US20140086060A1 - Self-configuring, self-optimizing wireless local area network system - Google Patents

Self-configuring, self-optimizing wireless local area network system Download PDF

Info

Publication number
US20140086060A1
US20140086060A1 US14/029,354 US201314029354A US2014086060A1 US 20140086060 A1 US20140086060 A1 US 20140086060A1 US 201314029354 A US201314029354 A US 201314029354A US 2014086060 A1 US2014086060 A1 US 2014086060A1
Authority
US
United States
Prior art keywords
wireless
module
access point
modules
stack
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/029,354
Inventor
Leonid Kalika
Alexander Berg
Gabi Abraham
Cyrus Irani
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Strix Systems Inc
Original Assignee
Strix Systems Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Strix Systems Inc filed Critical Strix Systems Inc
Priority to US14/029,354 priority Critical patent/US20140086060A1/en
Publication of US20140086060A1 publication Critical patent/US20140086060A1/en
Assigned to STRIX SYSTEMS, INC. reassignment STRIX SYSTEMS, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: IRANI, CYRUS, KALIKA, LEONID, ABRAHAM, GABI, BERG, ALEXANDER
Priority to US15/145,541 priority patent/US20160323815A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/41Structure of client; Structure of client peripherals
    • H04N21/4104Peripherals receiving signals from specially adapted client devices
    • H04N21/4126The peripheral being portable, e.g. PDAs or mobile phones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/20Selecting an access point
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0805Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
    • H04L43/0811Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking connectivity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0852Delays
    • H04L43/0864Round trip delays
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/18Network planning tools
    • H04W16/20Network planning tools for indoor coverage or short range network deployment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/02Communication route or path selection, e.g. power-based or shortest path routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/24Connectivity information management, e.g. connectivity discovery or connectivity update
    • H04W40/248Connectivity information update
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W64/00Locating users or terminals or network equipment for network management purposes, e.g. mobility management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/005Discovery of network devices, e.g. terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks
    • H04W84/22Self-organising networks, e.g. ad-hoc networks or sensor networks with access to wired networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • H04W88/06Terminal devices adapted for operation in multiple networks or having at least two operational modes, e.g. multi-mode terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W92/00Interfaces specially adapted for wireless communication networks
    • H04W92/02Inter-networking arrangements

