ethernet port assigned to the repeater that was most recently determined to be the closest to that mobile station.
  • a table e.g., database, active station list, etc.
  • FIG. 7 illustrates one embodiment of a multi-switch system.
  • the network architecture includes switches 701 and 702 are communicably coupled to server 712 .
  • server 712 is part of a LAN backbone through which access to the Internet and other resources is made.
  • server 712 may act as an interface to another portion of the communication system.
  • Each of switches 701 and 702 is coupled to one or more repeaters in the same manner as described above with respect to FIG. 3 .
  • server 712 may exist within one of, or both, switches 701 and 702 .
  • FIG. 8 illustrates one embodiment of a protocol architecture.
  • switch 801 is shown having a network layer 801 A and a MAC layer 801 B.
  • the network layer 801 A comprises a TCP/IP network layer.
  • MAC sublayer 801 B communicates with a MAC sublayer of each of repeaters 802 1 - 802 N .
  • the 802.11 MAC layer is split between switch 301 and repeaters 802 1 - 802 N , and the MAC sublayer of the repeaters performs much less functionality than the MAC sublayer of the access points described above.
  • the repeater MAC sublayer is responsible for performing portions of the 802.11 protocol including handling CSMA/CA, DIFS/EIFS interframe spacing (IFS) timing, SIFS timing and control, generating acknowledgement (of ACK) frames (during transmit only) on data packets received, such as 802.11 data frames and generating CTS (clear-to-send) frames in response to RTS (request-to-send) frames.
  • the repeater MAC sublayer may also respond to the resetting of internal network allocation vectors (NAVs) which are embedded into certain frames (e.g., RTS and CTS frames).
  • NAVs network allocation vectors
  • each of repeaters 802 1 - 802 N includes an 802.11 physical layer or other wireless physical layer.
  • the switch MAC sublayer is responsible for handling multiple frame types during reception from the repeaters.
  • the MAC frame types the switch is capable of handling include an association request, reassociation request, probe request, ATIM, disassociation, authentication, deauthentication, PS-Poll, CTS (updates NAV in repeaters), ACK (in response to data frames), data and Null frames.
  • the switch MAC frame types that are accommodated during transmission include an association response, a reassociation response, probe response, ATIM (announcement traffic indication message), disassociation, deauthentication, PS-Poll, data frames, Null frames, RTS (updates NAV in repeater), and beacon frames.
  • ATIM announcement traffic indication message
  • disassociation deauthentication
  • PS-Poll data frames
  • Null frames Null frames
  • RTS updates NAV in repeater
  • FIG. 9A illustrates an embodiment of a switch.
  • exemplary switch 900 includes session management unit 901 , protocol unit 902 , location tracking unit 903 , fragmentation unit 904 , DCF (distributed coordination function) unit 905 , packet de-duplication unit 906 and SNMP (simple network management protocol) unit 907 . Some of these units may be implemented within the corresponding MAC layer of the switch.
  • session management unit 901 which may be a part of the switch management entity (SwME), is responsible for handling initial handshakes with one or more repeaters and the associated mobile devices, including, but not limited to authentication, association, and disassociation, etc.
  • SwME switch management entity
  • protocol unit 902 handles a variety of network protocols including 802.11 wireless protocol, RADIUS, VPN (virtual private network) protocol, as well as other wireless protocols, such as, for example, 802.15 (wireless personal area network or WPAN, also referred to as Bluetooth) protocol or 802.16 (broadband wireless metropolitan area network) protocol.
  • 802.11 wireless protocol RADIUS
  • VPN virtual private network
  • other wireless protocols such as, for example, 802.15 (wireless personal area network or WPAN, also referred to as Bluetooth) protocol or 802.16 (broadband wireless metropolitan area network) protocol.
  • Location tracking unit 903 is responsible for tracking one or more mobile stations communicating with one or more repeaters using one of the aforementioned mechanisms shown in FIGS. 5A and 5B .
  • location tracking unit 903 obtains the RSSI for each packet received by the repeaters and may have multiple RSSI values for a packet when that packet is received by two or more different repeaters. More specifically, a mobile station communicates with two (or more) repeaters and one repeater typically has a stronger received signal strength than the other for the same packet. Based on this information, location tracking unit 903 is able to determine that a mobile station is closer to one repeater than the other. By continually monitoring the received signal strength, location tracking unit 903 tracks the movement of a mobile station with respect to the repeaters.
  • location tracking unit 903 may automatically perform an operation similar to a site survey and may reconfigure the communication network, which will be described in details further below.
  • location tracking unit 903 may notify session management unit 901 to perform such operations.
  • location tracking unit 903 may further detect whether an interference between multiple mobile stations exists and may signal session management unit 901 to perform further action, such as, for example, queuing and rescheduling of requests, such that multiple mobile stations may be able to share a communication channel (e.g., single frequency band), which will be described further below.
  • a communication channel e.g., single frequency band
  • Fragmentation unit 904 is responsible for fragmenting packets to improve performance in the presence of RF interference detected using one of the aforementioned processes.
  • the use of fragmentation can increase the reliability of frame transmissions. By sending smaller frames, collisions are much less likely to occur.
  • the fragment size value may be typically set between 256 and 2,048 bytes. However, this value may be user controllable via, for example, a user interface of session management unit 901 .
  • DCF unit 905 is responsible for handling DCF functionality according to 802.11 specifications.
  • DCF unit 905 typically operates based on the CSMA/CA (carrier sense multiple access with collision avoidance) protocol.
  • CSMA/CA carrier sense multiple access with collision avoidance
  • typical 802.11 stations contend for access and attempt to send frames when there is no other station transmitting. If another station is sending a frame, the stations wait until the channel is free.
  • DCF unit 905 may signal session management unit 901 to queue up the frames and reschedule to processing of these frames to avoid interference.
  • mobile stations do not need to worry about interference and wait for a free channel, which leads to a wider bandwidth of the network.
  • switch 900 may receive multiple identical packets from multiple repeaters because the corresponding mobile station may send the same packet to multiple repeaters within a coverage area.
  • the switch may broadcast the packet to the rest of the repeaters.
  • switch 900 may invoke packet de-duplication unit 906 to de-duplicate the duplicated packets and only one of multiple instances of the same packet gets broadcasted.
  • SNMP unit 907 performs typical network management operations well known in the art.
  • SNMP is a protocol governing network management and the monitoring of network devices and their functions. It is not necessarily limited to TCP/IP networks.
  • FIG. 9B illustrates an embodiment of a MAC sublayer of a repeater.
  • the repeater MAC sublayer 908 is responsible for performing portions of the 802.11 protocol including handling CSMA/CA, DIFS/EIFS interframe spacing (IFS) timing, SIFS timing and control (block 912 ), generating acknowledgement (of ACK) frames (during transmit only) on data packets received, such as 802.11 data frames (block 911 ) and generating CTS (clear-to-send) frames in response to RTS (request-to-send) frames.
  • CSMA/CA DIFS/EIFS interframe spacing
  • SIFS timing and control block 912
  • generating acknowledgement (of ACK) frames (during transmit only) on data packets received, such as 802.11 data frames (block 911 ) and generating CTS (clear-to-send) frames in response to RTS (request-to-send) frames.
  • the repeater MAC sublayer may also respond to the resetting of internal network allocation vectors (NAVs) which are embedded into (e.g., RTS and CTS frames) (block 910 ).
  • NAVs network allocation vectors
  • Each of the above repeater MAC functions may be implemented in a manner that is well-known is the art.
  • FIG. 10 illustrates one embodiment of a hardware architecture for a repeater.
  • an RF chip 1002 receives and transmits RF transmissions using antenna 1003 .
  • RF chip 1002 comprises a standard 802.11 RF chip.
  • antenna 1003 comprises a dual-diversity antenna. Communications received by RF chip 1002 are forwarded on to baseband processor 1001 , which is a digital chip that is described in further detail below. Similarly, transmissions to be sent are received by RF chip 1002 from baseband processor 1001 .
  • Baseband processor 1001 is a digital chip that performs the reduced MAC functions as described above.
  • the repeater also includes a port 1007 for coupling to a switch, such as switch 301 .
  • Baseband processor 1001 handles communication with switch 301 using port 1007 .
  • port 1007 also transfers information (through the port) at 100 Mb/s bits per second.
  • Port 1007 may also provide power to baseband processor 1001 .
  • a desktop port 1006 may be included to allow desktop or other systems to plug into the repeater.
  • LEDs 1005 such as an activity LED, power LED, and/or link LED, may be included in the repeater as well.
  • FIG. 11 is a block diagram of one embodiment of the baseband processor of a repeater.
  • Baseband processor 1001 includes a repeater MAC and control unit 1105 that interfaces with RF chip 1002 using a protocol.
  • the interface comprises a TCP/IP layer and an 802.11 MAC sublayer.
  • the repeater MAC/control unit 1105 is coupled to switch 1103 .
  • MAC/control unit 1105 communicates with switch 1103 using a TCP/IP layer and an 802.11 MAC sublayer tunneled inside Ethernet packets.
  • Switch 1103 is also coupled to MAC/PHY layer unit 1104 which interfaces the baseband processor to desktop port 1006 .
  • Switch 1103 is also coupled to the activity/power/link LEDs 1005 .
  • switch 1103 is coupled to the MAC/physical layer unit 1001 that interfaces the rest of the components on baseband processor 1001 to switch port 1007 via switch 1103 .
  • a power distribution unit 1102 is also coupled to switch port 1007 .
  • power distribution unit 1102 obtains power from the CATS wiring and provides it to the rest of baseband processor 1001 .
  • FIG. 12A is a block diagram of one embodiment of a switch.
  • the switch includes one or more ports 1201 to repeaters 1201 . Although 12 are shown, any number may be included. Ports 1201 are coupled to a switching processor 1202 .
  • switching processor 1202 switches 13 ports of gigabit Ethernet and allows broadcast packets to be received on one port and broadcast on the others without involving the rest of the switch.
  • switching processor 1202 comprises a BRCM 5633 gigabit switching processor from Broadcom Corporation of Irvine, Calif.
  • HyperTransport controller 1203 is coupled to switching processor 1202 and provides a gigabit Ethernet interface to the rest of the switch architecture.
  • the HyperTransport controller 1203 includes a diagnostic port 1204 and another Ethernet port 1205 for use, for example, in coupling to a corporate LAN.
  • HyperTransport controller 1203 comprises a Gallileo HyperTransport controller from Marvell of Sunnyvale, Calif.
  • a network processor 1206 is coupled to HyperTransport controller 1203 and performs the majority of the functions of the switch, including the receiver diversity functions and location-tracking functions described herein, with the exception of the rebroadcast of the broadcast packets received by the switch, which is handled by switching processor 1202 .
  • network processor 1206 is coupled to a boot memory 1209 , a DRAM 1207 and one or more LEDs 1208 .
  • network processor 1206 comprises a PMC-Sierra RM9000X2 sold by PMC-Sierra of Santa Clara, Calif.
  • boot memory 1209 comprises an MB boot flash AMD AM29LV640D boot flash memory
  • DRAM 1207 comprises 64 MB synchronous DRAM (SDRAM) from Advanced Micro Devices, Inc. of Sunnyvale, Calif.
  • network processor 1206 includes a PCI interface to a processor 1210 .
  • Processor 1210 may host certain applications, such as, for example, firewall applications.
  • Processor 1210 may perform these functions with the use of hard disk 1211 , DRAM 1213 and console port 1211 .
  • DRAM 1213 may store the active stations list and the access control list described herein.
  • Console port 1211 may provide access to a monitor or keyboard or other peripheral device.
  • processor 1210 comprises a Pentium Processor manufactured by Intel Corporation of Santa Clara, Calif.
  • network processor 1206 executes software instructions, which performs the 802.11 MAC layer.
  • Network processor 1206 may also execute a wireless LAN configuration module to configure the wireless LAN network, a priority traffic administration (e.g., traffic shaping) module, a management software (e.g., Cisco IOS), a security protocol (e.g., 802.1x) module, and a VPN/firewall module.
  • Processor 1210 executes a location tracking module to perform the location tracking.
  • Processor 1210 may also execute one or more of the following software modules: clustering/HA, RADIUS/DHCP (remote authentication dial-In user service/dynamic host configuration protocol), session mobility, third party applications, XML (extensible markup language) Web services, user administration software, and network management software.
  • a technique described herein allows for the performance of an automatic site survey to reconfigure the wireless communication network.
  • the repeaters in essence cause their own reconfiguration by providing information to the switch that the switch uses to determine whether reconfiguration is necessary.
  • one or more repeaters may change their state from activated, deactivated, or hot standby to another state and/or change their transmitter power level and/or receiver sensitivity.
  • a repeater When in the activated state, a repeater is able to receive packets from sending devices (e.g., mobile devices in the network) and transmit packets to those devices.
  • a repeater When in the deactivated state, a repeater is not able to receive packets from nor transmit packets to other devices (e.g., mobile devices in the network).
  • a repeater When in the hot standby state, a repeater is able to receive packets from sending devices but not transmit packets to those devices. It is possible that a repeater may not change its state as part of the reconfiguration process, but may change its transmit power level and/or its receiver sensitivity.
  • Reconfiguration may also occur by having one or more repeaters change their channel numbers.
  • the reconfiguration of the network includes turning on and off repeaters and adjusting transmitter power levels and receiver sensitivity.
  • the reconfiguration occurs periodically.
  • Reconfiguration may occur after a predetermined period of time (e.g., an hour) or a predetermined amount of activity.
  • the reconfiguration may occur in response to an event. For example, if the activity of a repeater receives a predetermined number of packets within a predetermined period of time or the rate of packet reception increases by a predetermined amount, then the reconfiguration may be performed.
  • the event may comprise a mobile station entering a particular location (e.g., a conference room) where a repeater is located and not on (thereby causing the system to be reconfigured to have the repeater activated).
  • a particular location e.g., a conference room
  • an alarm in the switch is triggered, causing the switch to run the reconfiguration process.
  • FIG. 12B is a flow diagram of one embodiment of a process for reconfiguring the wireless communication system.
  • exemplary process 1250 begins by each repeater that is activated or in the hot standby state sending the received signal strength indication, as set forth above, along with the SNR for each packet received cleanly to the switch (processing block 1251 ).
  • the received signal strength and SNR may be determined on a packet-by-packet basis.
  • communications between the repeater(s) and the switch(es) occur via a wired connection (e.g., an Ethernet connection) and/or may be through a level 2 network. Note that in another embodiment, such communications may be performed, at least in part, wirelessly using a different protocol than the protocol used between the mobile stations and the repeaters.
  • the switch In response to sending the packet(s), the switch receives the packet(s) (processing block 1252 ) and determines the amount of wireless communication activity each repeater is experiencing (processing block 1253 ).
  • the repeater receives a packet and embedded in the packet header is the Ethernet MAC address of the mobile station.
  • the switch forwards that packet to the switch, it attaches the received signal strength and SNR values.
  • the switch is able to open up the packet and determine that the packet is from another unique 1P address and, thus, another unique user. Based on this, the switch determines the density of unique users on a particular repeater. In other words, the switch determines the number of unique users (mobile stations) sending packets that are being received by an individual repeater.
  • the switch may use a database to maintain this information. This database may be the location tracking database described above.
  • the switch determines which repeaters to activate, deactivate, or move to the hot standby state (processing block 1254 ).
  • the switch also determines the transmitter power levels for the repeaters that are activated (processing block 1255 ).
  • the transmitter power levels are the power levels used by the repeaters when transmitting packets wirelessly to other devices in the network.
  • the switch may also adjust the receive sensitivity of one or more of the repeaters (processing block 1256 ).
  • the switch may also adjust the channel numbers of one or more repeaters. In one embodiment, the switch causes these changes to be made by sending control commands to the repeater over, for example, a wired connection (e.g., the Ethernet connection).
  • the switch determines that a particular repeater is to be activated (the repeater can receive and transmit), deactivated (the repeater cannot receive nor transmit), or placed in hot standby mode (the repeater can receive but cannot transmit), that changes to the repeater's transmitters power level and/or the repeater's receiver sensitivity, or that changes to the repeater's channel number are necessary, then the switch sends a command to the repeater specifying the desired action.
  • the switch activates the repeater if the number of unique users being received cleanly by a repeater in a hot standby state is above a threshold.
  • This reconfiguration process has a number of advantages over the prior art. For example, as part of the reconfiguration process in the prior art, an access point may have to be moved. This is because there are typically no additional access points in the area that are not already being used because of their expense. In contrast, because repeaters are generally cheaper devices, many more of them may be distributed throughout the network, even though they are not going to be used all the time. Thus, when there is a need for additional capacity, one of the repeaters that is not currently activated can be activated.
  • the reconfiguration of the wireless communication system may include changing the transmit power levels of the mobile stations.
  • the purpose of this reconfiguration of the mobile station is to improve network capacity.
  • the improvement to network capacity may be due to a reduced interference to repeaters and other mobile stations in adjacent coverage cells that a mobile station causes because its transmit power level is changed.
  • the reconfiguration of the mobile stations may occur in response to the switch examining the interference in a particular area and comparing this interference with a predetermined amount of interference (e.g., a threshold).
  • the predetermined amount of interference may be based on an allowable amount of interference for the wireless communication system or an allowable amount of variance from the allowable amount of interference.
  • the switch determines the amount to change the transmit power level. In order to determine the amount of change to a particular transmit power level, the switch initially determines what the current transmit power level is. In one embodiment, the switch sends a query as a control message to the mobile station to obtain the transmit power level of the mobile station. Alternatively, the switch maintains a list (e.g., a database) of the transmit power levels of the mobile stations and accesses the list to obtain the transmit power level for a particular mobile station. The switch may obtain this information from the mobile stations. In addition, the switch might also send a command to the mobile station to modify its power level on a percentage basis. This would not require the knowledge of a specific power level. For example, in one embodiment, the mobile stations send a control message to the switch at boot-up indicating their transmit power levels.
  • the switch determines the amount to change the transmit power level. This may be based on the received signal strength (e.g., RSSI) of the packets received by the repeater currently assigned to the mobile station. For example, if the received signal strength is very high, yet the mobile station is causing interference (e.g., its packets are being received by one or more other repeaters), the switch may cause the mobile station to reduce its transmit power level to a predetermined level or by a predetermined amount (e.g., a percentage of its current transmit power level) because the effect of such a reduction would not prevent its packets from being received by its assigned repeater.
  • a predetermined amount e.g., a percentage of its current transmit power level
  • the change in the transmit power level may be performed in a number of ways.
  • the switch controls the transmit power level of the mobile station(s).
  • the switch may send a command message to the mobile station, via a repeater, to cause the mobile station to adjust its transmit power level.
  • the command could indicate that the mobile station should increase or decrease its transmit power level.
  • such a command could come from a repeater or a control entity in the communication system other than the switch.
  • FIG. 13 is one embodiment of a distributed MAC architecture.
  • the 802.11 MAC layer is distributed between the switch and a number of the repeaters connected to the switch. On one side, the MAC is terminated on the switch and on the other side the MAC is terminated on the repeaters.
  • the distributed architecture is “one to many” relationship.
  • the MAC sublayer on the repeater is engaged in performing real time functions related to the time synchronization (BEACON, PROBE request/response processing), receiving and transmitting 802.11 frames, including acknowledgment of the received frames.
  • BEACON time synchronization
  • PROBE request/response processing PROBE request/response processing
  • the MAC sublayer on the switch is centralized and controls multiple repeaters.
  • the MAC sublayer on the switch includes centralized management of the mobile stations and handles mobile stations in power save mode.
  • the switch runs multiple instances of the MAC sublayer on the switch.
  • the switch may support multiple, separate logical groupings of repeaters on the switch.
  • Each grouping may be based on channel frequency such that each group is associated with a particular frequency.
  • the frequency need not be unique to all the frequencies of all the groupings (e.g., some groups use the same frequency and other groups do not use that frequency).
  • the groupings may be created based on channel numbers.
  • the architecture offers flexibility when configuring the wireless communication system and individual embodiments that allows at least one of the following benefits.
  • the roaming of the stations is easy to control.
  • the management of mobile stations in power save mode is centralized. That is, the frames for the mobile stations in power save mode are buffered in the MAC sublayer on the switch and can be exchanged between other instances of the MAC sublayer on the same switch (between MAC instances) when the mobile station in power save mode is roaming.
  • each of the units may be implemented in hardware, software, or a combination of both.
  • Data_SAP unit 1301 exchanges messages with the LLC (logic link control) layer, conveying MSDUs (MAC service data units) from and to the LLC layer.
  • Fragmentation unit 1302 performs fragmentation of outgoing MPDUs and MMPDUs (MAC management protocol data units).
  • the fragmented PDU packet data unit
  • MMPDUs MAC management protocol data units
  • Power save unit 1303 performs power save device management, including TIM (Traffic Indication Map) management, in which TIM is sent to the repeaters periodically.
  • the repeaters use the updated TIM for buffering of unicast MPDUs for mobile stations in power save mode.
  • the switch maintains buffered unicast PDUs for all mobile stations in power save mode. Broadcasts and multicast PDUs are not buffered at the switch and are sent to the repeaters to be sent out immediately after any beacon containing a TIM element with a DTIM (delivery traffic indication message) count field with a value of O.
  • Power save unit 1303 also performs PS-Poll request and response handling.
  • Routing unit 1305 routes data frames to MAC Data SAP (service access point) unit 1301 and management inbound frames to management_SAP unit 1309 .
  • De-fragmentation unit 1304 performs de-fragmentation of inbound frames.
  • Management SAP unit 1309 includes an interface to MIB (management information base) unit 1308 and MLME (MAC sub-layer management entity) service unit 1307 .
  • MLME services unit 1307 handles the incoming associate and re-associate frames, as well as disassociate requests, and processes authentication and de-authenticate requests and generates authentication and de-authenticate response frames.
  • MIB management unit 1308 performs get and set functions to get and set parameters of the repeater and performs reset functions to reset all the parameters of a repeater and return the parameters to default values.
  • the above processes may be performed using a tunneling protocol between a switch and the respective repeater.
  • both MPDUs and MMPDUs frames between the switch and the repeater are transferred by the tunneling protocol.
  • the 802.11 frames are encapsulated into Ethernet frames.
  • the tunneling protocol header is placed after the Ethernet header. This protocol transfers both data and management frames as well as special defined tunneling protocol control messages.
  • transmit unit 1311 transfers frames from MAC to PHY transmitter, generates FCS (frame check sequence), inserts timestamps in the beacons and probe responses, performs DCF timing (SIFS, DIFS, EIFS), handles ACK, RTS, CTS, and performs a back-off procedure.
  • FCS frame check sequence
  • SIFS DCF timing
  • DIFS DIFS
  • EIFS DCF timing
  • Receive unit 1312 transfers frames from PHY to MAC, receives the MPDUs from the PHY, calculating and checking the FCS value (frames with valid FCS, length and protocol version are sent for receive filtering). Receive unit 1312 also filters valid received frames by destination address, and BSSID (basic service set identification) for group destination addresses, as well as handles ACK, CTS and RTS. Other functions include detection of duplicated unicast frames, updating the NAV (network allocation vector) using Duration/ID value from 802.11 frames, maintenance of the channel state based on both physical and virtual carrier sense, time slot reference generation, and providing Busy, Idle & Slot signals to transmission.
  • FCS value frames with valid FCS, length and protocol version are sent for receive filtering
  • BSSID basic service set identification
  • Other functions include detection of duplicated unicast frames, updating the NAV (network allocation vector) using Duration/ID value from 802.11 frames, maintenance of the channel state based on both physical and virtual carrier sense, time slot reference generation, and providing Busy, Idle
  • Synchronization unit 1313 processes the MLME start request in which it starts a new BSS (basic service set) and set all parameters for a beacon frame. Synchronization unit 1313 generates beacon frames periodically and handles Probe request and response frames.
  • BSS basic service set
  • Repeater management unit 1314 relays all MIB set/get requests, start requests, reset requests, request/confirm characteristic commands to a proper block on the repeater.
  • the switch contains the switching and management planes.
  • FIG. 14 illustrates one embodiment of the switching plane.
  • the switching plane 1400 contains the switch MAC sublayer 1402 (i.e., the upper MAC), a switch management entity (SwME) 1401 and a switching layer 1403 .
  • the switching layer 1403 interfaces with the Ethernet drivers 1404 and performs the switching function.
  • the Ethernet drivers 1404 are connected to the 10/100 BT ports of the switch (PORT 1 to PORT 24 ) or connected to another Ethernet switch with its uplink connected to the Gigabit interface 1406 on the switch.
  • the simulator 1405 may also be connected to the any of these ports.
  • the tunneling protocol header contains the number of the Ethernet port assigned for use with the repeater repeater (repeater 1704 in this example) handling the destination station (station 1705 in this example).
  • Switch MAC sublayer 1703 encapsulates the 802.11 data frames into Ethernet frames and sends them to repeater 1704 .
  • Repeater 1704 receives the encapsulated 802.11 data frames and sends the 802.11 data frames to station 1705 .
  • FIG. 18 illustrates an exemplary process for transferring data traffic from a desktop computer system to a mobile station.
  • computer system 1806 encapsulates IP packets into Ethernet frames.
  • the router starts an ARP (address resolution protocol) procedure in order to obtain the corresponding MAC address.
  • Router 1805 sends an ARP request to switch MAC sublayer 1804 to request the MAC for this IP broadcast.
  • Switch MAC sublayer 1804 encapsulates the ARP request into an 802.11 packet and then encapsulates this packet into an Ethernet packet, essentially creating a new Ethernet frame with an embedded 802.11 MAC header and tunneling protocol header.
  • Switch MAC sublayer 1804 broadcasts this packet to all repeaters, repeaters 1802 - 1803 in this example, which then rebroadcast it for the desired mobile station to receive.
  • the mobile station, station 1801 with the IP address contained in the ARP request sends an ARP response with its MAC address.
  • Repeater 1802 receives the ARP response and encapsulates the 802.11 frames into Ethernet frames, adding an Ethernet frame header and tunneling protocol header.
  • Repeater 1802 sends the encapsulated ARP response to switch MAC sublayer 1804 , which strips off the 802.11 MAC header and switches the Ethernet frame with encapsulated ARP response packet to the backbone port.
  • the router takes the station MAC address from the ARP response and routes all IP packets for this mobile station as described above. Since the switch MAC sublayer has the configuration information about MAC and IP addresses, the ARP response could come from the switch.
  • management procedures include starting up the switch, resetting the MAC, starting a new BSS, synchronization, authentication, and de-authentication, association, disassociation and re-association.
  • the switch is started by the switch management entity (SwME).
  • SwME switch management entity
  • the SwME issues commands to the switch MAC sublayer on the switch.
  • the commands intended for the repeaters are transferred using the tunneling protocol. Layers of the tunneling protocol are running on the switch and the repeaters.
  • the switch and repeaters cooperate to perform a reset of the MAC. Since the MAC is distributed between the switch and repeaters, the reset process is modified to support this architecture.
  • the switch management entity sends a reset request to each of the repeaters as part of a tunneling protocol process and receives a reset response indicating if the reset was successful.
  • the reset process may set the MAC to initial conditions, clearing all internal variables to the default values. MIB (management information base) attributes may be reset to their implementation-dependent default values.
  • the switch management entity requests that the MAC entity start a new BSS.
  • the switch management entity generates the request to start an infrastructure BSS (basic service set) with the MAC entity acting as an access point and sends it to all MAC entities where the switch is acting as a multiple access point.
  • Each repeater responds with an indication as to whether the start process was successful.
  • the synchronization process determines the characteristics of the available BSSs and allows for synchronizing the timing of a mobile station with a specified BSS (switch MAC entity).
  • the synchronization process begins with an instance of the switch MAC sublayer generating a beacon frame, which is encapsulated and sent to the repeaters periodically.
  • the repeater updates the timestamp of the beacon frame before sending the beacon frame in the air.
  • the mobile station Based on the beacon frame, the mobile station synchronizes its timers.
  • the switch management entity also causes authentication to establish a relationship between a station MAC sublayer and the instances of the switch MAC sublayers.
  • a mobile station is authenticated if its MAC address is in the access list on the switch.
  • de-authentication is supported to invalidate an authentication relationship with a switch MAC entity.
  • de-authentication is initiated by the mobile station.
  • the instance of the switch MAC sublayer on the switch associated with the repeater assigned to the mobile station updates the station state as maintained by the switch. The result of de-authentication is that the state of the mobile station is listed in the switch as unauthenticated and unassociated.
  • Data frames for a mobile station are forwarded from the repeater that has the token for the mobile station.
  • a repeater without the token receives the data frames, it forwards only a short frame with the RSSI (in the tunneling protocol header) to the switch.
  • the switch keeps track of the RSSI for the mobile station. If the repeater without the token has better reception and if the repeater with the token has “high” error rate, the switch may re-assign the token.
  • the RSSI and token are part of the tunneling protocol header. The token assignment occurs within the association process.
  • FIG. 19 is a data flow diagram of one embodiment of an association and token assignment process.
  • an association request is generated by a mobile station and sent by the mobile station, via the mobile station MAC.
  • Repeater 2 has the token for the mobile station. Therefore, repeater 2 encapsulates the association request, along with is RSSI and BSSID, into an Ethernet packet and sends the encapsulated packet to the switch.
  • Repeater 1 which does not have the token for the mobile station, forwards a short frame with the RSSI in the tunneling protocol header.
  • the switch takes the RSSIs for the two identical frames and determines which one is stronger. Based on which is stronger, the switch either allows the repeater that has the token and station MAC for the mobile station to keep them (e.g., repeater 2 ) or reassigns them to the repeater with the higher RSSI (e.g., repeater 1 ). In either case, the switch sends an association response encapsulated in an Ethernet packet with the token and association ID to the repeater, which de-encapsulates it and forwards it to the mobile station, via the mobile station MAC.
  • the switch sends an association response encapsulated in an Ethernet packet with the token and association ID to the repeater, which de-encapsulates it and forwards it to the mobile station, via the mobile station MAC.
  • FIG. 20 is a block diagram of two MAC sublayer instances in a switch.
  • two (or more) instances of the switch MAC sublayer run on the switch (offering the access points (APs) inside the same switch).
  • Each instance has its own BSSID (basic service set identification) (e.g., the MAC address of the MAC instance).
  • Both MAC instances are managed by the same switch management entity (SwME).
  • the SwME manages these as multiple access points (APs) inside the switch.
  • communication between MAC instances is through the SwME.
  • Both MAC instances as well as the switch management entity (SwME) reside on the same switch.
  • the SwME has knowledge of all MAC instances and is involved in this communication.
  • the switch acts as a distribution system containing multiple switch MAC sublayer instances (multiple logical access points) in which roaming is centralized in the switch.
  • the association request from the mobile station is encapsulated and sent by the repeater to the switch.
  • the association request with the BSSID of the first MAC sublayer instance is sent from the second MAC sublayer instance through the SwME to the first MAC sublayer instance.
  • the first MAC sublayer instance generates a response representing that mobile station has been already associated with the first MAC sublayer instance.
  • the station does not have to go again through authentication procedure and it can be automatically associated with the second MAC sublayer instance.
  • the second MAC sublayer instance receives the response, the station becomes associated with the second MAC sublayer.
  • the switch acts as a complete distribution system with multiple logical access points.
  • a station when a station roams between two MAC sublayer instances (logical access points) inside one distribution system, there is only one repeater controlled by one MAC sublayer instance.
  • a mobile station can roam from one repeater to another repeater controlled by the same MAC sublayer instance (logical access point) without a need to associate again, and only the token re-assignment procedure described herein has to be performed.
  • the station is not aware of the token re-assignment procedure.
  • a mobile station moves from one repeater belonging to one logical access point (one MAC sublayer instance) to a second repeater belonging to a second logical access point (second MAC sublayer instance), the station has to be re-associated and the token re-assignment procedure has to be performed.
  • the handover procedure is performed in the switch. Again, the station is not aware of any token assignment procedures.
  • mobile stations are associated with switch MAC sublayers instances not with a repeater. If a station is controlled by a repeater, the repeater has a token for that station. All repeaters controlled by a particular MAC sublayer instance are associated with a station if the station is associated with that MAC sublayer instance, and only one repeater has a token for that station.
  • a user can configure the switch to have any number of MAC instances. In one embodiment, this is configured using a parameter. Also configurable is which repeater belongs to MAC instance. For example, if the switch has 64 ports, it can be configured to act as 8 access points (8 upper MAC instances running concurrently), with 8 repeaters per access point (one upper MAC sublayer controlling 8 repeaters).
  • FIG. 21 is a data flow diagram of one embodiment of a re-association process.
  • a mobile station SME station management entity
  • a repeater repeater 4 in this case, along with its BSSID via the mobile station MAC.
  • the mobile station knows that it needs to make a re-association request because it has received a BEACON frame with different BSSID (i.e., a different MAC instance), indicating that the mobile station had been roaming.
  • the repeater receives the re-association request, encapsulates the packets of the re-association request with the RSSI into an Ethernet packet, and sends the Ethernet packet to the instance of the switch MAC sublayer associated with the repeater.
  • the instance of the switch MAC sublayer generates an indication to the switch management entity indicating that a re-association request has been made.
  • the switch management entity In response to the indication, the switch management entity causes a new AID (association id) to be assigned to the mobile station, a token for the mobile station to be assigned to a new repeater, and the previous token assignment to be deleted.
  • the association identifier (AID) is a number (value between 0 and 2007) assigned to a mobile station by the switch or an access point during the association procedure. It is an 802.11 standard defined parameter.
  • the switch management entity updates the entry for the mobile station in the access list, including setting the new access point address to the address of the instance of the switch MAC sublayer associated with the repeater.
  • the switch management entity also assigns a token and an association ID.
  • the switch management entity sends a delete token command to the instance of the switch MAC layer associated with the repeater previously assigned to the mobile station, which the instance of the switch MAC layer forwards to the repeater (repeater 3 in this case).
  • the instance of the switch MAC sublayer (upper MAC 2 in this case) associated with the repeater that forwarded the re-associate request (repeater 4 in this case) sends a re-associate response frame to the repeater with the token, association ID, and an indication that the re-association was successful.
  • the repeater de-encapsulates the packet, stores the mobile station MAC token, and forwards the de-encapsulated re-associate response frame to the mobile station MAC with the association ID and the successful indication.
  • a mobile station may request disassociation with a specified peer MAC entity that is acting as a logical access point. The mobile station may request this due to inactivity or because a switch is unable to handle all currently associated mobile stations, etc.
  • FIG. 22 is a flow diagram on one embodiment of a disassociation process. Referring to FIG. 22 , a disassociation request is generated by the SME (station management entity) on the mobile station and sent by the mobile station MAC as a disassociate request frame with the BSSID (i.e., the instance identifiers).
  • the BSSID is a basic service set identifier representing the MAC address of an upper MAC instance.
  • Each repeaters that receives the disassociate request frame without errors encapsulates it with its RSSI and forwards it to the switch, regardless of whether it has the token for the mobile station.
  • the switch MAC sublayer determines whether the mobile station is in the access list and changes the state of the mobile station in the access list to authenticated and unassociated, removes all parameters from the access list entry for the mobile station, and deletes the token and association M.
  • the access list is a dynamically created hash table containing records for all authenticated stations, in which each record contains a station MAC address, association identifier, BSSID, a station state, and a repeater port number which has station token.
  • the state of the mobile station is updated and its AID is deleted.
  • the switch then sends a disassociate response frame encapsulated in an Ethernet frame to the repeater having the token.
  • Embedded in the tunneling protocol header of the frame is a tunneling protocol command to delete the token, which causes the repeater having the token to delete the token.
  • the repeater that deleted the token sends the de-encapsulated disassociate response frame to the MAC of the mobile station with an indication that disassociation was successful.
  • this process can be initiated by the switch management entity. This can happen if the switch decides to disassociate the mobile station because of inactivity or because a switch is unable to handle all currently associated mobile stations.
  • a technique is disclosed herein that tracks when a mobile (or fixed) station is attempting to connect to the network over more than a predetermined number (e.g., one) of station interfaces. That is, the technique determines whether a user is trying to connect over more than a predetermined number of interfaces (e.g., 1, 2, 3, etc.) and if a connection is attempted that would cause the station to be connected to the network through a number of interfaces larger than the allowed limit, then action(s) may be taken against the station (e.g., disable one or more connections, deny a connection, etc.).
  • the station will be described as a mobile station. However, in an alternative embodiment, the station is fixed.
  • the technique includes a switch allowing a mobile station to have one connection to a network over a first of its interfaces. Thereafter, the switch determines that the mobile station is attempting to have a second connection to the network over a second interface other than the first interface.
  • the first interface is a wireless interface for communicating to a repeater using, for example, an 802.11 communication channel
  • the second interface is a wired interface, such as, for example, a wired Ethernet cable.
  • the switch makes the determination by checking memory associated with the mobile station to see if the two interfaces belong to the same mobile station.
  • the switch access a memory, local or remote, storing a table, or list, of mobile stations along with a list of the interfaces available for each of the listed mobile stations.
  • the list of mobile stations is a table (e.g., an access control list) and the switch searches the locations in the table to determine if media access control (MAC) addresses of the first and second interfaces are listed as belonging to the mobile station.
  • the access control list includes an entry for each mobile station with multiple columns (or rows) for MAC addresses, one for each interface that the mobile station has with a MAC address.
  • the switch enforces a security policy in response to determining that a mobile station is attempting to connect to the network over one interface when already connected over another interface.
  • the security policy may permit connection to the network through multiple interfaces.
  • the security policy may not permit connection to the network through multiple interfaces of the same mobile station.
  • the switch in response to such a case, may deny the new connection that is being attempted, may deny the previous connection that already exists (in favor of the new connection), or may deny both connections. For more than two interfaces in the station, a more complex admission control algorithm may be used.
  • the switch in order to deny the new connection, the switch disables the MAC address associated with the interface attempting to connect to the network, and in order to deny the previously existing connection, the switch may remove the MAC address associated with the interface that is already connected to the network from a list of active stations (e.g., the active stations list).
  • the switch uses an access control list and the active stations list.
  • the access control list is where the security policy is enforced, while the active stations list is the list of all mobile stations currently active in the system.
  • Each mobile station that may potentially have a connection to the network is listed in the access control list.
  • For each interface of a mobile station that has a connection to the network there is a MAC address in the active stations list.
  • the controller of the switch searches the access control list for the MAC address. If the MAC address is not in the access control list, the controller of the switch denies access.
  • the controller finds the MAC address in the access control list, the controller finds the security policy in the entry in the access control list associated with the MAC address to determine what security policy, if any, is supposed to be enforced. This means that the access control list records which interfaces are active.
  • the switch To deny a connection for an interface already connected to the network, the switch removes the MAC address for the interface from the active stations list. This action causes process is performed by the switch. Referring to FIG. 23A , the process begins by processing logic allowing a mobile station a connection to the network over a first interface (processing block 2301 ). Next, processing logic determines the mobile station is attempting to have another connection over a second interface (processing block 2302 ). In response, processing logic enforces a security policy (e.g., allows it, denies one or more of the connections, prevents the mobile station from accessing the network, etc.) (processing block 2303 ).
  • a security policy e.g., allows it, denies one or more of the connections, prevents the mobile station from accessing the network, etc.
  • FIG. 23B An alternative embodiment of the switch of FIG. 12A is shown in FIG. 23B .
  • a switch controller 2310 is coupled to ports 2311 and memory 2312 .
  • Switch controller 2310 performs the process described in FIG. 23A and above regarding the monitoring of connections and requests for connections.
  • Switch controller 2310 uses ports 2311 to communicate with the repeaters in the system as well as other devices, via, in one embodiment, a wired Ethernet connection.
  • Memory 2312 stores the active stations list 2314 and the access control list 2313 .
  • Active stations list 2314 includes a table having an entry for each mobile station and fields (e.g., columns, rows, etc.) to store the MAC address of each interface the mobile station has.
  • Access control list 2313 includes entries to store mobile stations along with an indication of whether access is permitted for each interface of a mobile station and an indication of the security policy associated with that mobile station.
  • Memory 2312 may be a part of the switch or part of an external memory or server (e.g., a radius server).
  • the technique described herein reconciles multiple interfaces that correspond to the same mobile station when the mobile station has access to a network resource through one of its interfaces and attempts to gain access to the network resource through another one of its interfaces.
  • the techniques described herein also include the enforcement of a security policy with respect to such a mobile station.

Abstract

A method and apparatus for communicating between devices is described. In one embodiment, the method comprises allowing a mobile station to have a first connection to a network over a first interface and determining that the mobile station is attempting to have a second connection to the network over a second interface other than the first interface.

Description

    CROSS REFERENCE TO RELATED APPLICATIONS
  • This application is a continuation of U.S. Non-Provisional patent application Ser. No. 10/663,167, Filed Sep. 15, 2003, now U.S. Pat. No. 7,236,470, Issue Date Jun. 26, 2007, which is a Continuation-In-Part of U.S. Non-Provisional application Ser. No. 10/044,016, filed Jan. 11, 2002, now U.S. Pat. No. 6,788,658, Issued Sep. 7, 2004, all of which are hereby incorporated by reference.
  • BACKGROUND OF THE INVENTION Copyright Notices
  • A portion of the disclosure of this patent document contains material which is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent file or records, but otherwise reserves all copyright rights whatsoever.
  • Field of the Invention
  • The present invention relates to the field of wireless communications; more particularly, the present invention relates to a single frequency wireless communication system.
  • Background Art
  • FIG. 1 illustrates an exemplary network environment used today. Referring to FIG. 1, a corporate Local Area Network (LAN) backbone 102 interfaces to a number of desktop computers 103 1-103 n and may interface to Internet 101. Corporate LAN backbone 102 may comprise a firewall 102A, corporate server 102B, and a standard Ethernet switch 102C. Ethernet switch 102C includes an interface by which desktops 103 1-103 n are coupled to the corporate LAN backbone 102 for access to corporate sever 102B and to Internet 101 (via firewall 102A).
  • More recently, wireless LANs (WLANs) are being installed. Many of the recently implemented WLANs operate according to the protocol set forth in the 802.11 Standard, particularly as more enterprises are adopting the 802.11 Standard. ISO IEC DIS 8802.11.
  • FIG. 2 illustrates one embodiment of an 802.11, based WLAN (LAN) system. Referring to FIG. 2, the Internet or other LAN 201 is coupled to an 802.11 server 203 via firewall (FW) 202. Server 203 communicates with mobile stations in a number of 802.11 cells 206 1-206 n n using an access point in each of cells 206 1-206 n, such as access point 204. Server 203 is coupled to access points such as access point 204, via an Ethernet connection. There is one access point for each of the 802.11 cells 206 1-206 n. Mobile stations in each of the 802.11 cells, such as laptops 205 1 and 205 2 in cell 2061, communicate wirelessly with the access points via the 802.11 protocol. The communications from mobile stations in the 802.11 cells to the access points are forwarded through to server 203 and potentially to Internet/LAN 201, while communications from Internet/LAN 201 are forwarded through server 203 to the mobile stations via the access points.
  • There are a number of problems associated with the current implementations of 802.11 networks. For example, in order to set up an 802.11 network such as shown in FIG. 2, a site survey is required in order to determine where each of the access points are to be placed to ensure that the 802.11 cells provide complete coverage over a particular geographic area. This may be costly. Also, the cost of each of the access points is approximately $500.00. Generally, such a high cost is a deterrent to having a large number of access points. However, by reducing the number of access points, coverage diminishes and the 802.11 network is less effective. Furthermore, there are a number of mobility problems associated with the current 802.11 network deployments. For example, the 802.11 standard sets forth a number of solutions to handle the issue of mobility of mobile stations between the 802.11 cells. However, these schemes do not work effectively as there is no standard solution in place and users haven't indicated a desire for long-term proprietary solutions.
  • Moreover, if such communications are employed to enable access to a company's corporate server or sensitive information, additional precautions are often necessary, particularly where access may be by a laptop computer system which may fall into the hands of a hacker that tries to use the computer system to gain access to the information. In such case, the hacker may tries to gain access through any interface that a device has. Thus, solutions to prevent such attacks are needed when using such systems.
  • BRIEF SUMMARY OF THE INVENTION
  • A method and apparatus for communicating between devices is described. In one embodiment, the method comprises allowing a mobile station to have a first connection to a network over a first interface and determining that the mobile station is attempting to have a second connection to the network over a second interface other than the first interface.
  • BRIEF DESCRIPTION OF THE DRAWINGS/FIGURES
  • The present invention will be understood more fully from the detailed description given below and from the accompanying drawings of various embodiments of the invention, which, however, should not be taken to limit the invention to the specific embodiments, but are for explanation and understanding only.
  • FIG. 1 illustrates an exemplary network environment used today.
  • FIG. 2 illustrates one embodiment of an 802.11 based wireless LAN-based (LAN) system.
  • FIG. 3 illustrates one embodiment of a network architecture.
  • FIG. 4A is a flow diagram of one embodiment of a receiver diversity processing performed by a repeater.
  • FIG. 4B is a flow diagram of one embodiment of a receiver diversity processing performed by a switch.
  • FIG. 4C is a process for managing repeaters using a token-based mechanism.
  • FIG. 4D is one embodiment of a token-based process for handling packets.
  • FIG. 5A illustrates one technique for location tracking by RSSI.
  • FIG. 5B is a flow diagram of one embodiment of a process for performing location tracking by a switch.
  • FIG. 6 illustrates mobility supported by routing.
  • FIG. 7 illustrates one embodiment of a network system.
  • FIG. 8 illustrates one embodiment of a protocol architecture.
  • FIG. 9A illustrates one embodiment of a switch.
  • FIG. 9B illustrates one embodiment of a repeater.
  • FIG. 10 illustrates one embodiment of a hardware architecture for a repeater.
  • FIG. 11 is a block diagram of one embodiment of the base stand processor of a repeater.
  • FIG. 12A is a block diagram of one embodiment of a switch.
  • FIG. 12B is a flow diagram of one embodiment of a process for reconfiguring the wireless communication system.
  • FIG. 13 is one embodiment of a distributed MAC architecture.
  • FIG. 14 illustrates one embodiment of the switching plane.
  • FIG. 15 illustrates the communication network and exemplary data traffic process.
  • FIG. 16 illustrates an exemplary process for transferring data traffic from a mobile station to a desktop.
  • FIG. 17 illustrates an exemplary process for transferring data traffic between two mobile stations.
  • FIG. 18 illustrates an exemplary process for transferring data traffic from a desktop to a mobile station.
  • FIG. 19 is a data flow diagram of one embodiment of an association and token assignment process.
  • FIG. 20 is a block diagram of two MAC sublayer instances in a switch.
  • FIG. 21 is a data flow diagram of one embodiment of a re-association process.
  • FIG. 22 is a flow diagram on one embodiment of a disassociation process.
  • FIG. 23A is a flow diagram of one embodiment of the process of tracking multiple mobile station interfaces.
  • FIG. 23B is an alternative embodiment of a switch.
  • DETAILED DESCRIPTION OF THE INVENTION
  • A communication system is described. In one embodiment, the communication system comprises a mobile station having a transmitter to transmit packets wirelessly according to a protocol and multiple repeaters communicably coupled with the mobile station. Each of the repeaters may receive one or more packets of the wirelessly transmitted packets from one or more mobile station and forwards them to a switch. Similarly, the switch sends one or more packets to the one or more mobile stations via the repeaters.
  • A technique is disclosed herein that tracks when a mobile station is attempting to connect to the network over more than one mobile station interface. In one embodiment, a switch described herein allows a mobile station to have one connection to a network over one of its interfaces (e.g., a 802.11 wireless interface). Thereafter, the switch determines that the mobile station is attempting to have a second connection to the network over another mobile station interface (e.g., a wired interface). In one embodiment, the switch makes the determination by checking a table (e.g., an active stations list) of mobile stations along with a list of the interfaces available for each of the listed mobile stations to determine if media access control (MAC) addresses of both interfaces (e.g., the wireless and the wired interfaces) are listed as belonging to the same mobile station. In one embodiment, the switch enforces a security policy in response to determining that a mobile station is attempting to connect to the network over one interface when already connected over another interface.
  • In the following description, numerous details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art, that the present invention may be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form, rather than in detail, in order to avoid obscuring the present invention.
  • Some portions of the detailed descriptions which follow are presented in terms of algorithms and symbolic representations of operations on data bits within a computer memory. These algorithmic descriptions and representations are the means used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. An algorithm is here, and generally, conceived to be a self-consistent sequence of steps leading to a desired result. The steps are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.
  • It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise as apparent from the following discussion, it is appreciated that throughout the description, discussions utilizing terms such as “processing” or “computing” or “calculating” or “determining” or “displaying” or the like, refer to the action and processes of a computer system, or similar electronic computing device, that manipulates and transforms data represented as physical (electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage, transmission or display devices.
  • The present invention also relates to apparatus for performing the operations herein. This apparatus may be specially constructed for the required purposes, or it may comprise a general purpose computer selectively activated or reconfigured by a computer program stored in the computer. Such a computer program may be stored in a computer readable storage medium, such as, but is not limited to, any type of disk including floppy disks, optical disks, CD-ROMs, and magnetic-optical disks, read-only memories (ROMs), random access memories (RAMS), EPROMs, EEPROMs, magnetic or optical cards, or any type of media suitable for storing electronic instructions, and each coupled to a computer system bus.
  • The algorithms and displays presented herein are not inherently related to any particular computer or other apparatus. Various general purpose systems may be used with programs in accordance with the teachings herein, or it may prove convenient to construct more specialized apparatus to perform the required method steps. The required structure for a variety of these systems will appear from the description below. In addition, the present invention is not described with reference to any particular programming language. It will be appreciated that a variety of programming languages may be used to implement the teachings of the invention as described herein.
  • A machine-readable medium includes any mechanism for storing or transmitting information in a form readable by a machine (e.g., a computer). For example, a machine-readable medium includes read only memory (“ROM”); random access memory (“RAM”); magnetic disk storage media; optical storage media; flash memory devices; electrical, optical, acoustical or other form of propagated signals (e.g., carrier waves, infrared signals, digital signals, etc.); etc.
  • Exemplary Network Architecture
  • FIG. 3 illustrates one embodiment of a network architecture. Referring to FIG. 3, a LAN backbone 102 interfaces a number of desktops 103 1-103 n to Internet 101. Note that the present invention does not require that a LAN backbone be included. All that is necessary is that there be a communication mechanism that is capable of receiving packets from other devices and/or sending packets to other devices.
  • Similar to FIG. 1, LAN backbone 102 includes firewall 102A, corporate server 102B and Ethernet switch 102C. However, in contrast to FIG. 1, LAN backbone 102 also includes switch 301 which interfaces to repeaters 302 1-302 3. Although only three repeaters are shown, alternative embodiments may utilize any number of repeaters with a minimum of one. In one embodiment, switch 301 is coupled to repeaters 302 1-302 3 via a wired connection, such as cabling. In one embodiment, the wired connection may comprise CATS cabling.
  • Each of repeaters 302 1-302 3 receives wireless communications from devices (e.g., mobile stations such as, for example, a mobile phone, a cellular phone, a cordless phone, a headset, a voice-enabled mobile station, a laptop computer system, a personal digital assistant, a computer-data-enabled mobile station, a speakerphone, video game controller, a DVD controller, a stereo controller, a TV controller, etc.) in the coverage areas of the repeaters. In one embodiment, these wireless communications are performed according to the 802.11 protocol. That is, each of the mobile stations in each of cells 310 1-310 n exchanges packets with repeaters 302 1-302 3 using the 802.11 protocol.
  • In one embodiment, switch 301 includes 802.11 MAC (medium access control) protocol software and/or hardware that allows switch 301 to communicate with repeaters 302 1-302 3. Different from the prior art, some of the 802.11 MAC functionality typically associated with the access points, as described above in the Background section, are not in repeaters 302 1-302 3 and are, instead, centralized in switch 301. More specifically, the MAC layer is split between repeater 302 1-302 3 and switch 301 to enable transfer of messages over wiring (e.g., CAT5 cabling). As such, repeaters 302 1-302 3 and switch 301 coordinate to perform functionality of the 802.11 MAC layer as described below.
  • In one embodiment, switch 301 includes one or more Ethernet connectors (e.g., external Ethernet connector) to enable a computer system, such as desktop computer system 303, or other device, to have an Ethernet connection to LAN backbone 102 via switch 301. Similarly, in one embodiment, one or more of repeaters 302 1-302 3 includes an Ethernet connector to enable a device (e.g., computer system, such as desktop computer system 304) to gain access, via a repeater, such as repeater 302 3, to switch 301 and the rest of the communication system. In such a case, the wiring coupling switch 301 to repeaters 302 1-302 3 may combine 802.11 information, including management and control (as opposed to solely data) information, with traditional Ethernet packets on the same wiring (e.g., CATS).
  • Distributed Receiver Diversity Approach
  • The network architecture described above allows for overlapping coverage between cells supported by the repeaters. This overlapping coverage allows for receiver diversity.
  • The packets from the mobile stations in each of the cells are broadcast and may be received by multiple repeaters. By allowing multiple repeaters to receive packets from one of the mobile stations, collisions and dropped packets may be reduced or avoided. For example, if a collision occurs or if a packet is dropped by one of the repeaters, then a particular packet can still be received by other repeaters. In this manner, the use of repeaters described herein provides for higher reliability.
  • In an embodiment in which mobile stations exchange packets with repeaters using the 802.11 protocol, each packet from a mobile station includes an Ethernet MAC address, which is embedded in the packet. Each packet may be received by one or more repeaters. Each repeater that receives a packet from a mobile station without errors (i.e., cleanly) determines the received signal strength of the packet in a manner well-known in the art. The received signal strength is converted into an indication, such as a received signal strength indicator (RSSI). In one embodiment, the RSSI is specified in a value from 1 to 127. These 128 discrete values can be mapped to dB signal strength values based on the particular implementation being used. In one embodiment, all repeaters send their RSSI for the packet to switch 301. The repeater that is assigned to the mobile station (e.g., has the token for the mobile station) sends the packet along with the RSSI. In one embodiment, the repeater encapsulates the packet into an Ethernet packet with the RSSI in a header and forwards the Ethernet packet to switch 301. In an alternative embodiment, each repeater receiving the packet without error forwards the packet, along with the RSSI to the switch. Thus, all packets received from mobile stations by a repeater without errors are forwarded to switch 301. Switch 301 knows which repeater sent the packet(s) because it is received on its preassigned port.
  • In one embodiment, the fact that a particular repeater received a packet without errors is communicated to all other repeaters. In one embodiment, this is accomplished by having the repeater send each encapsulated packet and its RSSI as a broadcast packet to switch 301. This broadcast packet is similar to those broadcast packets used in Ethernet and includes a special broadcast address, which is recognized by switch 301. In another embodiment, only the header of the packet, which includes the RSSI and uniquely identifies the packet, is encapsulated and sent as a broadcast packet to the other repeaters. In this case, the data portion of the packet is not forwarded.
  • In response to receiving the broadcast packet with the specific broadcast address, switch 301 broadcasts the packet on all of the other ports used for communication between switch 301 and the other repeaters.
  • In one embodiment, upon receiving a packet without error from a particular mobile station, the repeater sets a timer within which it is to receive packets received by other repeaters that are duplicates to the packet it has already received. When the timer expires, the repeater examines the RSSI of the packet it received (without error) with the RSSI values of duplicate packets received by other repeaters. Based on that information, the repeater determines if it is to send an acknowledgement packet for the subsequent transmission from the mobile station. Thus, if the time expires without receiving a duplicate packet, the repeater sends the acknowledgement. If the timer expires and the repeater receives a duplicate packet, thereafter, it is treated as a new packet. To avoid this, the timer time out value is set to handle the worst case time delay that a repeater may face in receiving duplicate packets.
  • In one embodiment the communication protocol used between the mobile stations and the repeater is a modified version of the 802.11 protocol in which acknowledgement packets are disabled and thus, not sent. By doing so, a repeater that is assigned to a particular mobile station in response to receiving a packet at a larger received signal strength than any other repeater may not be delayed in handling the packet, and thereby avoids missing a portion of a packet from the mobile station.
  • Note that switch 301 forwards each packet received from repeaters (note duplicates) to the remainder of the communication system (e.g., LAN backbone, other mobile stations, the Internet, etc.). In one embodiment, this occurs after de-duplication of packets so that only one copy of each packet is forwarded.
  • Once the broadcast packets have been received, in one embodiment, all the repeaters know what packets were received cleanly by the others and at what RSSI the packets were received by the other repeaters. Thereafter, each repeater selects the packet with the highest RSSI and determines the repeater that received it. In other words, each repeater performs a comparison on the received signal strength of the packets it received that were also received by one or more other repeaters. For each of the packets that a repeater receives at a power level higher than any of the other repeaters that received that packet, that repeater sends an acknowledgement back to the mobile station acknowledging that the packet was received without errors. This prevents all the repeaters that receive the packet cleanly from sending multiple acknowledgements to the mobile station.
  • In one embodiment, if two repeaters have the same receive signal strength for a packet, the repeater with the lower port number (the port number by which switch 301 is coupled to the repeater) is the repeater that is selected to send the acknowledgement to the mobile station. In this manner, only one repeater is selected to send the acknowledgement to the mobile station and, thus, the receiver diversity is handled in the network architecture in a distributed fashion. In one embodiment, to enable the repeaters to determine which is to send the acknowledgement in the case of a packet received with the same received signal strength by multiple repeaters, each packet includes identification information, such as its switch port number, to enable the determination of which has the lowest port number. Note, in an alternative embodiment, the repeater with the highest port number may be the one to send the acknowledgement or other pre-assigned priority information may be used by the repeaters in such situations. In an alternative embodiment, instead of using the port number to determine which repeater is to send the acknowledgement when two repeaters have the same received signal strength, the repeater MAC address may be used. For example, the repeater with the lowest MAC address may send the acknowledgement packet, or alternatively, the repeater with the highest MAC address may send the acknowledgement packet. Using the repeater MAC address for the determination is preferred in cases where a layer 2 network is communicatively coupled between the repeaters and the switch such that a single port is used by multiple repeaters.
  • FIG. 4A is a flow diagram of one embodiment of a receiver diversity process performed by a repeater. The process is performed by processing logic that may comprise hardware (circuitry, dedicated logic, etc.), software (such as is run on a general purpose computer system or a dedicated machine), or a combination of both.
  • Referring to FIG. 4A, processing logic initially receives an 802.11 packet (processing block 401). In response to the 802.11 packet, processing logic determines the received signal strength (e.g., RSSI) (processing block 402). In one embodiment, this processing logic comprises a hardware mechanism, such as a radio frequency (RF) device (e.g., integrated circuit (e.g., RF IC 1002 in FIG. 10)) in the repeater. In such a case, the RF device sends the RSSI to a baseband processor in the repeater.
  • Thereafter, processing logic encapsulates 802.11 packet and RSSI in an Ethernet packet (processing block 403) and sends the Ethernet packet to the switch (processing block 404). In one embodiment, a baseband processor (e.g., baseband processor 1001 in FIG. 10) performs the encapsulation and sends the Ethernet packet to the switch.
  • Later in time, processing logic receives one or more packets from the switch that are duplicates of the 802.11 packet. These duplicate packets are transmitted by other repeaters and encapsulated by those repeaters, along with their RSSIs (processing block 405). Processing logic in the repeater compares RSSIs for the duplicate packets (processing block 406). In one embodiment, a baseband processor (e.g., baseband processor 1001 in FIG. 10) performs the comparison. If the repeater determines it received the 802.11 packet with the highest RSSI, then processing logic sends the acknowledgment packet to the mobile station (processing block 407).
  • FIG. 4B is a flow diagram of one embodiment of a receiver diversity processing performed by a switch. The process is performed by processing logic that may comprise hardware (circuitry, dedicated logic, etc.), software (such as is run on a general purpose computer system or a dedicated machine), or a combination of both.
  • Referring to FIG. 4B, processing logic initially receives a packet from a repeater (processing block 411). In response to the packet, processing logic determines that the packet is to be sent to the other repeaters and re-broadcasts the received packet to other repeaters (processing block 412). Then processing logic sends only one copy of the packet to the rest of the network (processing block 413).
  • Token-Based Receiver Diversity Approach,
  • Note that the above receiver diversity procedure is particularly useful when gigabit or faster Ethernet communication exists between switch 301 and repeaters 302 1-302 3. However, if such is not the case, another technique for receiver diversity may be utilized. For example, a token-based receiver diversity procedure may be used. In this case, switch 301 has a token for every mobile station on the 802.11 network and it gives the token to one of the repeaters. In other words, switch 301 pre-assigns the token before a packet is even transmitted by a mobile station. The repeater stores the token in a table that lists all mobile stations for which it has a token. The repeater with the token sends the acknowledgement packet to the mobile stations listed in the table when those mobile stations send packets that are received by the repeater. Therefore, a comparison of received signal strengths for duplicate packets is not necessary. Note that in one embodiment with this token based mechanism, if the repeater with the token does not receive a packet cleanly, but another repeater does, that packet will be forwarded to the switch and not acknowledged to the mobile client. However, switch 301 moves the token before a subsequent packet is sent by the mobile station. Therefore, this will only occur for one packet.
  • In one embodiment, switch 301 includes a database with a listing of mobile stations and repeater numbers corresponding to the repeater that has been designated to acknowledge packets received from the mobile station and, thus, has the token. The table may also include additional information describing the repeater itself.
  • Since switch 301 receives the received signal strength from each repeater that received a packet without error, switch 301 can determine the closest repeater to a particular mobile station. If the repeater determined to be closest to the particular mobile station is different than the one previously identified as closest (e.g., based on RSSI of packets received from the mobile station), then switch 301 moves the token to a new repeater, i.e. the one that is closer to the mobile station. The token may be moved on a packet-by-packet basis or every predetermined number of the packets (e.g., 10 packets, 100 packets, etc.).
  • Switch 301 may employ a timer to indicate the time during which duplicate RSSI values for the same packet may be received in much the same manner the timer is used by the repeaters in the distributed approach described above.
  • FIG. 4C is a process for managing repeaters using a token-based mechanism. The process is performed by processing logic that may comprise hardware (circuitry, dedicated logic, etc.), software (such as is run on a general purpose computer system or a dedicated machine), or a combination of both.
  • Referring to FIG. 4C, processing logic first determines the location of mobile stations with respect to repeaters (processing block 451). Processing logic then assigns a token for each of the mobile stations to one of the repeaters (processing block 452) and stores an indication of the repeater assigned to each mobile station (processing block 453). This information is stored in a table in memory. This table is referred to herein as an active station list. In one embodiment, this table includes a listing of mobile stations and an indication of which repeater and/or switch port number is assigned to the mobile station. The table may be the same data structure used for location tracking described below.
  • In one embodiment, the switch assigns a token by sending an Add Token command to the repeater, which causes the repeater to add a new mobile station to its table of mobile stations that the repeater supports. This command includes the MAC address of the mobile station.
  • Subsequently, processing logic periodically tests whether the repeater assigned the token for a particular mobile station is still the closest repeater to that mobile station (processing block 454). If so, then the processing is complete. If not, then processing logic moves the token to the closest repeater (processing block 455) and updates the table (e.g., the active station list) to reflect the new repeater that is closest to the mobile station (processing block 456). Processing logic also updates the switch port to reflect the new repeater for use when sending packets to the mobile station from the switch.
  • In one embodiment, the switch moves the token by sending a Delete Token command to the repeater that currently has it, causing the repeater to delete the token (and assorted MAC Address) from its list of supported mobile stations, and by sending an Add Token command to the repeater that is currently closest to the mobile station.
  • FIG. 4D is one embodiment of a token-based process for handling packets. The process is performed by processing logic that may comprise hardware (circuitry, dedicated logic, etc.), software (such as is run on a general purpose computer system or a dedicated machine), or a combination of both.
  • Referring to FIG. 4D, processing logic receives a token from the switch (processing block 470) and stores the token in a table stored in a repeater memory that indicates all the mobile stations for which the repeater has a token (processing block 471).
  • Subsequently, when processing logic receives a packet from mobile station (processing block 472), processing logic compares the MAC address of the 802.11 packet from the mobile station with the address in the table (processing block 473). Then, processing logic tests whether the MAC address of a packet equals an address in the table (processing block 474). If so, processing logic provides an acknowledgment (ACK) packet to the mobile station (processing block 475). If not, processing logic ignores the packet.
  • Note that since all repeaters communicate the fact that they received a packet from a mobile station along with the received signal strength to switch 301, switch 301 is able to determine the coverage area of the transmission of the mobile station. In one embodiment, each packet received by switch 301 from the repeaters terminates in a network processor in switch 301 (e.g., network processor 1206 of FIG. 12), which determines the coverage area because it has access to the RSSI values. By determining the coverage area of the transmission, switch 301 is able to track the location of a particular device.
  • Downstream Communication Scheduling
  • For communications in the reverse direction (e.g., in the downstream direction), in one embodiment, the repeater transmissions are scheduled to reduce collisions. This scheduling is useful because repeaters can be close enough to interfere with one another. Because of this, switch 301 schedules the transmissions to prevent the collisions when the repeaters are actually transmitting.
  • For example, if a packet is destined for a particular IP address, then switch 301 performs an address translation to translate, for example, the IP address into an Ethernet MAC address. Switch 301 uses the Ethernet MAC address to search in a location tracking database to determine which repeater is closest to the mobile station having the Ethernet MAC address. Once the repeater is identified by switch 301, then switch 301 knows the switch port on which the packet should be sent so that it is sent to the repeater listed in the location tracking database (for forwarding by the repeater to the mobile station).
  • Once the repeater (and the port number) has been identified, switch 301 checks whether an interference problem would be created if the packet is sent by switch 301 to the mobile station at that time. An interference problem would be created if there are other transmissions that would be occurring when the packet is forwarded onto its destination mobile station. If no interference problem would exist, switch 301 sends the packet through the identified port to the repeater most recently determined to be closest to the mobile station. However, if an interference problem would be created by sending the packet immediately, then switch 301 delays sending the packet through the identified port to the repeater most recently determined to be closest to the mobile station.
  • In one embodiment, to determine if an interference problem would exist if a packet is sent immediately upon determining the switch port number on which the packet is to be sent, switch 301 maintains and uses two databases. One of the databases indicates which of the repeaters interfere with each other during their transmissions. This database is examined for every downstream packet that is to be sent and switch 301 schedules the transmission of downstream packets so that the repeaters that interfere with each other when they transmit at the same time do not transmit at the same time. The other database is a listing of mobile stations and the corresponding set of repeaters that last received the transmissions. If two mobile stations have overlapping sets, then it is possible for their acknowledgement packets to interfere when they simultaneously receive non-interfering data packets from different repeaters. Because the mobile stations send acknowledge packets upon receiving downstream packets, there is a possibility that the mobile stations will interfere with each other when sending their acknowledgement packets. Switch 301 takes this information into account during scheduling and schedules downstream packets to the mobile stations to reduce the occurrence of mobile stations interfering with other when sending acknowledgment packets. The information in these two databases may be collected by sending out test packets to the WLAN to determine which repeaters and mobile devices cause the interference described above.
  • Upstream Communication Scheduling
  • The same databases used for downstream traffic scheduling may be used for upstream traffic scheduling to enable the switch to schedule upstream communications. As with downstream traffic, by using the two databases, the switch is able to determine when parallel communication may take place based on the overlap described above. This scheduling may be used to implement quality of service (QoS) where a period of time when traffic is scheduled is used (bypassing the CSMA algorithm).
  • Location —Tracking by Received Signal Strength (RSSI)
  • FIG. 5A illustrates one technique for location tracking by RSSI. Referring to FIG. 5A, switch 301 obtains the RSSI for each packet received by the repeaters and may have multiple RSSI values for a packet when that packet is received by two or more different repeaters. More specifically, a mobile station communicates with two (or more) repeaters and one repeater is going to have a stronger received signal strength than the other for the same packet. Based on this information, switch 301 is able to determine that a mobile station is closer to one repeater than the other. By continually monitoring the received signal strength, switch 301 can track the movement of a mobile station with respect to the repeaters.
  • FIG. 5B is a flow diagram of one embodiment of a process for performing location tracking by a switch. The process is performed by processing logic that may comprise hardware (circuitry, dedicated logic, etc.), software (such as is run on a general purpose computer system or a dedicated machine), or a combination of both. In one embodiment, the processing logic comprises a network processor in the switch (e.g., network processor 1206 of FIG. 12).
  • Referring to FIG. 5B, processing logic compares the RSSI for the duplicate packets received by different repeaters from a mobile station (processing block 550) and tests whether the repeater with the highest RSSI for the packet is the repeater listed as closest to the mobile station in a location tracking table (e.g., database) (processing block 551). If not, processing logic updates the table to indicate that the repeater that received the packet with the highest RSSI is the closest repeater (processing block 552). Processing logic also switches port assignment for the mobile station to the port of new repeater (if the port is different than the port of the previously assigned repeater).
  • In one embodiment, the location tracking table may include a listing of mobile stations and their individually assigned repeaters. The location tracking table may also be referred to herein as the active station list. This table may also include, or include instead of the assigned repeater, an indication of the switch port by which the switch is to communicate with the repeater assigned to each mobile station.
  • Mobility Supported by Routing
  • FIG. 6 illustrates mobility supported by routing. Referring to FIG. 6, the dotted arrow path for communication from switch 301 to mobile station 601 through repeater 302 2 is the original communication path with the network. As the mobile station 601 moves, a routing handoff occurs so that communication occurs over the solid arrowed path. In order to accomplish this handoff, switch 301 reroutes the packet to a different port. For example, if the first communication path illustrated as the dotted line arrow was on port 1, switch 301 may switch the packet to port 5, the port that associated with the communication path through repeater 302 1. Thus, mobility is supported by simply moving a packet to a different port of switch 301 that is assigned to a different repeater. In such a situation, the mobility provisions of the 802.11 protocol may be ignored. Note that for embodiments where multiple repeaters are on the same port, the repeater MAC address may be changed instead of changing the port number.
  • In one embodiment, switch 301 determines that a particular mobile station is closer to a different repeater (by monitoring the received signal strength of duplicate packets). As described above, switch 301 maintains a table (e.g., database, active station list, etc.) of all mobile stations in the 802.11 network and includes an indication of the repeater closest to each mobile station. Switch 301 performs port-based routing and may use the table in the same manner an IP routing table is used. Switch 301 has an Ethernet port for each repeater. When switch 301 determines that a mobile station is closer to a repeater that is different than the one listed in the database (based on the received signal strength of duplicate packets among multiple repeaters), then switch 301 updates the database. Thereafter, if a packet is received by switch 301 for that mobile station, switch 301 merely sends it out on the Ethernet port assigned to the repeater that was most recently determined to be the closest to that mobile station.
  • Multi-Switch System
  • FIG. 7 illustrates one embodiment of a multi-switch system. Referring to Figure the network architecture includes switches 701 and 702 are communicably coupled to server 712. In one embodiment, server 712 is part of a LAN backbone through which access to the Internet and other resources is made. Alternatively, server 712 may act as an interface to another portion of the communication system. Each of switches 701 and 702 is coupled to one or more repeaters in the same manner as described above with respect to FIG. 3. In still another embodiment, server 712 may exist within one of, or both, switches 701 and 702.
  • Protocol Architecture
  • FIG. 8 illustrates one embodiment of a protocol architecture. Referring to Figure switch 801 is shown having a network layer 801A and a MAC layer 801B. In one embodiment, the network layer 801A comprises a TCP/IP network layer. MAC sublayer 801B communicates with a MAC sublayer of each of repeaters 802 1-802 N. Thus, in contrast to the prior art in which the 802.11 MAC layer is completely within the access point, the 802.11 MAC layer is split between switch 301 and repeaters 802 1-802 N, and the MAC sublayer of the repeaters performs much less functionality than the MAC sublayer of the access points described above.
  • In one embodiment, the repeater MAC sublayer is responsible for performing portions of the 802.11 protocol including handling CSMA/CA, DIFS/EIFS interframe spacing (IFS) timing, SIFS timing and control, generating acknowledgement (of ACK) frames (during transmit only) on data packets received, such as 802.11 data frames and generating CTS (clear-to-send) frames in response to RTS (request-to-send) frames. The repeater MAC sublayer may also respond to the resetting of internal network allocation vectors (NAVs) which are embedded into certain frames (e.g., RTS and CTS frames). Each of the above repeater MAC functions may be implemented in a manner that is well-known is the art.
  • In addition to the MAC sublayer, each of repeaters 802 1-802 N includes an 802.11 physical layer or other wireless physical layer.
  • The switch MAC sublayer is responsible for handling multiple frame types during reception from the repeaters. In one embodiment, the MAC frame types the switch is capable of handling include an association request, reassociation request, probe request, ATIM, disassociation, authentication, deauthentication, PS-Poll, CTS (updates NAV in repeaters), ACK (in response to data frames), data and Null frames.
  • The switch MAC frame types that are accommodated during transmission include an association response, a reassociation response, probe response, ATIM (announcement traffic indication message), disassociation, deauthentication, PS-Poll, data frames, Null frames, RTS (updates NAV in repeater), and beacon frames. It should be noted that the MAC frame types that the switch accommodates during receive and transmit are well known in the arts and part of the 802.11 standard. Each of the above switch MAC functions may be implemented in a manner that is well-known is the art.
  • FIG. 9A illustrates an embodiment of a switch. In one embodiment, exemplary switch 900 includes session management unit 901, protocol unit 902, location tracking unit 903, fragmentation unit 904, DCF (distributed coordination function) unit 905, packet de-duplication unit 906 and SNMP (simple network management protocol) unit 907. Some of these units may be implemented within the corresponding MAC layer of the switch. In one embodiment, session management unit 901, which may be a part of the switch management entity (SwME), is responsible for handling initial handshakes with one or more repeaters and the associated mobile devices, including, but not limited to authentication, association, and disassociation, etc. In one embodiment, protocol unit 902 handles a variety of network protocols including 802.11 wireless protocol, RADIUS, VPN (virtual private network) protocol, as well as other wireless protocols, such as, for example, 802.15 (wireless personal area network or WPAN, also referred to as Bluetooth) protocol or 802.16 (broadband wireless metropolitan area network) protocol.
  • Location tracking unit 903 is responsible for tracking one or more mobile stations communicating with one or more repeaters using one of the aforementioned mechanisms shown in FIGS. 5A and 5B. In one embodiment, location tracking unit 903 obtains the RSSI for each packet received by the repeaters and may have multiple RSSI values for a packet when that packet is received by two or more different repeaters. More specifically, a mobile station communicates with two (or more) repeaters and one repeater typically has a stronger received signal strength than the other for the same packet. Based on this information, location tracking unit 903 is able to determine that a mobile station is closer to one repeater than the other. By continually monitoring the received signal strength, location tracking unit 903 tracks the movement of a mobile station with respect to the repeaters. Based on this information, location tracking unit 903 may automatically perform an operation similar to a site survey and may reconfigure the communication network, which will be described in details further below. In one embodiment, location tracking unit 903 may notify session management unit 901 to perform such operations. In a further embodiment, location tracking unit 903 may further detect whether an interference between multiple mobile stations exists and may signal session management unit 901 to perform further action, such as, for example, queuing and rescheduling of requests, such that multiple mobile stations may be able to share a communication channel (e.g., single frequency band), which will be described further below.
  • Fragmentation unit 904 is responsible for fragmenting packets to improve performance in the presence of RF interference detected using one of the aforementioned processes. The use of fragmentation can increase the reliability of frame transmissions. By sending smaller frames, collisions are much less likely to occur. The fragment size value may be typically set between 256 and 2,048 bytes. However, this value may be user controllable via, for example, a user interface of session management unit 901.
  • DCF unit 905 is responsible for handling DCF functionality according to 802.11 specifications. DCF unit 905 typically operates based on the CSMA/CA (carrier sense multiple access with collision avoidance) protocol. In a conventional approach, typical 802.11 stations contend for access and attempt to send frames when there is no other station transmitting. If another station is sending a frame, the stations wait until the channel is free. According to one embodiment, when DCF unit 905 detects if interference exists between multiple mobile stations, DCF unit 905 may signal session management unit 901 to queue up the frames and reschedule to processing of these frames to avoid interference. As a result, mobile stations do not need to worry about interference and wait for a free channel, which leads to a wider bandwidth of the network.
  • As described above, switch 900 may receive multiple identical packets from multiple repeaters because the corresponding mobile station may send the same packet to multiple repeaters within a coverage area. The switch may broadcast the packet to the rest of the repeaters. In order to avoid broadcasting the same packet multiple times, switch 900 may invoke packet de-duplication unit 906 to de-duplicate the duplicated packets and only one of multiple instances of the same packet gets broadcasted.
  • SNMP unit 907 performs typical network management operations well known in the art. SNMP is a protocol governing network management and the monitoring of network devices and their functions. It is not necessarily limited to TCP/IP networks.
  • FIG. 9B illustrates an embodiment of a MAC sublayer of a repeater. In one embodiment, the repeater MAC sublayer 908 is responsible for performing portions of the 802.11 protocol including handling CSMA/CA, DIFS/EIFS interframe spacing (IFS) timing, SIFS timing and control (block 912), generating acknowledgement (of ACK) frames (during transmit only) on data packets received, such as 802.11 data frames (block 911) and generating CTS (clear-to-send) frames in response to RTS (request-to-send) frames. The repeater MAC sublayer may also respond to the resetting of internal network allocation vectors (NAVs) which are embedded into (e.g., RTS and CTS frames) (block 910). Each of the above repeater MAC functions may be implemented in a manner that is well-known is the art.
  • FIG. 10 illustrates one embodiment of a hardware architecture for a repeater. Referring to FIG. 10, an RF chip 1002 receives and transmits RF transmissions using antenna 1003. In one embodiment, RF chip 1002 comprises a standard 802.11 RF chip. In one embodiment, antenna 1003 comprises a dual-diversity antenna. Communications received by RF chip 1002 are forwarded on to baseband processor 1001, which is a digital chip that is described in further detail below. Similarly, transmissions to be sent are received by RF chip 1002 from baseband processor 1001.
  • Baseband processor 1001 is a digital chip that performs the reduced MAC functions as described above. The repeater also includes a port 1007 for coupling to a switch, such as switch 301. Baseband processor 1001 handles communication with switch 301 using port 1007. In one embodiment, port 1007 also transfers information (through the port) at 100 Mb/s bits per second. Port 1007 may also provide power to baseband processor 1001.
  • A desktop port 1006 may be included to allow desktop or other systems to plug into the repeater. Also, in one embodiment, LEDs 1005, such as an activity LED, power LED, and/or link LED, may be included in the repeater as well.
  • FIG. 11 is a block diagram of one embodiment of the baseband processor of a repeater. Baseband processor 1001 includes a repeater MAC and control unit 1105 that interfaces with RF chip 1002 using a protocol. In one embodiment, the interface comprises a TCP/IP layer and an 802.11 MAC sublayer. The repeater MAC/control unit 1105 is coupled to switch 1103. In one embodiment, MAC/control unit 1105 communicates with switch 1103 using a TCP/IP layer and an 802.11 MAC sublayer tunneled inside Ethernet packets. Switch 1103 is also coupled to MAC/PHY layer unit 1104 which interfaces the baseband processor to desktop port 1006. Switch 1103 is also coupled to the activity/power/link LEDs 1005. Similarly, switch 1103 is coupled to the MAC/physical layer unit 1001 that interfaces the rest of the components on baseband processor 1001 to switch port 1007 via switch 1103. Also coupled to switch port 1007 is a power distribution unit 1102. In one embodiment, power distribution unit 1102 obtains power from the CATS wiring and provides it to the rest of baseband processor 1001.
  • FIG. 12A is a block diagram of one embodiment of a switch. Referring to FIG. 12, the switch includes one or more ports 1201 to repeaters 1201. Although 12 are shown, any number may be included. Ports 1201 are coupled to a switching processor 1202. In one embodiment, switching processor 1202 switches 13 ports of gigabit Ethernet and allows broadcast packets to be received on one port and broadcast on the others without involving the rest of the switch. In one embodiment, switching processor 1202 comprises a BRCM 5633 gigabit switching processor from Broadcom Corporation of Irvine, Calif.
  • HyperTransport controller 1203 is coupled to switching processor 1202 and provides a gigabit Ethernet interface to the rest of the switch architecture. In one embodiment, the HyperTransport controller 1203 includes a diagnostic port 1204 and another Ethernet port 1205 for use, for example, in coupling to a corporate LAN.
  • In one embodiment, HyperTransport controller 1203 comprises a Gallileo HyperTransport controller from Marvell of Sunnyvale, Calif.
  • A network processor 1206 is coupled to HyperTransport controller 1203 and performs the majority of the functions of the switch, including the receiver diversity functions and location-tracking functions described herein, with the exception of the rebroadcast of the broadcast packets received by the switch, which is handled by switching processor 1202. In one embodiment, network processor 1206 is coupled to a boot memory 1209, a DRAM 1207 and one or more LEDs 1208. In one embodiment, network processor 1206 comprises a PMC-Sierra RM9000X2 sold by PMC-Sierra of Santa Clara, Calif., boot memory 1209 comprises an MB boot flash AMD AM29LV640D boot flash memory and DRAM 1207 comprises 64 MB synchronous DRAM (SDRAM) from Advanced Micro Devices, Inc. of Sunnyvale, Calif.
  • In one embodiment, network processor 1206 includes a PCI interface to a processor 1210. Processor 1210 may host certain applications, such as, for example, firewall applications. Processor 1210 may perform these functions with the use of hard disk 1211, DRAM 1213 and console port 1211. DRAM 1213 may store the active stations list and the access control list described herein. Console port 1211 may provide access to a monitor or keyboard or other peripheral device. In one embodiment, processor 1210 comprises a Pentium Processor manufactured by Intel Corporation of Santa Clara, Calif.
  • In one embodiment, network processor 1206 executes software instructions, which performs the 802.11 MAC layer. Network processor 1206 may also execute a wireless LAN configuration module to configure the wireless LAN network, a priority traffic administration (e.g., traffic shaping) module, a management software (e.g., Cisco IOS), a security protocol (e.g., 802.1x) module, and a VPN/firewall module. Processor 1210 executes a location tracking module to perform the location tracking. Processor 1210 may also execute one or more of the following software modules: clustering/HA, RADIUS/DHCP (remote authentication dial-In user service/dynamic host configuration protocol), session mobility, third party applications, XML (extensible markup language) Web services, user administration software, and network management software.
  • Reconfiguration of the Communication System
  • A technique described herein allows for the performance of an automatic site survey to reconfigure the wireless communication network. As part of the process, the repeaters in essence cause their own reconfiguration by providing information to the switch that the switch uses to determine whether reconfiguration is necessary. In one embodiment, as a result of performing the reconfiguration process, one or more repeaters may change their state from activated, deactivated, or hot standby to another state and/or change their transmitter power level and/or receiver sensitivity. When in the activated state, a repeater is able to receive packets from sending devices (e.g., mobile devices in the network) and transmit packets to those devices. When in the deactivated state, a repeater is not able to receive packets from nor transmit packets to other devices (e.g., mobile devices in the network). When in the hot standby state, a repeater is able to receive packets from sending devices but not transmit packets to those devices. It is possible that a repeater may not change its state as part of the reconfiguration process, but may change its transmit power level and/or its receiver sensitivity.
  • Reconfiguration may also occur by having one or more repeaters change their channel numbers. The reconfiguration of the network includes turning on and off repeaters and adjusting transmitter power levels and receiver sensitivity. The reconfiguration occurs periodically. Reconfiguration may occur after a predetermined period of time (e.g., an hour) or a predetermined amount of activity. The reconfiguration may occur in response to an event. For example, if the activity of a repeater receives a predetermined number of packets within a predetermined period of time or the rate of packet reception increases by a predetermined amount, then the reconfiguration may be performed. As another example, the event may comprise a mobile station entering a particular location (e.g., a conference room) where a repeater is located and not on (thereby causing the system to be reconfigured to have the repeater activated). In one embodiment, when the event occurs, an alarm in the switch is triggered, causing the switch to run the reconfiguration process.
  • FIG. 12B is a flow diagram of one embodiment of a process for reconfiguring the wireless communication system. Referring to FIG. 12B, exemplary process 1250 begins by each repeater that is activated or in the hot standby state sending the received signal strength indication, as set forth above, along with the SNR for each packet received cleanly to the switch (processing block 1251). As described above, the received signal strength and SNR may be determined on a packet-by-packet basis. Also as discussed above, communications between the repeater(s) and the switch(es) occur via a wired connection (e.g., an Ethernet connection) and/or may be through a level 2 network. Note that in another embodiment, such communications may be performed, at least in part, wirelessly using a different protocol than the protocol used between the mobile stations and the repeaters.
  • In response to sending the packet(s), the switch receives the packet(s) (processing block 1252) and determines the amount of wireless communication activity each repeater is experiencing (processing block 1253).
  • More specifically, the repeater receives a packet and embedded in the packet header is the Ethernet MAC address of the mobile station. When the repeater forwards that packet to the switch, it attaches the received signal strength and SNR values. In response to the packet, the switch is able to open up the packet and determine that the packet is from another unique 1P address and, thus, another unique user. Based on this, the switch determines the density of unique users on a particular repeater. In other words, the switch determines the number of unique users (mobile stations) sending packets that are being received by an individual repeater. The switch may use a database to maintain this information. This database may be the location tracking database described above.
  • Based on the location and density of the repeaters as tracked by the switch, using the information sent from the repeater(s), the switch determines which repeaters to activate, deactivate, or move to the hot standby state (processing block 1254). The switch also determines the transmitter power levels for the repeaters that are activated (processing block 1255). The transmitter power levels are the power levels used by the repeaters when transmitting packets wirelessly to other devices in the network. The switch may also adjust the receive sensitivity of one or more of the repeaters (processing block 1256). The switch may also adjust the channel numbers of one or more repeaters. In one embodiment, the switch causes these changes to be made by sending control commands to the repeater over, for example, a wired connection (e.g., the Ethernet connection).
  • Thus, if the switch determines that a particular repeater is to be activated (the repeater can receive and transmit), deactivated (the repeater cannot receive nor transmit), or placed in hot standby mode (the repeater can receive but cannot transmit), that changes to the repeater's transmitters power level and/or the repeater's receiver sensitivity, or that changes to the repeater's channel number are necessary, then the switch sends a command to the repeater specifying the desired action.
  • In one embodiment, if the number of unique users being received cleanly by a repeater in a hot standby state is above a threshold, then the switch activates the repeater.
  • This reconfiguration process has a number of advantages over the prior art. For example, as part of the reconfiguration process in the prior art, an access point may have to be moved. This is because there are typically no additional access points in the area that are not already being used because of their expense. In contrast, because repeaters are generally cheaper devices, many more of them may be distributed throughout the network, even though they are not going to be used all the time. Thus, when there is a need for additional capacity, one of the repeaters that is not currently activated can be activated.
  • In one embodiment, the reconfiguration of the wireless communication system may include changing the transmit power levels of the mobile stations. As with the reconfiguration described above, the purpose of this reconfiguration of the mobile station is to improve network capacity. The improvement to network capacity may be due to a reduced interference to repeaters and other mobile stations in adjacent coverage cells that a mobile station causes because its transmit power level is changed.
  • The reconfiguration of the mobile stations may occur in response to the switch examining the interference in a particular area and comparing this interference with a predetermined amount of interference (e.g., a threshold). The predetermined amount of interference may be based on an allowable amount of interference for the wireless communication system or an allowable amount of variance from the allowable amount of interference.
  • The switch (or other control entity) determines the amount to change the transmit power level. In order to determine the amount of change to a particular transmit power level, the switch initially determines what the current transmit power level is. In one embodiment, the switch sends a query as a control message to the mobile station to obtain the transmit power level of the mobile station. Alternatively, the switch maintains a list (e.g., a database) of the transmit power levels of the mobile stations and accesses the list to obtain the transmit power level for a particular mobile station. The switch may obtain this information from the mobile stations. In addition, the switch might also send a command to the mobile station to modify its power level on a percentage basis. This would not require the knowledge of a specific power level. For example, in one embodiment, the mobile stations send a control message to the switch at boot-up indicating their transmit power levels.
  • Once the current transmit power level has been obtained, the switch determines the amount to change the transmit power level. This may be based on the received signal strength (e.g., RSSI) of the packets received by the repeater currently assigned to the mobile station. For example, if the received signal strength is very high, yet the mobile station is causing interference (e.g., its packets are being received by one or more other repeaters), the switch may cause the mobile station to reduce its transmit power level to a predetermined level or by a predetermined amount (e.g., a percentage of its current transmit power level) because the effect of such a reduction would not prevent its packets from being received by its assigned repeater.
  • The change in the transmit power level may be performed in a number of ways. For example, in one embodiment, the switch controls the transmit power level of the mobile station(s). In such a case, the switch may send a command message to the mobile station, via a repeater, to cause the mobile station to adjust its transmit power level. The command could indicate that the mobile station should increase or decrease its transmit power level. Alternatively, such a command could come from a repeater or a control entity in the communication system other than the switch.
  • An Exemplary MAC Software Architecture
  • FIG. 13 is one embodiment of a distributed MAC architecture. The 802.11 MAC layer is distributed between the switch and a number of the repeaters connected to the switch. On one side, the MAC is terminated on the switch and on the other side the MAC is terminated on the repeaters. Thus, in this way, the distributed architecture is “one to many” relationship.
  • In one embodiment, the MAC sublayer on the repeater is engaged in performing real time functions related to the time synchronization (BEACON, PROBE request/response processing), receiving and transmitting 802.11 frames, including acknowledgment of the received frames.
  • The MAC sublayer on the switch is centralized and controls multiple repeaters. In one embodiment, the MAC sublayer on the switch includes centralized management of the mobile stations and handles mobile stations in power save mode.
  • In one embodiment, the switch runs multiple instances of the MAC sublayer on the switch. In this manner, the switch may support multiple, separate logical groupings of repeaters on the switch. Each grouping may be based on channel frequency such that each group is associated with a particular frequency. The frequency need not be unique to all the frequencies of all the groupings (e.g., some groups use the same frequency and other groups do not use that frequency). The groupings may be created based on channel numbers.
  • By being able to run multiple instances of the MAC sublayer of the switch, the architecture offers flexibility when configuring the wireless communication system and individual embodiments that allows at least one of the following benefits. First, tuning of the size of the RF coverage per logical grouping of repeaters. Second, the roaming of the stations is easy to control. Third, the management of mobile stations in power save mode is centralized. That is, the frames for the mobile stations in power save mode are buffered in the MAC sublayer on the switch and can be exchanged between other instances of the MAC sublayer on the same switch (between MAC instances) when the mobile station in power save mode is roaming.
  • Referring to FIG. 13, each of the units may be implemented in hardware, software, or a combination of both. Data_SAP unit 1301 exchanges messages with the LLC (logic link control) layer, conveying MSDUs (MAC service data units) from and to the LLC layer. Fragmentation unit 1302 performs fragmentation of outgoing MPDUs and MMPDUs (MAC management protocol data units). In one embodiment, since the sending of the fragmented PDU (protocol data unit) by a repeater has some timing constraints, the fragmented PDUs between the switch and the repeater are transferred in one tunneling protocol message. The tunneling protocol covers this case by putting a number of fragments in the tunneling protocol header. Power save unit 1303 performs power save device management, including TIM (Traffic Indication Map) management, in which TIM is sent to the repeaters periodically. The repeaters use the updated TIM for buffering of unicast MPDUs for mobile stations in power save mode. In one embodiment, the switch maintains buffered unicast PDUs for all mobile stations in power save mode. Broadcasts and multicast PDUs are not buffered at the switch and are sent to the repeaters to be sent out immediately after any beacon containing a TIM element with a DTIM (delivery traffic indication message) count field with a value of O. Power save unit 1303 also performs PS-Poll request and response handling.
  • Routing unit 1305 routes data frames to MAC Data SAP (service access point) unit 1301 and management inbound frames to management_SAP unit 1309. De-fragmentation unit 1304 performs de-fragmentation of inbound frames. Management SAP unit 1309 includes an interface to MIB (management information base) unit 1308 and MLME (MAC sub-layer management entity) service unit 1307. MLME services unit 1307 handles the incoming associate and re-associate frames, as well as disassociate requests, and processes authentication and de-authenticate requests and generates authentication and de-authenticate response frames.
  • MIB management unit 1308 performs get and set functions to get and set parameters of the repeater and performs reset functions to reset all the parameters of a repeater and return the parameters to default values. The above processes may be performed using a tunneling protocol between a switch and the respective repeater.
  • With respect to block tunneling protocol layer 1306, both MPDUs and MMPDUs frames between the switch and the repeater are transferred by the tunneling protocol. In one embodiment, the 802.11 frames are encapsulated into Ethernet frames. In one embodiment, the tunneling protocol header is placed after the Ethernet header. This protocol transfers both data and management frames as well as special defined tunneling protocol control messages.
  • On the repeater, transmit unit 1311 transfers frames from MAC to PHY transmitter, generates FCS (frame check sequence), inserts timestamps in the beacons and probe responses, performs DCF timing (SIFS, DIFS, EIFS), handles ACK, RTS, CTS, and performs a back-off procedure.
  • Receive unit 1312 transfers frames from PHY to MAC, receives the MPDUs from the PHY, calculating and checking the FCS value (frames with valid FCS, length and protocol version are sent for receive filtering). Receive unit 1312 also filters valid received frames by destination address, and BSSID (basic service set identification) for group destination addresses, as well as handles ACK, CTS and RTS. Other functions include detection of duplicated unicast frames, updating the NAV (network allocation vector) using Duration/ID value from 802.11 frames, maintenance of the channel state based on both physical and virtual carrier sense, time slot reference generation, and providing Busy, Idle & Slot signals to transmission.
  • Synchronization unit 1313 processes the MLME start request in which it starts a new BSS (basic service set) and set all parameters for a beacon frame. Synchronization unit 1313 generates beacon frames periodically and handles Probe request and response frames.
  • Repeater management unit 1314 relays all MIB set/get requests, start requests, reset requests, request/confirm characteristic commands to a proper block on the repeater.
  • With respect to block tunneling protocol 1 layer 1310, frames for both MPDUs and MMPDUs between the switch and repeater are transferred by the tunneling protocol. The frames are encapsulated into the Ethernet frames and the tunneling protocol header is placed after the Ethernet header. This protocol transfers both data and management frames as well as special defined tunneling protocol control messages.
  • An Exemplary Switch Software Architecture
  • The switch contains the switching and management planes. FIG. 14 illustrates one embodiment of the switching plane. Referring to FIG. 14, the switching plane 1400 contains the switch MAC sublayer 1402 (i.e., the upper MAC), a switch management entity (SwME) 1401 and a switching layer 1403. The switching layer 1403 interfaces with the Ethernet drivers 1404 and performs the switching function. The Ethernet drivers 1404 are connected to the 10/100 BT ports of the switch (PORT1 to PORT24) or connected to another Ethernet switch with its uplink connected to the Gigabit interface 1406 on the switch. The simulator 1405 may also be connected to the any of these ports. In one embodiment, in order to support this kind of abstraction, the tunneling protocol header contains the number of the Ethernet port assigned for use with the repeater repeater (repeater 1704 in this example) handling the destination station (station 1705 in this example). Switch MAC sublayer 1703 encapsulates the 802.11 data frames into Ethernet frames and sends them to repeater 1704. Repeater 1704 receives the encapsulated 802.11 data frames and sends the 802.11 data frames to station 1705.
  • FIG. 18 illustrates an exemplary process for transferring data traffic from a desktop computer system to a mobile station. Referring to FIG. 18, computer system 1806 encapsulates IP packets into Ethernet frames. For the first IP packet destined to a mobile station, the router starts an ARP (address resolution protocol) procedure in order to obtain the corresponding MAC address. Router 1805 sends an ARP request to switch MAC sublayer 1804 to request the MAC for this IP broadcast. Switch MAC sublayer 1804 encapsulates the ARP request into an 802.11 packet and then encapsulates this packet into an Ethernet packet, essentially creating a new Ethernet frame with an embedded 802.11 MAC header and tunneling protocol header. Switch MAC sublayer 1804 broadcasts this packet to all repeaters, repeaters 1802-1803 in this example, which then rebroadcast it for the desired mobile station to receive. The mobile station, station 1801, with the IP address contained in the ARP request sends an ARP response with its MAC address. Repeater 1802 receives the ARP response and encapsulates the 802.11 frames into Ethernet frames, adding an Ethernet frame header and tunneling protocol header. Repeater 1802 sends the encapsulated ARP response to switch MAC sublayer 1804, which strips off the 802.11 MAC header and switches the Ethernet frame with encapsulated ARP response packet to the backbone port.
  • After this procedure, the router takes the station MAC address from the ARP response and routes all IP packets for this mobile station as described above. Since the switch MAC sublayer has the configuration information about MAC and IP addresses, the ARP response could come from the switch.
  • Management Procedures
  • There are a number of management procedures supported by the distributed MAC architecture. In one embodiment, these include starting up the switch, resetting the MAC, starting a new BSS, synchronization, authentication, and de-authentication, association, disassociation and re-association.
  • With respect to starting up the switch, the switch is started by the switch management entity (SwME). To configure and start the switch and the repeaters, the SwME issues commands to the switch MAC sublayer on the switch. The commands intended for the repeaters are transferred using the tunneling protocol. Layers of the tunneling protocol are running on the switch and the repeaters.
  • With respect to MAC reset, the switch and repeaters cooperate to perform a reset of the MAC. Since the MAC is distributed between the switch and repeaters, the reset process is modified to support this architecture. In one embodiment, the switch management entity sends a reset request to each of the repeaters as part of a tunneling protocol process and receives a reset response indicating if the reset was successful. The reset process may set the MAC to initial conditions, clearing all internal variables to the default values. MIB (management information base) attributes may be reset to their implementation-dependent default values.
  • With respect to the start process, the switch management entity requests that the MAC entity start a new BSS. The switch management entity generates the request to start an infrastructure BSS (basic service set) with the MAC entity acting as an access point and sends it to all MAC entities where the switch is acting as a multiple access point. Each repeater responds with an indication as to whether the start process was successful.
  • With respect to synchronization, the synchronization process determines the characteristics of the available BSSs and allows for synchronizing the timing of a mobile station with a specified BSS (switch MAC entity). In one embodiment, the synchronization process begins with an instance of the switch MAC sublayer generating a beacon frame, which is encapsulated and sent to the repeaters periodically. The repeater updates the timestamp of the beacon frame before sending the beacon frame in the air. Based on the beacon frame, the mobile station synchronizes its timers.
  • The switch management entity also causes authentication to establish a relationship between a station MAC sublayer and the instances of the switch MAC sublayers. In one embodiment, a mobile station is authenticated if its MAC address is in the access list on the switch. Similarly, de-authentication is supported to invalidate an authentication relationship with a switch MAC entity. In one embodiment, de-authentication is initiated by the mobile station. In this case, the instance of the switch MAC sublayer on the switch associated with the repeater assigned to the mobile station updates the station state as maintained by the switch. The result of de-authentication is that the state of the mobile station is listed in the switch as unauthenticated and unassociated.
  • Association
  • Data frames for a mobile station are forwarded from the repeater that has the token for the mobile station. In one embodiment, if a repeater without the token receives the data frames, it forwards only a short frame with the RSSI (in the tunneling protocol header) to the switch. The switch keeps track of the RSSI for the mobile station. If the repeater without the token has better reception and if the repeater with the token has “high” error rate, the switch may re-assign the token. The RSSI and token are part of the tunneling protocol header. The token assignment occurs within the association process.
  • FIG. 19 is a data flow diagram of one embodiment of an association and token assignment process. Referring to FIG. 19, an association request is generated by a mobile station and sent by the mobile station, via the mobile station MAC. Repeater 2 has the token for the mobile station. Therefore, repeater 2 encapsulates the association request, along with is RSSI and BSSID, into an Ethernet packet and sends the encapsulated packet to the switch.
  • Repeater 1, which does not have the token for the mobile station, forwards a short frame with the RSSI in the tunneling protocol header.
  • The switch takes the RSSIs for the two identical frames and determines which one is stronger. Based on which is stronger, the switch either allows the repeater that has the token and station MAC for the mobile station to keep them (e.g., repeater 2) or reassigns them to the repeater with the higher RSSI (e.g., repeater 1). In either case, the switch sends an association response encapsulated in an Ethernet packet with the token and association ID to the repeater, which de-encapsulates it and forwards it to the mobile station, via the mobile station MAC.
  • Re-Association
  • The following exemplary procedure describes how a mobile station becomes re-associated with another switch MAC entity (logical access point). FIG. 20 is a block diagram of two MAC sublayer instances in a switch. Referring to FIG. 20, two (or more) instances of the switch MAC sublayer run on the switch (offering the access points (APs) inside the same switch). Each instance has its own BSSID (basic service set identification) (e.g., the MAC address of the MAC instance). Both MAC instances are managed by the same switch management entity (SwME). The SwME manages these as multiple access points (APs) inside the switch. In one embodiment, communication between MAC instances is through the SwME. Both MAC instances as well as the switch management entity (SwME) reside on the same switch. Communication between the MAC instances can be direct or through the SwME. In one embodiment, the SwME has knowledge of all MAC instances and is involved in this communication. Thus, the switch acts as a distribution system containing multiple switch MAC sublayer instances (multiple logical access points) in which roaming is centralized in the switch.
  • In one embodiment, the association request from the mobile station is encapsulated and sent by the repeater to the switch. The association request with the BSSID of the first MAC sublayer instance is sent from the second MAC sublayer instance through the SwME to the first MAC sublayer instance. As a result, the first MAC sublayer instance generates a response representing that mobile station has been already associated with the first MAC sublayer instance. Using this process, the station does not have to go again through authentication procedure and it can be automatically associated with the second MAC sublayer instance. When the second MAC sublayer instance receives the response, the station becomes associated with the second MAC sublayer. Thus, when the station roamed, the handover procedure is performed in the switch. Therefore, the switch acts as a complete distribution system with multiple logical access points.
  • As described above, when a station roams between two MAC sublayer instances (logical access points) inside one distribution system, there is only one repeater controlled by one MAC sublayer instance. In one embodiment, a mobile station can roam from one repeater to another repeater controlled by the same MAC sublayer instance (logical access point) without a need to associate again, and only the token re-assignment procedure described herein has to be performed. In one embodiment, the station is not aware of the token re-assignment procedure.
  • If a mobile station moves from one repeater belonging to one logical access point (one MAC sublayer instance) to a second repeater belonging to a second logical access point (second MAC sublayer instance), the station has to be re-associated and the token re-assignment procedure has to be performed. The handover procedure is performed in the switch. Again, the station is not aware of any token assignment procedures.
  • Note that mobile stations are associated with switch MAC sublayers instances not with a repeater. If a station is controlled by a repeater, the repeater has a token for that station. All repeaters controlled by a particular MAC sublayer instance are associated with a station if the station is associated with that MAC sublayer instance, and only one repeater has a token for that station.
  • A user can configure the switch to have any number of MAC instances. In one embodiment, this is configured using a parameter. Also configurable is which repeater belongs to MAC instance. For example, if the switch has 64 ports, it can be configured to act as 8 access points (8 upper MAC instances running concurrently), with 8 repeaters per access point (one upper MAC sublayer controlling 8 repeaters).
  • FIG. 21 is a data flow diagram of one embodiment of a re-association process. Referring to FIG. 21, a mobile station SME (station management entity) generates a re-association request and sends it to a repeater, repeater 4 in this case, along with its BSSID via the mobile station MAC. In one embodiment, the mobile station knows that it needs to make a re-association request because it has received a BEACON frame with different BSSID (i.e., a different MAC instance), indicating that the mobile station had been roaming. The repeater receives the re-association request, encapsulates the packets of the re-association request with the RSSI into an Ethernet packet, and sends the Ethernet packet to the instance of the switch MAC sublayer associated with the repeater. In response thereto, the instance of the switch MAC sublayer generates an indication to the switch management entity indicating that a re-association request has been made.
  • In response to the indication, the switch management entity causes a new AID (association id) to be assigned to the mobile station, a token for the mobile station to be assigned to a new repeater, and the previous token assignment to be deleted. In one embodiment, the association identifier (AID) is a number (value between 0 and 2007) assigned to a mobile station by the switch or an access point during the association procedure. It is an 802.11 standard defined parameter. After the station is associated, the station inserts the AID in every message. More specifically, the switch management entity updates the entry for the mobile station in the access list, including setting the new access point address to the address of the instance of the switch MAC sublayer associated with the repeater. The switch management entity also assigns a token and an association ID.
  • The switch management entity sends a delete token command to the instance of the switch MAC layer associated with the repeater previously assigned to the mobile station, which the instance of the switch MAC layer forwards to the repeater (repeater 3 in this case).
  • The instance of the switch MAC sublayer (upper MAC 2 in this case) associated with the repeater that forwarded the re-associate request (repeater 4 in this case) sends a re-associate response frame to the repeater with the token, association ID, and an indication that the re-association was successful. The repeater de-encapsulates the packet, stores the mobile station MAC token, and forwards the de-encapsulated re-associate response frame to the mobile station MAC with the association ID and the successful indication.
  • Disassociation
  • A mobile station may request disassociation with a specified peer MAC entity that is acting as a logical access point. The mobile station may request this due to inactivity or because a switch is unable to handle all currently associated mobile stations, etc. FIG. 22 is a flow diagram on one embodiment of a disassociation process. Referring to FIG. 22, a disassociation request is generated by the SME (station management entity) on the mobile station and sent by the mobile station MAC as a disassociate request frame with the BSSID (i.e., the instance identifiers). The BSSID is a basic service set identifier representing the MAC address of an upper MAC instance. Each repeaters that receives the disassociate request frame without errors encapsulates it with its RSSI and forwards it to the switch, regardless of whether it has the token for the mobile station. In response to the receiving the disassociate request frame, the switch MAC sublayer determines whether the mobile station is in the access list and changes the state of the mobile station in the access list to authenticated and unassociated, removes all parameters from the access list entry for the mobile station, and deletes the token and association M. In one embodiment, the access list is a dynamically created hash table containing records for all authenticated stations, in which each record contains a station MAC address, association identifier, BSSID, a station state, and a repeater port number which has station token. In other words, on the switch MAC sublayer, the state of the mobile station is updated and its AID is deleted. The switch then sends a disassociate response frame encapsulated in an Ethernet frame to the repeater having the token. Embedded in the tunneling protocol header of the frame is a tunneling protocol command to delete the token, which causes the repeater having the token to delete the token. Thereafter, the repeater that deleted the token sends the de-encapsulated disassociate response frame to the MAC of the mobile station with an indication that disassociation was successful.
  • In one embodiment, this process can be initiated by the switch management entity. This can happen if the switch decides to disassociate the mobile station because of inactivity or because a switch is unable to handle all currently associated mobile stations.
  • Tracking Multiple Interface Connections
  • A technique is disclosed herein that tracks when a mobile (or fixed) station is attempting to connect to the network over more than a predetermined number (e.g., one) of station interfaces. That is, the technique determines whether a user is trying to connect over more than a predetermined number of interfaces (e.g., 1, 2, 3, etc.) and if a connection is attempted that would cause the station to be connected to the network through a number of interfaces larger than the allowed limit, then action(s) may be taken against the station (e.g., disable one or more connections, deny a connection, etc.). Note that for purpose of the following discussion, the station will be described as a mobile station. However, in an alternative embodiment, the station is fixed.
  • In one embodiment, the technique includes a switch allowing a mobile station to have one connection to a network over a first of its interfaces. Thereafter, the switch determines that the mobile station is attempting to have a second connection to the network over a second interface other than the first interface. In one embodiment, the first interface is a wireless interface for communicating to a repeater using, for example, an 802.11 communication channel, and the second interface is a wired interface, such as, for example, a wired Ethernet cable. In one embodiment, the switch makes the determination by checking memory associated with the mobile station to see if the two interfaces belong to the same mobile station. This may be accomplished by having the switch access a memory, local or remote, storing a table, or list, of mobile stations along with a list of the interfaces available for each of the listed mobile stations. In one embodiment, the list of mobile stations is a table (e.g., an access control list) and the switch searches the locations in the table to determine if media access control (MAC) addresses of the first and second interfaces are listed as belonging to the mobile station. In one embodiment, the access control list includes an entry for each mobile station with multiple columns (or rows) for MAC addresses, one for each interface that the mobile station has with a MAC address.
  • In one embodiment, the switch enforces a security policy in response to determining that a mobile station is attempting to connect to the network over one interface when already connected over another interface. In such situations, there are two possible security policies. First, the security policy may permit connection to the network through multiple interfaces. Second, the security policy may not permit connection to the network through multiple interfaces of the same mobile station. In one embodiment, in response to such a case, the switch may deny the new connection that is being attempted, may deny the previous connection that already exists (in favor of the new connection), or may deny both connections. For more than two interfaces in the station, a more complex admission control algorithm may be used.
  • In one embodiment, in order to deny the new connection, the switch disables the MAC address associated with the interface attempting to connect to the network, and in order to deny the previously existing connection, the switch may remove the MAC address associated with the interface that is already connected to the network from a list of active stations (e.g., the active stations list).
  • In one embodiment, the switch uses an access control list and the active stations list. The access control list is where the security policy is enforced, while the active stations list is the list of all mobile stations currently active in the system. Each mobile station that may potentially have a connection to the network is listed in the access control list. For each interface of a mobile station that has a connection to the network, there is a MAC address in the active stations list. When a mobile station attempts to connect to the network through one of its interfaces, the MAC address of the interface is sent. In response to receiving the MAC address, the controller of the switch searches the access control list for the MAC address. If the MAC address is not in the access control list, the controller of the switch denies access. If the controller finds the MAC address in the access control list, the controller finds the security policy in the entry in the access control list associated with the MAC address to determine what security policy, if any, is supposed to be enforced. This means that the access control list records which interfaces are active.
  • To deny a connection for an interface already connected to the network, the switch removes the MAC address for the interface from the active stations list. This action causes process is performed by the switch. Referring to FIG. 23A, the process begins by processing logic allowing a mobile station a connection to the network over a first interface (processing block 2301). Next, processing logic determines the mobile station is attempting to have another connection over a second interface (processing block 2302). In response, processing logic enforces a security policy (e.g., allows it, denies one or more of the connections, prevents the mobile station from accessing the network, etc.) (processing block 2303).
  • An alternative embodiment of the switch of FIG. 12A is shown in FIG. 23B. Referring to FIG. 23B, a switch controller 2310 is coupled to ports 2311 and memory 2312. Switch controller 2310 performs the process described in FIG. 23A and above regarding the monitoring of connections and requests for connections. Switch controller 2310 uses ports 2311 to communicate with the repeaters in the system as well as other devices, via, in one embodiment, a wired Ethernet connection. Memory 2312 stores the active stations list 2314 and the access control list 2313. Active stations list 2314 includes a table having an entry for each mobile station and fields (e.g., columns, rows, etc.) to store the MAC address of each interface the mobile station has. Access control list 2313 includes entries to store mobile stations along with an indication of whether access is permitted for each interface of a mobile station and an indication of the security policy associated with that mobile station. Memory 2312 may be a part of the switch or part of an external memory or server (e.g., a radius server).
  • Thus, the technique described herein reconciles multiple interfaces that correspond to the same mobile station when the mobile station has access to a network resource through one of its interfaces and attempts to gain access to the network resource through another one of its interfaces. The techniques described herein also include the enforcement of a security policy with respect to such a mobile station.
  • Whereas many alterations and modifications of the present invention will no doubt become apparent to a person of ordinary skill in the art after having read the foregoing description, it is to be understood that any particular embodiment shown and described by way of illustration is in no way intended to be considered limiting. Therefore, references to details of various embodiments are not intended to limit the scope of the claims which in themselves recite only those features regarded as essential to the invention.

Claims (21)

1-25. (canceled)
26. A method for tracking multiple interface connections by stations comprising:
allowing a station to have a first connection to a network over a first interface; and
denying the station a second connection to the network over a second interface other than a first interface by checking an indicator bit associated with the second interface to determine whether a MAC address for the second interface is allowed to register for access to the network.
27. The method of claim 26, wherein the denying step includes checking whether the indicator bit is stored in an access control list.
28. The method of claim 27, wherein checking whether the indicator bit is stored in an access control list further includes checking a table having an entry for each station and fields to store a MAC address associated with each interface of the station.
29. The method of claim 27, further comprising clearing the indicator bit from the access control list by an IP manager.
30. The method of claim 26, wherein the station is selected from a group comprising a mobile phone, a cellular phone, a cordless phone, a headset, a voice-enabled mobile station, a laptop computer system, a personal digital assistant, a computer-data-enabled mobile station, or a fixed station.
31. A device for providing access to a network for one or more stations, the device comprising:
a switch having a plurality of ports; and
a controller coupled to the switch;
wherein the controller allows a station to have a first connection to a network over a first interface and determines that the station is attempting to have a second connection to the network over a second interface other than the first interface, and wherein the controller determines whether to allow connection to the network by querying a server to check whether media access control (MAC) addresses associated with the first and second interfaces belong to the station.
32. The device of claim 31, wherein the station is selected from a group comprising a mobile phone, a cellular phone, a cordless phone, a headset, a voice-enabled mobile station, a laptop computer system, a personal digital assistant, a computer-data-enabled mobile station, or a fixed station.
33. The device of claim 31, wherein the server stores and maintains media access control (MAC) addresses associated with one or more interfaces belonging to the station.
34. An apparatus for providing access to a network for one or more stations comprising:
means for allowing a station to have a first connection to a network over a first interface;
means for determining that the station is attempting to have a second connection to the network over a second interface other than the first interface; and
means for checking whether media access control (MAC) addresses associated with the first and second interfaces belong to the station.
35. The apparatus of claim 34, wherein the station is one selected from a group comprising a mobile phone, a cellular phone, a cordless phone, a headset, a voice-enabled mobile station, a laptop computer system, a personal digital assistant, a computer-data-enabled mobile station, or a fixed station.
36. The apparatus of claim 34, further comprising means for accessing a memory.
37. The apparatus of claim 36, wherein the memory is local, and stores an active stations list and an access control list.
38. The apparatus of claim 36, wherein the memory is remote, and stores an active stations list and an access control list.
39. The apparatus of claim 34, further comprising means for enforcing a security policy if the station is attempting to connect to the network over the second interface.
40. The apparatus of claim 39, further comprising means for denying connection to the network through multiple interfaces of the same station, and wherein the means for enforcing the security policy comprises means for denying the second connection to the network.
41. The apparatus of claim 40, further comprising means for disabling a MAC address associated with the second interface.
42. The apparatus of claim 39, further comprising means for denying connection to the network through multiple interfaces of the same station, and wherein means for enforcing the security policy comprises means for disabling the first connection to the network.
43. The apparatus of claim 42, further comprising means for removing a MAC address associated with the first interface from a list of active stations.
44. The apparatus of claim 39, further comprising means for denying connection to the network through multiple interfaces of the same station, and wherein enforcing the security policy comprises denying the first and second connections to the network.
45. The apparatus of claim 39, further comprising means for allowing access to the network by the station over multiple interfaces.
US11/819,138 2002-01-11 2007-06-25 Tracking multiple interface connections by mobile stations Abandoned US20080031185A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/819,138 US20080031185A1 (en) 2002-01-11 2007-06-25 Tracking multiple interface connections by mobile stations

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US10/044,016 US6788658B1 (en) 2002-01-11 2002-01-11 Wireless communication system architecture having split MAC layer
US10/663,167 US7236470B1 (en) 2002-01-11 2003-09-15 Tracking multiple interface connections by mobile stations
US11/819,138 US20080031185A1 (en) 2002-01-11 2007-06-25 Tracking multiple interface connections by mobile stations

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US10/663,167 Continuation US7236470B1 (en) 2002-01-11 2003-09-15 Tracking multiple interface connections by mobile stations

Publications (1)

Publication Number Publication Date
US20080031185A1 true US20080031185A1 (en) 2008-02-07

Family

ID=21930080

Family Applications (3)

Application Number Title Priority Date Filing Date
US10/044,016 Expired - Lifetime US6788658B1 (en) 2002-01-11 2002-01-11 Wireless communication system architecture having split MAC layer
US10/663,167 Expired - Lifetime US7236470B1 (en) 2002-01-11 2003-09-15 Tracking multiple interface connections by mobile stations
US11/819,138 Abandoned US20080031185A1 (en) 2002-01-11 2007-06-25 Tracking multiple interface connections by mobile stations

Family Applications Before (2)

Application Number Title Priority Date Filing Date
US10/044,016 Expired - Lifetime US6788658B1 (en) 2002-01-11 2002-01-11 Wireless communication system architecture having split MAC layer
US10/663,167 Expired - Lifetime US7236470B1 (en) 2002-01-11 2003-09-15 Tracking multiple interface connections by mobile stations

Country Status (3)

Country Link
US (3) US6788658B1 (en)
AU (1) AU2003217192A1 (en)
WO (1) WO2003060666A2 (en)

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030133422A1 (en) * 2002-01-11 2003-07-17 Harry Bims Mobility support via routing
US20040210654A1 (en) * 2003-04-21 2004-10-21 Hrastar Scott E. Systems and methods for determining wireless network topology
US20050099962A1 (en) * 2003-10-24 2005-05-12 Brother Kogyo Kabushiki Kaisha Network device management system, network device management device, and network device management program
US20050174960A1 (en) * 2003-02-14 2005-08-11 Perlman Stephen G. Method of operation for a three-dimensional, wireless network
US20050213579A1 (en) * 2004-03-23 2005-09-29 Iyer Pradeep J System and method for centralized station management
US20060189343A1 (en) * 2005-02-18 2006-08-24 Samsung Electronics Co., Ltd. Method for forming power-efficient network
US20070008889A1 (en) * 2005-07-11 2007-01-11 Cheong-Jeong Seo Wireless distribution system (WDS) repeater in wireless local area network (WLAN) and its control method
US20070047484A1 (en) * 2002-01-11 2007-03-01 Broadcom Corporation Location tracking in a wireless communication system using power levels of packets received by repeaters
US20070060128A1 (en) * 2005-08-19 2007-03-15 Tae-Young Kil Apparatus and method for detecting data transmission mode of access point in wireless terminal
US20070171887A1 (en) * 2006-01-25 2007-07-26 Intel Corporation Apparatus, system and method with improved coexistence between multiple wireless communication techniques
US20090150955A1 (en) * 2007-12-11 2009-06-11 Dong Joon Choi Apparatus and method for switch operation of downstream terminal platform for ip data transmission using legacy transmission system in hfc network
US20090225679A1 (en) * 2002-01-11 2009-09-10 Broadcom Corporation Reconfiguration of a communication system
US7689210B1 (en) 2002-01-11 2010-03-30 Broadcom Corporation Plug-n-playable wireless communication system
US20100309914A1 (en) * 2009-06-05 2010-12-09 Ambit Microsystems (Shanghai) Ltd. Router and datagram multicasting method
US7876704B1 (en) 2002-01-11 2011-01-25 Broadcom Corporation Tunneling protocols for wireless communications
US20110113483A1 (en) * 2009-11-11 2011-05-12 Microsoft Corporation Virtual host security profiles
US8027637B1 (en) 2002-01-11 2011-09-27 Broadcom Corporation Single frequency wireless communication system
US8355358B2 (en) 2002-06-05 2013-01-15 Broadcom Corporation Distributed MAC architecture for wireless repeater
US20130272269A1 (en) * 2012-04-12 2013-10-17 Praveen Srivastava Handoffs between access points in a wi-fi environment
US20130297723A1 (en) * 2012-05-02 2013-11-07 Guest Tek Interactive Entertainment Ltd. Automatic client device location detection within hospitality establishment
US20140033263A1 (en) * 2012-07-25 2014-01-30 Nec Magnus Communications, Ltd. Communication apparatus, and method and program for controlling the same
US20150023340A1 (en) * 2003-04-04 2015-01-22 Infineon Technologies Taiwan Co., Ltd. Method for Transmitting Frames in a Wireless Local Area Network
US9432848B2 (en) 2004-03-23 2016-08-30 Aruba Networks, Inc. Band steering for multi-band wireless clients
EP3361824A4 (en) * 2015-10-09 2019-03-06 Withwin Technology Shenzhen Co., Ltd Method of controlling radio access equipment and device utilizing same
US20220182337A1 (en) * 2016-11-16 2022-06-09 Huawei Technologies Co., Ltd. Data Migration Method and Apparatus

Families Citing this family (117)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6862448B1 (en) * 2002-01-11 2005-03-01 Broadcom Corporation Token-based receiver diversity
US6788658B1 (en) * 2002-01-11 2004-09-07 Airflow Networks Wireless communication system architecture having split MAC layer
US7212837B1 (en) 2002-05-24 2007-05-01 Airespace, Inc. Method and system for hierarchical processing of protocol information in a wireless LAN
US7327697B1 (en) 2002-06-25 2008-02-05 Airespace, Inc. Method and system for dynamically assigning channels across multiple radios in a wireless LAN
US7593356B1 (en) 2002-06-25 2009-09-22 Cisco Systems, Inc. Method and system for dynamically assigning channels across multiple access elements in a wireless LAN
US20040066787A1 (en) * 2002-10-03 2004-04-08 Agere Systems Inc. Centralized concentrator and method of distributing wireless communications in a computer network
US7492714B1 (en) * 2003-02-04 2009-02-17 Pmc-Sierra, Inc. Method and apparatus for packet grooming and aggregation
US8027315B2 (en) * 2003-02-12 2011-09-27 Nortel Networks Limited Antenna diversity
WO2004073206A1 (en) 2003-02-14 2004-08-26 Nortel Networks Limited Antenna diversity
US7508801B1 (en) 2003-03-21 2009-03-24 Cisco Systems, Inc. Light-weight access point protocol
US7346338B1 (en) 2003-04-04 2008-03-18 Airespace, Inc. Wireless network system including integrated rogue access point detection
US7342906B1 (en) 2003-04-04 2008-03-11 Airespace, Inc. Distributed wireless network security system
US7301926B1 (en) 2003-04-04 2007-11-27 Airespace, Inc. Automatic coverage hole detection in computer network environments
US7313113B1 (en) * 2003-04-04 2007-12-25 Airespace, Inc. Dynamic transmit power configuration system for wireless network environments
US20040218630A1 (en) * 2003-05-03 2004-11-04 Samsung Electronics Co., Ltd. Wireless-compatible MAC frame transmitting/receiving method and apparatus
US8204435B2 (en) * 2003-05-28 2012-06-19 Broadcom Corporation Wireless headset supporting enhanced call functions
US7340247B1 (en) 2003-05-29 2008-03-04 Airespace, Inc. Wireless network infrastructure including wireless discovery and communication mechanism
US7453840B1 (en) 2003-06-30 2008-11-18 Cisco Systems, Inc. Containment of rogue systems in wireless network environments
US7539169B1 (en) 2003-06-30 2009-05-26 Cisco Systems, Inc. Directed association mechanism in wireless network environments
US7643442B1 (en) 2003-06-30 2010-01-05 Cisco Systems, Inc. Dynamic QoS configuration based on transparent processing of session initiation messages
US7881463B1 (en) * 2003-09-26 2011-02-01 Netopia, Inc. Wireless digital subscriber line device having reduced RF interference
JP4185853B2 (en) * 2003-11-28 2008-11-26 株式会社日立コミュニケーションテクノロジー Wireless system, server, and mobile station
US20050086334A1 (en) * 2003-10-17 2005-04-21 Nokia Corporation System and associated terminal, method and computer program product for recording content usage statistics
US7002943B2 (en) * 2003-12-08 2006-02-21 Airtight Networks, Inc. Method and system for monitoring a selected region of an airspace associated with local area networks of computing devices
US7440434B2 (en) * 2004-02-11 2008-10-21 Airtight Networks, Inc. Method and system for detecting wireless access devices operably coupled to computer local area networks and related methods
US7536723B1 (en) 2004-02-11 2009-05-19 Airtight Networks, Inc. Automated method and system for monitoring local area computer networks for unauthorized wireless access
US7260408B2 (en) * 2004-02-20 2007-08-21 Airespace, Inc. Wireless node location mechanism using antenna pattern diversity to enhance accuracy of location estimates
US7286833B2 (en) 2004-02-27 2007-10-23 Airespace, Inc. Selective termination of wireless connections to refresh signal information in wireless node location infrastructure
US7205938B2 (en) * 2004-03-05 2007-04-17 Airespace, Inc. Wireless node location mechanism responsive to observed propagation characteristics of wireless network infrastructure signals
US8509179B1 (en) * 2004-04-30 2013-08-13 Sprint Spectrum L.P. Method and system for power control in a wireless LAN
US7433696B2 (en) * 2004-05-18 2008-10-07 Cisco Systems, Inc. Wireless node location mechanism featuring definition of search region to optimize location computation
JP2006033124A (en) * 2004-07-13 2006-02-02 Fujitsu Ltd Tunnel fault notification device and method
US7286835B1 (en) * 2004-09-10 2007-10-23 Airespace, Inc. Enhanced wireless node location using differential signal strength metric
US7643451B2 (en) * 2004-10-15 2010-01-05 Nortel Networks Limited Method and apparatus for extending a mobile unit data path between access points
DE102004052331A1 (en) * 2004-10-27 2006-05-04 Nec Europe Ltd. Method for controlling communication with mobile stations in a network
US7516174B1 (en) 2004-11-02 2009-04-07 Cisco Systems, Inc. Wireless network security mechanism including reverse network address translation
US7457262B1 (en) 2004-11-05 2008-11-25 Cisco Systems, Inc. Graphical display of status information in a wireless network management system
GB0424628D0 (en) * 2004-11-08 2004-12-08 Nokia Corp Communication system
US7420942B2 (en) * 2004-12-09 2008-09-02 Research In Motion Limited Different delivery traffic indication message (DTIM) periods for different wireless networks having different network names
US7593417B2 (en) * 2005-01-21 2009-09-22 Research In Motion Limited Handling broadcast and multicast traffic as unicast traffic in a wireless network
US8005032B2 (en) * 2005-01-21 2011-08-23 Research In Motion Limited Maintaining delivery traffic indication message (DTIM) periods on a per-wireless client device basis
US7778601B2 (en) * 2005-01-24 2010-08-17 Broadcom Corporation Pairing modular wireless earpiece/microphone (HEADSET) to a serviced base portion and subsequent access thereto
US20060166717A1 (en) * 2005-01-24 2006-07-27 Nambirajan Seshadri Managing access of modular wireless earpiece/microphone (HEADSET) to public/private servicing base station
US7555318B2 (en) * 2005-02-15 2009-06-30 Broadcom Corporation Handover of call serviced by modular ear-piece/microphone between servicing base portions
US7596376B2 (en) * 2005-02-18 2009-09-29 Cisco Technology, Inc. Methods, apparatuses and systems facilitating client handoffs in wireless network systems
US7805140B2 (en) * 2005-02-18 2010-09-28 Cisco Technology, Inc. Pre-emptive roaming mechanism allowing for enhanced QoS in wireless network environments
EP1713206A1 (en) * 2005-04-11 2006-10-18 Last Mile Communications/Tivis Limited A distributed communications network comprising wirelessly linked base stations
US8190773B2 (en) * 2005-06-03 2012-05-29 Nokia Corporation System and method for accessing a web server on a device with a dynamic IP-address residing behind a firewall
US7339915B2 (en) * 2005-10-11 2008-03-04 Cisco Technology, Inc. Virtual LAN override in a multiple BSSID mode of operation
US20070105498A1 (en) * 2005-11-07 2007-05-10 Nokia Corporation Call forwarding to wireless headset
US9794801B1 (en) 2005-12-05 2017-10-17 Fortinet, Inc. Multicast and unicast messages in a virtual cell communication system
US9142873B1 (en) 2005-12-05 2015-09-22 Meru Networks Wireless communication antennae for concurrent communication in an access point
US8344953B1 (en) 2008-05-13 2013-01-01 Meru Networks Omni-directional flexible antenna support panel
US9730125B2 (en) 2005-12-05 2017-08-08 Fortinet, Inc. Aggregated beacons for per station control of multiple stations across multiple access points in a wireless communication network
US8160664B1 (en) 2005-12-05 2012-04-17 Meru Networks Omni-directional antenna supporting simultaneous transmission and reception of multiple radios with narrow frequency separation
US8472359B2 (en) 2009-12-09 2013-06-25 Meru Networks Seamless mobility in wireless networks
US9025581B2 (en) 2005-12-05 2015-05-05 Meru Networks Hybrid virtual cell and virtual port wireless network architecture
US9215745B1 (en) * 2005-12-09 2015-12-15 Meru Networks Network-based control of stations in a wireless communication network
US8064601B1 (en) 2006-03-31 2011-11-22 Meru Networks Security in wireless communication systems
US9215754B2 (en) 2007-03-07 2015-12-15 Menu Networks Wi-Fi virtual port uplink medium access control
US9185618B1 (en) * 2005-12-05 2015-11-10 Meru Networks Seamless roaming in wireless networks
US7710933B1 (en) * 2005-12-08 2010-05-04 Airtight Networks, Inc. Method and system for classification of wireless devices in local area computer networks
GB0526272D0 (en) * 2005-12-23 2006-02-01 Nokia Corp Efficient use of the radio spectrum
US7649875B2 (en) * 2005-12-23 2010-01-19 Beecher Phillip E Networking layer extension
US7821986B2 (en) * 2006-05-31 2010-10-26 Cisco Technology, Inc. WLAN infrastructure provided directions and roaming
TWI307232B (en) * 2006-06-09 2009-03-01 Hon Hai Prec Ind Co Ltd Wireless local area network with protection function and method for preventing attack
US7620003B2 (en) * 2006-06-28 2009-11-17 Motorola, Inc. System and method of operation of a communication network
US7499718B2 (en) * 2006-08-01 2009-03-03 Cisco Technology, Inc. Enhanced coverage hole detection in wireless networks
US7848770B2 (en) * 2006-08-29 2010-12-07 Lgc Wireless, Inc. Distributed antenna communications system and methods of implementing thereof
US8059011B2 (en) * 2006-09-15 2011-11-15 Itron, Inc. Outage notification system
US20080072047A1 (en) * 2006-09-20 2008-03-20 Futurewei Technologies, Inc. Method and system for capwap intra-domain authentication using 802.11r
US7808908B1 (en) 2006-09-20 2010-10-05 Meru Networks Wireless rate adaptation
JP5072864B2 (en) 2006-12-27 2012-11-14 パナソニック株式会社 Communication system and domain management device
US8290357B2 (en) * 2007-03-15 2012-10-16 Nvidia Corporation Auto-exposure technique in a camera
FR2913845B1 (en) * 2007-03-15 2009-09-25 Alcatel Lucent Sas MOBILE BI-MODE TELEPHONE TERMINAL CAPABLE OF INHIBITING AUTOMATICALLY AND COMPLETELY THE RADIO TRANSMISSION OF ITS INTERFACE FOR A GLOBAL WIRELESS TELECOMMUNICATION NETWORK
US8340512B2 (en) * 2007-03-15 2012-12-25 Nvidia Corporation Auto focus technique in an image capture device
CN101335663B (en) * 2007-06-26 2012-07-18 无锡中科智能信息处理研发中心有限公司 Wireless local area network access method
US7596461B2 (en) * 2007-07-06 2009-09-29 Cisco Technology, Inc. Measurement of air quality in wireless networks
US20090019539A1 (en) * 2007-07-11 2009-01-15 Airtight Networks, Inc. Method and system for wireless communications characterized by ieee 802.11w and related protocols
US8799648B1 (en) 2007-08-15 2014-08-05 Meru Networks Wireless network controller certification authority
US8522353B1 (en) 2007-08-15 2013-08-27 Meru Networks Blocking IEEE 802.11 wireless access
US9838911B1 (en) 2007-08-20 2017-12-05 Fortinet, Inc. Multitier wireless data distribution
US8081589B1 (en) 2007-08-28 2011-12-20 Meru Networks Access points using power over ethernet
US8010820B1 (en) 2007-08-28 2011-08-30 Meru Networks Controlling multiple-radio wireless communication access points when using power over Ethernet
US7894436B1 (en) 2007-09-07 2011-02-22 Meru Networks Flow inspection
US8295177B1 (en) 2007-09-07 2012-10-23 Meru Networks Flow classes
US8145136B1 (en) 2007-09-25 2012-03-27 Meru Networks Wireless diagnostics
US7970894B1 (en) 2007-11-15 2011-06-28 Airtight Networks, Inc. Method and system for monitoring of wireless devices in local area computer networks
WO2009076994A1 (en) * 2007-12-14 2009-06-25 Telefonaktiebolaget Lm Ericsson (Publ) Adaptive radio repeaters
WO2009076995A1 (en) * 2007-12-14 2009-06-25 Telefonaktiebolaget Lm Ericsson (Publ) Adaptive radio repeaters
US8284191B1 (en) 2008-04-04 2012-10-09 Meru Networks Three-dimensional wireless virtual reality presentation
US8893252B1 (en) 2008-04-16 2014-11-18 Meru Networks Wireless communication selective barrier
US7756059B1 (en) 2008-05-19 2010-07-13 Meru Networks Differential signal-to-noise ratio based rate adaptation
US8830341B2 (en) * 2008-05-22 2014-09-09 Nvidia Corporation Selection of an optimum image in burst mode in a digital camera
US8325753B1 (en) 2008-06-10 2012-12-04 Meru Networks Selective suppression of 802.11 ACK frames
US8369794B1 (en) 2008-06-18 2013-02-05 Meru Networks Adaptive carrier sensing and power control
US8238834B1 (en) 2008-09-11 2012-08-07 Meru Networks Diagnostic structure for wireless networks
US8599734B1 (en) 2008-09-30 2013-12-03 Meru Networks TCP proxy acknowledgements
CN101577978B (en) 2009-02-27 2011-02-16 西安西电捷通无线网络通信股份有限公司 Method for realizing convergence WAPI network architecture in local MAC mode
CN101577904B (en) 2009-02-27 2011-04-06 西安西电捷通无线网络通信股份有限公司 Method for realizing convergence WAPI network architecture in separated MAC mode
CN101577905B (en) * 2009-02-27 2011-06-01 西安西电捷通无线网络通信股份有限公司 Method for realizing convergence WAPI network architecture in separated MAC mode
US9197482B1 (en) 2009-12-29 2015-11-24 Meru Networks Optimizing quality of service in wireless networks
US8346160B2 (en) * 2010-05-12 2013-01-01 Andrew Llc System and method for detecting and measuring uplink traffic in signal repeating systems
US8565818B1 (en) 2010-09-16 2013-10-22 Sprint Communications Company L.P. Broadband wireless router
KR101472100B1 (en) * 2010-12-22 2014-12-11 주식회사 케이티 Base station apparatus and data processing method in wireless communication system
US8941539B1 (en) 2011-02-23 2015-01-27 Meru Networks Dual-stack dual-band MIMO antenna
US8644771B1 (en) 2011-05-26 2014-02-04 Sprint Communications Company L.P. Short range wireless power consumption management
US8417806B2 (en) 2011-05-27 2013-04-09 Dell Products, Lp System and method for optimizing secured internet small computer system interface storage area networks
US9917752B1 (en) 2011-06-24 2018-03-13 Fortinet, Llc Optimization of contention paramaters for quality of service of VOIP (voice over internet protocol) calls in a wireless communication network
US9906650B2 (en) 2011-06-26 2018-02-27 Fortinet, Llc Voice adaptation for wireless communication
US9392158B2 (en) 2012-10-04 2016-07-12 Nvidia Corporation Method and system for intelligent dynamic autofocus search
US9621780B2 (en) 2012-10-04 2017-04-11 Nvidia Corporation Method and system of curve fitting for common focus measures
US9031393B2 (en) 2013-06-12 2015-05-12 Nvidia Corporation Methods for enhancing camera focusing performance using camera orientation
JP6300454B2 (en) * 2013-06-14 2018-03-28 キヤノン株式会社 COMMUNICATION DEVICE, COMMUNICATION METHOD, AND PROGRAM
US10098164B2 (en) * 2014-07-17 2018-10-09 Benu Networks, Inc. System and methods for providing virtualized cloud peering emulation services
US9451627B1 (en) 2014-12-16 2016-09-20 Silvus Technologies, Inc. Single transceiver-DSA via MAC-underlay sensing and signaling
US10257758B2 (en) 2015-07-27 2019-04-09 Microsoft Technology Licensing, Llc Migrating wireless channels using dual media access controllers

Citations (97)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4166927A (en) * 1978-07-21 1979-09-04 British Columbia Telephone Company Apparatus and method for frequency channel selection in a radiotelephone system
US4284848A (en) * 1979-08-01 1981-08-18 Frost Edward G Switched network telephone subscriber distribution system
US4534061A (en) * 1983-09-06 1985-08-06 General Electric Company Deterministic multi-access method for a decentralized mobile radio system
US4809257A (en) * 1985-04-02 1989-02-28 International Business Machines Corporation Hierarchical distributed infrared communication system
US5093927A (en) * 1989-10-20 1992-03-03 Motorola, Inc. Two-way communication system
US5384776A (en) * 1991-02-22 1995-01-24 Erricsson Ge Mobile Communications Inc. Audio routing within trunked radio frequency multisite switch
US5392449A (en) * 1992-06-29 1995-02-21 Motorola, Inc. Resource management by an intelligent repeater
US5440558A (en) * 1990-03-22 1995-08-08 Nec Corporation Data link setup in connection-oriented local area network with floating administration of data link addresses
US5507035A (en) * 1993-04-30 1996-04-09 International Business Machines Corporation Diversity transmission strategy in mobile/indoor cellula radio communications
US5548837A (en) * 1994-03-28 1996-08-20 Hess; Garry C. Method and apparatus for producing diversity gain of a received signal
US5592468A (en) * 1994-07-13 1997-01-07 Nec Corporation Wireless local area network system with improved transfer efficiency and data transfer method for same
US5594731A (en) * 1994-07-29 1997-01-14 International Business Machines Corporation Access point tracking for mobile wireless network node
US5633858A (en) * 1994-07-28 1997-05-27 Accton Technology Corporation Method and apparatus used in hashing algorithm for reducing conflict probability
US5636220A (en) * 1994-03-01 1997-06-03 Motorola, Inc. Packet delivery method for use in a wireless local area network (LAN)
US5717688A (en) * 1993-06-25 1998-02-10 Netwave Technologies Limited Wireless local area network with roaming indicating multiple communication ranges
US5774461A (en) * 1995-09-27 1998-06-30 Lucent Technologies Inc. Medium access control and air interface subsystem for an indoor wireless ATM network
US5815811A (en) * 1989-06-29 1998-09-29 Symbol Technologies, Inc. Preemptive roaming in a cellular local area wireless network
US5862345A (en) * 1996-02-07 1999-01-19 Nec Corporation System for location multicasting and database management for mobile sessions in any computer subnetworks without using a home router of a home subnetwork
US5862481A (en) * 1996-04-08 1999-01-19 Northern Telecom Limited Inter-technology roaming proxy
US5875179A (en) * 1996-10-29 1999-02-23 Proxim, Inc. Method and apparatus for synchronized communication over wireless backbone architecture
US5903834A (en) * 1995-10-06 1999-05-11 Telefonaktiebolaget L/M Ericsson Distributed indoor digital multiple-access cellular telephone system
US5905859A (en) * 1997-01-09 1999-05-18 International Business Machines Corporation Managed network device security method and apparatus
US5923702A (en) * 1996-06-10 1999-07-13 Breeze Wireless Communications Ltd. Frequency hopping cellular LAN system
US5923792A (en) * 1996-02-07 1999-07-13 Industrial Technology Research Institute Screen display methods for computer-aided data entry
US5946308A (en) * 1995-11-15 1999-08-31 Cabletron Systems, Inc. Method for establishing restricted broadcast groups in a switched network
US5958018A (en) * 1996-10-30 1999-09-28 Lucent Technologies Inc. Wireless services data network translating mac address to asynchronous transfer mode (ATM) address
US6011970A (en) * 1997-07-23 2000-01-04 Nortel Networks Corporation Method and system for assuring near uniform capacity and quality of channels in cells of wireless communications systems having cellular architectures
US6038448A (en) * 1997-07-23 2000-03-14 Nortel Networks Corporation Wireless communication system having hand-off based upon relative pilot signal strengths
US6052598A (en) * 1997-09-30 2000-04-18 At&T Corp Method for predicting the location of a mobile station in a mobile communications network
US6058106A (en) * 1997-10-20 2000-05-02 Motorola, Inc. Network protocol method, access point device and peripheral devices for providing for an efficient centrally coordinated peer-to-peer wireless communications network
US6067297A (en) * 1996-06-28 2000-05-23 Symbol Technologies, Inc. Embedded access point supporting communication with mobile unit operating in power-saving mode
US6085238A (en) * 1996-04-23 2000-07-04 Matsushita Electric Works, Ltd. Virtual LAN system
US6084528A (en) * 1996-09-05 2000-07-04 Symbol Technologies, Inc. Intranet scanning terminal system
US6091717A (en) * 1997-05-05 2000-07-18 Nokia Mobile Phones Limited Method for scheduling packet data transmission
US6097707A (en) * 1995-05-19 2000-08-01 Hodzic; Migdat I. Adaptive digital wireless communications network apparatus and process
US6115615A (en) * 1996-02-26 2000-09-05 Fuji Xerox Co., Ltd. Cellular communication network and its communication method
US6178426B1 (en) * 1998-01-15 2001-01-23 Symbol Technologies, Inc. Apparatus with extended markup language data capture capability
US6188898B1 (en) * 1996-12-23 2001-02-13 Nortel Networks Limited Mobile communications network
US6188681B1 (en) * 1998-04-01 2001-02-13 Symbol Technologies, Inc. Method and apparatus for determining alternative second stationary access point in response to detecting impeded wireless connection
US6199753B1 (en) * 1996-09-05 2001-03-13 Symbol Technologies, Inc. Method and system for presenting item information using a portable data terminal
US6243581B1 (en) * 1998-12-11 2001-06-05 Nortel Networks Limited Method and system for seamless roaming between wireless communication networks with a mobile terminal
US6253082B1 (en) * 1998-07-30 2001-06-26 The Whitaker Corporation Method for selecting an alternate channel in a wireless communications system
US6259898B1 (en) * 1998-05-05 2001-07-10 Telxon Corporation Multi-communication access point
US6285665B1 (en) * 1997-10-14 2001-09-04 Lucent Technologies Inc. Method for establishment of the power level for uplink data transmission in a multiple access system for communications networks
US20010024953A1 (en) * 2000-02-24 2001-09-27 Peter Balogh Method and equipment for supporting mobility in a telecommunication system
US20020037719A1 (en) * 2000-01-11 2002-03-28 Nec Corporation Tree structure type wireless network system and relay station device
US6370380B1 (en) * 1999-02-17 2002-04-09 Telefonaktiebolaget Lm Ericsson (Publ) Method for secure handover
US20020055362A1 (en) * 2000-11-07 2002-05-09 Nec Corporation Positioning method using mobile terminal and mobile terminal having positioning function
US20020061763A1 (en) * 2000-11-21 2002-05-23 Haim Weissman Automatic gain setting in a cellular communications system
US20020060995A1 (en) * 2000-07-07 2002-05-23 Koninklijke Philips Electronics N.V. Dynamic channel selection scheme for IEEE 802.11 WLANs
US6396841B1 (en) * 1998-06-23 2002-05-28 Kingston Technology Co. Dual-speed stackable repeater with internal bridge for cascading or speed-linking
US6405049B2 (en) * 1997-08-05 2002-06-11 Symbol Technologies, Inc. Portable data terminal and cradle
US6404772B1 (en) * 2000-07-27 2002-06-11 Symbol Technologies, Inc. Voice and data wireless communications network and method
US20020073338A1 (en) * 2000-11-22 2002-06-13 Compaq Information Technologies Group, L.P. Method and system for limiting the impact of undesirable behavior of computers on a shared data network
US20020075844A1 (en) * 2000-12-15 2002-06-20 Hagen W. Alexander Integrating public and private network resources for optimized broadband wireless access and method
US20020075825A1 (en) * 2000-12-14 2002-06-20 Hills Alexander H. Method for estimating signal strengths
US6411608B2 (en) * 2000-07-12 2002-06-25 Symbol Technologies, Inc. Method and apparatus for variable power control in wireless communications systems
US20020085719A1 (en) * 2000-07-24 2002-07-04 Bluesocket, Inc. Method and system for enabling centralized control of wireless local area networks
US6420995B1 (en) * 1965-04-05 2002-07-16 Systems Information And Electronic Systems Integration, Inc. Radar and IFF system
US20020131386A1 (en) * 2001-01-26 2002-09-19 Docomo Communications Laboratories Usa, Inc. Mobility prediction in wireless, mobile access digital networks
US20030012168A1 (en) * 2001-07-03 2003-01-16 Jeremy Elson Low-latency multi-hop ad hoc wireless network
US20030021250A1 (en) * 2001-07-24 2003-01-30 Willins Bruce A. Blue tooth out-of-band management and traffic monitoring for wireless access points
US6522880B1 (en) * 2000-02-28 2003-02-18 3Com Corporation Method and apparatus for handoff of a connection between network devices
US6522881B1 (en) * 2000-03-08 2003-02-18 Lucent Technologies Inc. Method and apparatus for selecting an access point in a wireless network
US20030051170A1 (en) * 2001-08-15 2003-03-13 Spearman Anthony C. Secure and seemless wireless public domain wide area network and method of using the same
US20030063583A1 (en) * 1997-11-03 2003-04-03 Roberto Padovani Method and apparatus for high rate packet data transmission
US6556547B1 (en) * 1998-12-15 2003-04-29 Nortel Networks Limited Method and apparatus providing for router redundancy of non internet protocols using the virtual router redundancy protocol
US20030087629A1 (en) * 2001-09-28 2003-05-08 Bluesocket, Inc. Method and system for managing data traffic in wireless networks
US20030106067A1 (en) * 2001-11-30 2003-06-05 Hoskins Steve J. Integrated internet protocol (IP) gateway services in an RF cable network
US20030112778A1 (en) * 2001-12-19 2003-06-19 Lundby Stein A. Efficient multi-cast broadcasting for packet data systems
US20030120801A1 (en) * 2001-12-21 2003-06-26 Keever Darin W. Method and apparatus for a group communication system
US20030119523A1 (en) * 2001-12-20 2003-06-26 Willem Bulthuis Peer-based location determination
US6594475B1 (en) * 1999-09-09 2003-07-15 International Business Machines Corporation Mobile battery discharge minimization in indoor wireless networks by antenna switching
US20030133422A1 (en) * 2002-01-11 2003-07-17 Harry Bims Mobility support via routing
US20030146835A1 (en) * 2000-03-31 2003-08-07 Ge Medical Systems Information Technologies, Inc. Object location monitoring within buildings
US6611547B1 (en) * 1997-04-15 2003-08-26 Nokia Telecommunications Oy Method of avoiding packet loss at a handover in a packet-based telecommunications network and handover method
US6674403B2 (en) * 2001-09-05 2004-01-06 Newbury Networks, Inc. Position detection and location tracking in a wireless network
US6683866B1 (en) * 1999-10-29 2004-01-27 Ensemble Communications Inc. Method and apparatus for data transportation and synchronization between MAC and physical layers in a wireless communication system
US6717924B2 (en) * 2002-01-08 2004-04-06 Qualcomm Incorporated Control-hold mode
US6745049B1 (en) * 1997-12-10 2004-06-01 Mitsubishi Denki Kabushiki Kaisha Mobile communication system
US6757286B1 (en) * 1997-03-24 2004-06-29 Alcatel Self-configuring communication network
US6760877B1 (en) * 1999-05-12 2004-07-06 Nokia Mobile Phones, Ltd. Method for forming acknowledgement data in a wireless communication system and a wireless communication system
US6760318B1 (en) * 2002-01-11 2004-07-06 Airflow Networks Receiver diversity in a communication system
US20040152471A1 (en) * 2001-04-03 2004-08-05 Macdonald Alan Denis Methods and apparatus for mobile station location estimation
US6839560B1 (en) * 1999-02-25 2005-01-04 Microsoft Corporation Using a derived table of signal strength data to locate and track a user in a wireless network
US6842777B1 (en) * 2000-10-03 2005-01-11 Raja Singh Tuli Methods and apparatuses for simultaneous access by multiple remote devices
US6857095B2 (en) * 1999-12-31 2005-02-15 Nokia Mobile Phones, Ltd. Method for making data transmission more effective and a data transmission protocol
US6862448B1 (en) * 2002-01-11 2005-03-01 Broadcom Corporation Token-based receiver diversity
US20050063347A1 (en) * 2001-08-21 2005-03-24 Nokia Corporation Transmission of data within a communications network
US7003272B1 (en) * 1997-03-03 2006-02-21 Robert Bosch Gmbh Radio apparatus with adjustable reception quality
US7035633B2 (en) * 2001-10-23 2006-04-25 Bellsouth Intellectual Property Corporation Apparatus for providing a gateway between a wired telephone and a wireless telephone network
US7039017B2 (en) * 2001-12-28 2006-05-02 Texas Instruments Incorporated System and method for detecting and locating interferers in a wireless communication system
US7069433B1 (en) * 2001-02-20 2006-06-27 At&T Corp. Mobile host using a virtual single account client and server system for network access and management
US20070025349A1 (en) * 2002-06-05 2007-02-01 Broadcom Corporation Distributed MAC architecture for wireless repeater
US7236470B1 (en) * 2002-01-11 2007-06-26 Broadcom Corporation Tracking multiple interface connections by mobile stations
US7257378B2 (en) * 1999-06-04 2007-08-14 Nokia Siemens Networks Oy Testing device and software
US7515557B1 (en) * 2002-01-11 2009-04-07 Broadcom Corporation Reconfiguration of a communication system

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6002918A (en) 1989-06-29 1999-12-14 Symbol Technologies, Inc. Power-saving arrangement and method for mobile units in communications network
US5461627A (en) 1991-12-24 1995-10-24 Rypinski; Chandos A. Access protocol for a common channel wireless network
US5479400A (en) 1994-06-06 1995-12-26 Metricom, Inc. Transceiver sharing between access and backhaul in a wireless digital communication system
GB9500825D0 (en) 1995-01-17 1995-03-08 Macnamee Robert J G Radio communications systems with repeaters
US5987062A (en) 1995-12-15 1999-11-16 Netwave Technologies, Inc. Seamless roaming for wireless local area networks
US5825776A (en) 1996-02-27 1998-10-20 Ericsson Inc. Circuitry and method for transmitting voice and data signals upon a wireless communication channel
US5991287A (en) 1996-12-30 1999-11-23 Lucent Technologies, Inc. System and method for providing seamless handover in a wireless computer network
US6137802A (en) * 1997-03-25 2000-10-24 Motorola, Inc. Automatic media switching apparatus and method
US6137791A (en) 1997-03-25 2000-10-24 Ericsson Telefon Ab L M Communicating packet data with a mobile station roaming within an incompatible mobile network
US6130896A (en) * 1997-10-20 2000-10-10 Intel Corporation Wireless LAN segments with point coordination
US6452915B1 (en) * 1998-07-10 2002-09-17 Malibu Networks, Inc. IP-flow classification in a wireless point to multi-point (PTMP) transmission system
US6633761B1 (en) * 2000-08-11 2003-10-14 Reefedge, Inc. Enabling seamless user mobility in a short-range wireless networking environment
US7016325B2 (en) 2001-01-18 2006-03-21 Strix Systems, Inc. Link context mobility method and system for providing such mobility, such as a system employing short range frequency hopping spread spectrum wireless protocols
US6501582B2 (en) * 2001-02-22 2002-12-31 Digital Atlantic, Inc. Cascaded line-of sight free-space communications system
US7206840B2 (en) 2001-05-11 2007-04-17 Koninklike Philips Electronics N.V. Dynamic frequency selection scheme for IEEE 802.11 WLANs

Patent Citations (99)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6420995B1 (en) * 1965-04-05 2002-07-16 Systems Information And Electronic Systems Integration, Inc. Radar and IFF system
US4166927A (en) * 1978-07-21 1979-09-04 British Columbia Telephone Company Apparatus and method for frequency channel selection in a radiotelephone system
US4284848A (en) * 1979-08-01 1981-08-18 Frost Edward G Switched network telephone subscriber distribution system
US4534061A (en) * 1983-09-06 1985-08-06 General Electric Company Deterministic multi-access method for a decentralized mobile radio system
US4809257A (en) * 1985-04-02 1989-02-28 International Business Machines Corporation Hierarchical distributed infrared communication system
US5815811A (en) * 1989-06-29 1998-09-29 Symbol Technologies, Inc. Preemptive roaming in a cellular local area wireless network
US5093927A (en) * 1989-10-20 1992-03-03 Motorola, Inc. Two-way communication system
US5440558A (en) * 1990-03-22 1995-08-08 Nec Corporation Data link setup in connection-oriented local area network with floating administration of data link addresses
US5384776A (en) * 1991-02-22 1995-01-24 Erricsson Ge Mobile Communications Inc. Audio routing within trunked radio frequency multisite switch
US5392449A (en) * 1992-06-29 1995-02-21 Motorola, Inc. Resource management by an intelligent repeater
US5507035A (en) * 1993-04-30 1996-04-09 International Business Machines Corporation Diversity transmission strategy in mobile/indoor cellula radio communications
US5875186A (en) * 1993-06-25 1999-02-23 Netwave Technologies Limited Dynamic wireless local area network with interactive communications within the network
US5717688A (en) * 1993-06-25 1998-02-10 Netwave Technologies Limited Wireless local area network with roaming indicating multiple communication ranges
US5636220A (en) * 1994-03-01 1997-06-03 Motorola, Inc. Packet delivery method for use in a wireless local area network (LAN)
US5548837A (en) * 1994-03-28 1996-08-20 Hess; Garry C. Method and apparatus for producing diversity gain of a received signal
US5592468A (en) * 1994-07-13 1997-01-07 Nec Corporation Wireless local area network system with improved transfer efficiency and data transfer method for same
US5633858A (en) * 1994-07-28 1997-05-27 Accton Technology Corporation Method and apparatus used in hashing algorithm for reducing conflict probability
US5594731A (en) * 1994-07-29 1997-01-14 International Business Machines Corporation Access point tracking for mobile wireless network node
US6097707A (en) * 1995-05-19 2000-08-01 Hodzic; Migdat I. Adaptive digital wireless communications network apparatus and process
US5774461A (en) * 1995-09-27 1998-06-30 Lucent Technologies Inc. Medium access control and air interface subsystem for an indoor wireless ATM network
US5903834A (en) * 1995-10-06 1999-05-11 Telefonaktiebolaget L/M Ericsson Distributed indoor digital multiple-access cellular telephone system
US5946308A (en) * 1995-11-15 1999-08-31 Cabletron Systems, Inc. Method for establishing restricted broadcast groups in a switched network
US5923792A (en) * 1996-02-07 1999-07-13 Industrial Technology Research Institute Screen display methods for computer-aided data entry
US5862345A (en) * 1996-02-07 1999-01-19 Nec Corporation System for location multicasting and database management for mobile sessions in any computer subnetworks without using a home router of a home subnetwork
US6115615A (en) * 1996-02-26 2000-09-05 Fuji Xerox Co., Ltd. Cellular communication network and its communication method
US5862481A (en) * 1996-04-08 1999-01-19 Northern Telecom Limited Inter-technology roaming proxy
US6085238A (en) * 1996-04-23 2000-07-04 Matsushita Electric Works, Ltd. Virtual LAN system
US5923702A (en) * 1996-06-10 1999-07-13 Breeze Wireless Communications Ltd. Frequency hopping cellular LAN system
US6067297A (en) * 1996-06-28 2000-05-23 Symbol Technologies, Inc. Embedded access point supporting communication with mobile unit operating in power-saving mode
US6199753B1 (en) * 1996-09-05 2001-03-13 Symbol Technologies, Inc. Method and system for presenting item information using a portable data terminal
US6084528A (en) * 1996-09-05 2000-07-04 Symbol Technologies, Inc. Intranet scanning terminal system
US5875179A (en) * 1996-10-29 1999-02-23 Proxim, Inc. Method and apparatus for synchronized communication over wireless backbone architecture
US5958018A (en) * 1996-10-30 1999-09-28 Lucent Technologies Inc. Wireless services data network translating mac address to asynchronous transfer mode (ATM) address
US6188898B1 (en) * 1996-12-23 2001-02-13 Nortel Networks Limited Mobile communications network
US5905859A (en) * 1997-01-09 1999-05-18 International Business Machines Corporation Managed network device security method and apparatus
US7003272B1 (en) * 1997-03-03 2006-02-21 Robert Bosch Gmbh Radio apparatus with adjustable reception quality
US6757286B1 (en) * 1997-03-24 2004-06-29 Alcatel Self-configuring communication network
US6611547B1 (en) * 1997-04-15 2003-08-26 Nokia Telecommunications Oy Method of avoiding packet loss at a handover in a packet-based telecommunications network and handover method
US6091717A (en) * 1997-05-05 2000-07-18 Nokia Mobile Phones Limited Method for scheduling packet data transmission
US6038448A (en) * 1997-07-23 2000-03-14 Nortel Networks Corporation Wireless communication system having hand-off based upon relative pilot signal strengths
US6011970A (en) * 1997-07-23 2000-01-04 Nortel Networks Corporation Method and system for assuring near uniform capacity and quality of channels in cells of wireless communications systems having cellular architectures
US6405049B2 (en) * 1997-08-05 2002-06-11 Symbol Technologies, Inc. Portable data terminal and cradle
US6052598A (en) * 1997-09-30 2000-04-18 At&T Corp Method for predicting the location of a mobile station in a mobile communications network
US6285665B1 (en) * 1997-10-14 2001-09-04 Lucent Technologies Inc. Method for establishment of the power level for uplink data transmission in a multiple access system for communications networks
US6058106A (en) * 1997-10-20 2000-05-02 Motorola, Inc. Network protocol method, access point device and peripheral devices for providing for an efficient centrally coordinated peer-to-peer wireless communications network
US20030063583A1 (en) * 1997-11-03 2003-04-03 Roberto Padovani Method and apparatus for high rate packet data transmission
US6745049B1 (en) * 1997-12-10 2004-06-01 Mitsubishi Denki Kabushiki Kaisha Mobile communication system
US6178426B1 (en) * 1998-01-15 2001-01-23 Symbol Technologies, Inc. Apparatus with extended markup language data capture capability
US6188681B1 (en) * 1998-04-01 2001-02-13 Symbol Technologies, Inc. Method and apparatus for determining alternative second stationary access point in response to detecting impeded wireless connection
US6259898B1 (en) * 1998-05-05 2001-07-10 Telxon Corporation Multi-communication access point
US6393261B1 (en) * 1998-05-05 2002-05-21 Telxon Corporation Multi-communication access point
US6396841B1 (en) * 1998-06-23 2002-05-28 Kingston Technology Co. Dual-speed stackable repeater with internal bridge for cascading or speed-linking
US6253082B1 (en) * 1998-07-30 2001-06-26 The Whitaker Corporation Method for selecting an alternate channel in a wireless communications system
US6243581B1 (en) * 1998-12-11 2001-06-05 Nortel Networks Limited Method and system for seamless roaming between wireless communication networks with a mobile terminal
US6556547B1 (en) * 1998-12-15 2003-04-29 Nortel Networks Limited Method and apparatus providing for router redundancy of non internet protocols using the virtual router redundancy protocol
US6370380B1 (en) * 1999-02-17 2002-04-09 Telefonaktiebolaget Lm Ericsson (Publ) Method for secure handover
US6839560B1 (en) * 1999-02-25 2005-01-04 Microsoft Corporation Using a derived table of signal strength data to locate and track a user in a wireless network
US6760877B1 (en) * 1999-05-12 2004-07-06 Nokia Mobile Phones, Ltd. Method for forming acknowledgement data in a wireless communication system and a wireless communication system
US7257378B2 (en) * 1999-06-04 2007-08-14 Nokia Siemens Networks Oy Testing device and software
US6594475B1 (en) * 1999-09-09 2003-07-15 International Business Machines Corporation Mobile battery discharge minimization in indoor wireless networks by antenna switching
US6683866B1 (en) * 1999-10-29 2004-01-27 Ensemble Communications Inc. Method and apparatus for data transportation and synchronization between MAC and physical layers in a wireless communication system
US6857095B2 (en) * 1999-12-31 2005-02-15 Nokia Mobile Phones, Ltd. Method for making data transmission more effective and a data transmission protocol
US20020037719A1 (en) * 2000-01-11 2002-03-28 Nec Corporation Tree structure type wireless network system and relay station device
US20010024953A1 (en) * 2000-02-24 2001-09-27 Peter Balogh Method and equipment for supporting mobility in a telecommunication system
US6522880B1 (en) * 2000-02-28 2003-02-18 3Com Corporation Method and apparatus for handoff of a connection between network devices
US6522881B1 (en) * 2000-03-08 2003-02-18 Lucent Technologies Inc. Method and apparatus for selecting an access point in a wireless network
US20030146835A1 (en) * 2000-03-31 2003-08-07 Ge Medical Systems Information Technologies, Inc. Object location monitoring within buildings
US20020060995A1 (en) * 2000-07-07 2002-05-23 Koninklijke Philips Electronics N.V. Dynamic channel selection scheme for IEEE 802.11 WLANs
US6411608B2 (en) * 2000-07-12 2002-06-25 Symbol Technologies, Inc. Method and apparatus for variable power control in wireless communications systems
US20020085719A1 (en) * 2000-07-24 2002-07-04 Bluesocket, Inc. Method and system for enabling centralized control of wireless local area networks
US6404772B1 (en) * 2000-07-27 2002-06-11 Symbol Technologies, Inc. Voice and data wireless communications network and method
US6842777B1 (en) * 2000-10-03 2005-01-11 Raja Singh Tuli Methods and apparatuses for simultaneous access by multiple remote devices
US20020055362A1 (en) * 2000-11-07 2002-05-09 Nec Corporation Positioning method using mobile terminal and mobile terminal having positioning function
US20020061763A1 (en) * 2000-11-21 2002-05-23 Haim Weissman Automatic gain setting in a cellular communications system
US20020073338A1 (en) * 2000-11-22 2002-06-13 Compaq Information Technologies Group, L.P. Method and system for limiting the impact of undesirable behavior of computers on a shared data network
US20020075825A1 (en) * 2000-12-14 2002-06-20 Hills Alexander H. Method for estimating signal strengths
US20020075844A1 (en) * 2000-12-15 2002-06-20 Hagen W. Alexander Integrating public and private network resources for optimized broadband wireless access and method
US20020131386A1 (en) * 2001-01-26 2002-09-19 Docomo Communications Laboratories Usa, Inc. Mobility prediction in wireless, mobile access digital networks
US7069433B1 (en) * 2001-02-20 2006-06-27 At&T Corp. Mobile host using a virtual single account client and server system for network access and management
US20040152471A1 (en) * 2001-04-03 2004-08-05 Macdonald Alan Denis Methods and apparatus for mobile station location estimation
US20030012168A1 (en) * 2001-07-03 2003-01-16 Jeremy Elson Low-latency multi-hop ad hoc wireless network
US20030021250A1 (en) * 2001-07-24 2003-01-30 Willins Bruce A. Blue tooth out-of-band management and traffic monitoring for wireless access points
US20030051170A1 (en) * 2001-08-15 2003-03-13 Spearman Anthony C. Secure and seemless wireless public domain wide area network and method of using the same
US20050063347A1 (en) * 2001-08-21 2005-03-24 Nokia Corporation Transmission of data within a communications network
US6674403B2 (en) * 2001-09-05 2004-01-06 Newbury Networks, Inc. Position detection and location tracking in a wireless network
US20030087629A1 (en) * 2001-09-28 2003-05-08 Bluesocket, Inc. Method and system for managing data traffic in wireless networks
US7035633B2 (en) * 2001-10-23 2006-04-25 Bellsouth Intellectual Property Corporation Apparatus for providing a gateway between a wired telephone and a wireless telephone network
US20030106067A1 (en) * 2001-11-30 2003-06-05 Hoskins Steve J. Integrated internet protocol (IP) gateway services in an RF cable network
US20030112778A1 (en) * 2001-12-19 2003-06-19 Lundby Stein A. Efficient multi-cast broadcasting for packet data systems
US20030119523A1 (en) * 2001-12-20 2003-06-26 Willem Bulthuis Peer-based location determination
US20030120801A1 (en) * 2001-12-21 2003-06-26 Keever Darin W. Method and apparatus for a group communication system
US7039017B2 (en) * 2001-12-28 2006-05-02 Texas Instruments Incorporated System and method for detecting and locating interferers in a wireless communication system
US6717924B2 (en) * 2002-01-08 2004-04-06 Qualcomm Incorporated Control-hold mode
US6862448B1 (en) * 2002-01-11 2005-03-01 Broadcom Corporation Token-based receiver diversity
US6760318B1 (en) * 2002-01-11 2004-07-06 Airflow Networks Receiver diversity in a communication system
US20030133422A1 (en) * 2002-01-11 2003-07-17 Harry Bims Mobility support via routing
US7236470B1 (en) * 2002-01-11 2007-06-26 Broadcom Corporation Tracking multiple interface connections by mobile stations
US7515557B1 (en) * 2002-01-11 2009-04-07 Broadcom Corporation Reconfiguration of a communication system
US20070025349A1 (en) * 2002-06-05 2007-02-01 Broadcom Corporation Distributed MAC architecture for wireless repeater

Cited By (47)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8027637B1 (en) 2002-01-11 2011-09-27 Broadcom Corporation Single frequency wireless communication system
US7689210B1 (en) 2002-01-11 2010-03-30 Broadcom Corporation Plug-n-playable wireless communication system
US8144640B2 (en) 2002-01-11 2012-03-27 Broadcom Corporation Location tracking in a wireless communication system using power levels of packets received by repeaters
US20100189013A1 (en) * 2002-01-11 2010-07-29 Broadcom Corporation Plug-In-Playable Wireless Communication System
US20030133422A1 (en) * 2002-01-11 2003-07-17 Harry Bims Mobility support via routing
US7876704B1 (en) 2002-01-11 2011-01-25 Broadcom Corporation Tunneling protocols for wireless communications
US7672274B2 (en) 2002-01-11 2010-03-02 Broadcom Corporation Mobility support via routing
US20070047484A1 (en) * 2002-01-11 2007-03-01 Broadcom Corporation Location tracking in a wireless communication system using power levels of packets received by repeaters
US20090225679A1 (en) * 2002-01-11 2009-09-10 Broadcom Corporation Reconfiguration of a communication system
US8064380B2 (en) 2002-01-11 2011-11-22 Broadcom Corporation Reconfiguration of a communication system
US8189538B2 (en) 2002-01-11 2012-05-29 Broadcom Corporation Reconfiguration of a communication system
US8355358B2 (en) 2002-06-05 2013-01-15 Broadcom Corporation Distributed MAC architecture for wireless repeater
US7715336B2 (en) * 2003-02-14 2010-05-11 Onlive, Inc. Method of operation for a three-dimensional, wireless network
US20050174960A1 (en) * 2003-02-14 2005-08-11 Perlman Stephen G. Method of operation for a three-dimensional, wireless network
US20150023340A1 (en) * 2003-04-04 2015-01-22 Infineon Technologies Taiwan Co., Ltd. Method for Transmitting Frames in a Wireless Local Area Network
US20040210654A1 (en) * 2003-04-21 2004-10-21 Hrastar Scott E. Systems and methods for determining wireless network topology
US8379537B2 (en) * 2003-10-24 2013-02-19 Brother Kogyo Kabushiki Kaisha Network device management system, network device management device, and network device management program
US20050099962A1 (en) * 2003-10-24 2005-05-12 Brother Kogyo Kabushiki Kaisha Network device management system, network device management device, and network device management program
US9432848B2 (en) 2004-03-23 2016-08-30 Aruba Networks, Inc. Band steering for multi-band wireless clients
US8750272B2 (en) 2004-03-23 2014-06-10 Aruba Networks, Inc. System and method for centralized station management
US9019911B2 (en) 2004-03-23 2015-04-28 Aruba Networks, Inc. System and method for centralized station management
US7969937B2 (en) * 2004-03-23 2011-06-28 Aruba Networks, Inc. System and method for centralized station management
US20050213579A1 (en) * 2004-03-23 2005-09-29 Iyer Pradeep J System and method for centralized station management
US20120218931A1 (en) * 2004-03-23 2012-08-30 Iyer Pradeep J System and Method for Centralized Station Management
US20060189343A1 (en) * 2005-02-18 2006-08-24 Samsung Electronics Co., Ltd. Method for forming power-efficient network
US20070008889A1 (en) * 2005-07-11 2007-01-11 Cheong-Jeong Seo Wireless distribution system (WDS) repeater in wireless local area network (WLAN) and its control method
US7801095B2 (en) * 2005-08-19 2010-09-21 Samsung Electronics Co., Ltd. Apparatus and method for detecting data transmission mode of access point in wireless terminal
US20070060128A1 (en) * 2005-08-19 2007-03-15 Tae-Young Kil Apparatus and method for detecting data transmission mode of access point in wireless terminal
US20070171887A1 (en) * 2006-01-25 2007-07-26 Intel Corporation Apparatus, system and method with improved coexistence between multiple wireless communication techniques
US20090150955A1 (en) * 2007-12-11 2009-06-11 Dong Joon Choi Apparatus and method for switch operation of downstream terminal platform for ip data transmission using legacy transmission system in hfc network
US20100309914A1 (en) * 2009-06-05 2010-12-09 Ambit Microsystems (Shanghai) Ltd. Router and datagram multicasting method
CN102687458A (en) * 2009-11-11 2012-09-19 微软公司 Virtual host security profiles
US9531674B2 (en) 2009-11-11 2016-12-27 Microsoft Technology Licensing, Llc Virtual host security profiles
US20110113483A1 (en) * 2009-11-11 2011-05-12 Microsoft Corporation Virtual host security profiles
EP2499777A4 (en) * 2009-11-11 2016-12-14 Microsoft Technology Licensing Llc Virtual host security profiles
WO2011059768A3 (en) * 2009-11-11 2011-09-29 Microsoft Corporation Virtual host security profiles
WO2011059768A2 (en) 2009-11-11 2011-05-19 Microsoft Corporation Virtual host security profiles
US10327184B2 (en) 2012-04-12 2019-06-18 Time Warner Cable Enterprises Llc Handoffs between access points in a Wi-Fi environment
US20130272269A1 (en) * 2012-04-12 2013-10-17 Praveen Srivastava Handoffs between access points in a wi-fi environment
US9008045B2 (en) * 2012-04-12 2015-04-14 Time Warner Cable Enterprises Llc Handoffs between access points in a Wi-Fi environment
US9325590B2 (en) 2012-05-02 2016-04-26 Guest Tek Interactive Entertainment Ltd. Automatic switch-mapping and client device location detection
US9009259B2 (en) * 2012-05-02 2015-04-14 Guest Tek Interactive Entertainment Ltd. Automatic client device location detection within hospitality establishment
US20130297723A1 (en) * 2012-05-02 2013-11-07 Guest Tek Interactive Entertainment Ltd. Automatic client device location detection within hospitality establishment
US8914838B2 (en) * 2012-07-25 2014-12-16 Nec Magnus Communications, Ltd. Communication apparatus that suppresses interference of communication signal of communication apparatus using a cable, and method and program for controlling the same
US20140033263A1 (en) * 2012-07-25 2014-01-30 Nec Magnus Communications, Ltd. Communication apparatus, and method and program for controlling the same
EP3361824A4 (en) * 2015-10-09 2019-03-06 Withwin Technology Shenzhen Co., Ltd Method of controlling radio access equipment and device utilizing same
US20220182337A1 (en) * 2016-11-16 2022-06-09 Huawei Technologies Co., Ltd. Data Migration Method and Apparatus

Also Published As

Publication number Publication date
US6788658B1 (en) 2004-09-07
AU2003217192A1 (en) 2003-07-30
US7236470B1 (en) 2007-06-26
WO2003060666A3 (en) 2004-03-25
AU2003217192A8 (en) 2003-07-30
WO2003060666A2 (en) 2003-07-24

Similar Documents

Publication Publication Date Title
US7236470B1 (en) Tracking multiple interface connections by mobile stations
US7643460B2 (en) Distributed MAC architecture for a wireless repeater
US7876704B1 (en) Tunneling protocols for wireless communications
US8027637B1 (en) Single frequency wireless communication system
US20100189013A1 (en) Plug-In-Playable Wireless Communication System
US8064380B2 (en) Reconfiguration of a communication system
US6760318B1 (en) Receiver diversity in a communication system
US8189538B2 (en) Reconfiguration of a communication system
US7957741B2 (en) Token-based receiver diversity
US8144640B2 (en) Location tracking in a wireless communication system using power levels of packets received by repeaters
US7082114B1 (en) System and method for a wireless unit acquiring a new internet protocol address when roaming between two subnets
US7966036B2 (en) Wireless LAN device and communication mode switching method
US20110083165A1 (en) Method and system for regulating, disrupting and preventing access to the wireless medium
Bing Emerging technologies in wireless LANs: theory, design, and deployment
US9137663B2 (en) Radio frequency firewall coordination
US20140254555A1 (en) Method and apparatus for implementing a blanket wireless local area network control plane
MXPA05003536A (en) Wireless communication method and system with controlled wtru peer-to-peer communications.
WO2001099466A2 (en) Apparatus, and associated method, for integrating operation of packet radio communication systems
Labiod et al. Wi-Fi TM, Bluetooth TM, ZigBee TM and WiMax TM
US7308279B1 (en) Dynamic power level control on transmitted messages in a wireless LAN
WO2021135413A1 (en) Energy saving control method and related device
CN104660321A (en) Novel relay base station for extending base station to implement Internet monitor in wireless network
Sahoo A Novel Approach for Survivability of IEEE 802.11 WLAN Against Access Point Failure
KUMAR WIRELESS NETWORK

Legal Events

Date Code Title Description
AS Assignment

Owner name: BROADCOM CORPORATION, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:AIRFLOW NETWORKS INC.;REEL/FRAME:019527/0724

Effective date: 20041025

AS Assignment

Owner name: AIRFLOW NETWORKS, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BIMS, HARRY;REEL/FRAME:022369/0550

Effective date: 20040205

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: BANK OF AMERICA, N.A., AS COLLATERAL AGENT, NORTH CAROLINA

Free format text: PATENT SECURITY AGREEMENT;ASSIGNOR:BROADCOM CORPORATION;REEL/FRAME:037806/0001

Effective date: 20160201

Owner name: BANK OF AMERICA, N.A., AS COLLATERAL AGENT, NORTH

Free format text: PATENT SECURITY AGREEMENT;ASSIGNOR:BROADCOM CORPORATION;REEL/FRAME:037806/0001

Effective date: 20160201

AS Assignment

Owner name: AVAGO TECHNOLOGIES GENERAL IP (SINGAPORE) PTE. LTD., SINGAPORE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BROADCOM CORPORATION;REEL/FRAME:041706/0001

Effective date: 20170120

Owner name: AVAGO TECHNOLOGIES GENERAL IP (SINGAPORE) PTE. LTD

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BROADCOM CORPORATION;REEL/FRAME:041706/0001

Effective date: 20170120

AS Assignment

Owner name: BROADCOM CORPORATION, CALIFORNIA

Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:BANK OF AMERICA, N.A., AS COLLATERAL AGENT;REEL/FRAME:041712/0001

Effective date: 20170119