Definitions

  • Wireless telecommunications networks employ nodes or access points within a geographic area or space to provide wireless coverage for users.
  • An access point is typically a physical edge device that allows wireless user devices to access network resources, and is sometimes referred to as a node.
  • Wireless local area networks typically employ existing protocols such as those under IEEE 802.11, which is a specification that defines WLAN data link and physical layers.
  • IEEE 802.11 is a specification that defines WLAN data link and physical layers.
  • the 802.11 specification includes a media access control (MAC) sublayer within the data link layer, and two sublayers of the physical layer (PHY)—orthogonal frequency division multiplexing (OFDM) and a direct-sequence spread-spectrum (DSSS) modulation scheme.
  • the Bluetooth specification (IEEE 802.15) uses a frequency-hopping spread spectrum (FHSS) modulation scheme.
  • FHSS frequency-hopping spread spectrum
  • the FHSS technique modulates a data signal with a narrow band carrier signal that “hops” in a predictable sequence from frequency to frequency as a function of time over a wide band of frequencies. Interference is reduced because a narrow band interferer affects the spread-spectrum signal only if both are transmitting at the same frequency and at the same time.
  • the transmission frequencies are determined by a spreading ⁇ hopping) code.
  • the receiver must be set to the same hopping code and must listen at the incoming signal at the proper time and frequency to receive the signal.
  • OFDM splits a wide frequency band into a number of narrow frequency bands and sends data across the sub-channels.
  • DSSS combines a data signal at the sending station with a higher data rate bit sequence, which often is referred to as a “chip sequence.” A high processing gain increases the signal's resistance to interference.
  • WiFi wireless fidelity
  • Other short-range wireless protocols include Hiperlan, which has been adopted by the European Telecommunications Standards Institute (ETSI).
  • ETSI European Telecommunications Standards Institute
  • Other short range wireless protocols and technologies include Bluetooth (IEEE 802.15.1), ultrasonic, infrared, etc.
  • FIG. 1A is a diagram of a wireless local area network or WLAN showing one physical configuration of an embodiment of the invention that provides wireless services to various users and a connection with a conventional wired network.
  • FIG. 1B is a block diagram of a suitable computer for employing aspects of the invention.
  • FIG. 2 is a schematic diagram illustrating an example of a “node,” a number of which can be used to build a wireless network such as that of FIG. 1A .
  • FIG. 3 is a block diagram of software present in each node of the WLAN of FIG. 1 .
  • FIG. 4 is a block diagram of software pertaining to “Bluetooth” wireless functions.
  • FIG. 5 is a state table that describes finite state machine logic applied by the software in each processor-equipped module of a node to determine its own characteristics (“self discovery”) and its role in the WLAN (whether it acts as an “access point” or as a “backhaul” module).
  • FIG. 6 is a logic table showing an intra-stack self-discovery process.
  • FIG. 7 is a logic table for a PENDING state under FIG. 6 .
  • FIG. 8 is a state table that describes finite state machine logic followed by software in processor-equipped modules, which have determined their roles to be that of a “backhaul” module.
  • FIG. 9 is an example of a lookup table that can be used in a calculation of a best combination of round trip delay and signal strength.
  • a wireless local area network system described below solves problems of providing wireless connectivity for a large number of users at low costs for installation and management, with multiple radio-frequency technologies, and high levels of performance, security, robustness and flexibility. It employs a network of “nodes” each of which contains an appropriate set of functional modules to provide at that node the required connectivity services (which can be wired or wireless) and a processor or processors to run the controlling software.
  • the software ensures that nodes are intelligent, self-contained, and act to discover their neighbors. Acting together by means of their distributed intelligence the nodes establish a network of connections that carry data traffic.
  • the software adopts a “mesh” topology for the connections and ensures that routing is optimized, automatically, upon initiation and at frequent intervals thereafter. Thus the system can adjust itself automatically when nodes are added, removed or fail, and the software contains mechanisms that preserve security even in these cases. Other details and aspects are described below.
  • aspects of the invention include a system and associated method provides for a wireless local area network (WLAN) that permits mobile units to communicate with an external, wired network.
  • WLAN wireless local area network
  • Nodes in the WLAN include multiple components, such as a base module, antenna module, and one or more wireless modules. Indeed, this system can employ two or more wireless modules that employ different short-range wireless protocols, such as IEEE 802.11-type and Bluetooth protocols.
  • the nodes may perform self-discovery to determine modules within the node and associated functionality, as well as identify neighboring nodes to thereby establish a mesh-type network. Nodes can be configured to provide connectivity to the wired network, while others (access points) communicate wirelessly with mobile devices. The nodes may then be interconnected wirelessly, or via wires.
  • FIG. 1A shows an example configuration of a wireless local area network (WLAN) system that embodies aspects of the invention.
  • WLAN wireless local area network
  • Many different configurations are possible using the same methods and principles described here.
  • Wireless users may be making use of various types of personal computers 101 equipped with wireless connectivity or portable wireless digital devices 102 .
  • Another class of user that the system is intended to accommodate is made up of small groups of users who have personal computers with wired ethernet connectivity. Such a group is called a workgroup and an example is shown at 103 .
  • Numbers of each of various types of network nodes such as those shown at 104 , 105 , 106 , 107 , 108 and 109 form a wireless network.
  • Each node is an assembly of modules containing the electronics and software that implement the functions described below.
  • the wireless network is intended to connect with a conventional main or backbone wired network system illustrated here by the application servers 110 and their wired ethernet connections 111 .
  • the personal computers 101 and portable devices 102 connect wirelessly into the network through nodes serving as access points 104 , 105 and 106 by means of standard digital wireless technology, of which there are several types in general use, and as described below.
  • the access point used by a particular personal computer or device will ordinarily be the closest one that supports the wireless technology used by the personal computer or wireless device.
  • Workgroup computers such as those shown at 103 are connected to their access point nodes such as 107 by means of ethernet cables.
  • a connection by a user or client to a node such as 101 , 102 or 103 is known as an Access Point (AP) connection.
  • Access Point nodes also connect back to the main backbone wired network system. If the connection back to the main backbone wired network system is wireless it is known as a “Backhaul” (BH) connection.
  • Some access point nodes in a system such as that shown here as 104 , may connect back to the main backbone wired network system via another access point node acting as a relay such as that shown here at 105 .
  • Other access point nodes, such as those shown here at 105 and 107 connect back wirelessly via nodes acting as Network Controllers (NC), shown here at 108 and 109 .
  • Yet other access point nodes, such as 106 may connect back through an ethernet wire, 112 , via a network controller node such as 109 .
  • Networks may contain more or fewer nodes than are shown in this example and many other combinations of wired and wireless data communication functions in particular nodes are possible. Every such network will contain at least one access point for wireless user connection, at least one main network connection by wired ethernet, and at least one network controller for management subsystem services.
  • FIG. 1A and the other FIG.s are well known or described in detail in the above cross-referenced provisional patent application. Indeed, much of the detailed description provided herein is explicitly disclosed in the above provisional patent application; much of the additional material of aspects of the invention will be recognized by those skilled in the relevant art as being inherent in the detailed description provided in such provisional patent application, or well known to those skilled in the relevant art. Those skilled in the relevant art can implement aspects of the invention based on the FIG.s and the detailed description provided in the provisional patent application.
  • FIG. 1B and the following discussion provide a brief, general description of a suitable environment in which aspects of the invention can be implemented.
  • aspects of the invention are described below in the general context of computer-executable instructions, such as routines executed by a general-purpose computer, e.g., a server computer, wireless device or personal computer.
  • a general-purpose computer e.g., a server computer, wireless device or personal computer.
  • PDAs personal digital assistants
  • wearable computers all manner of cellular or mobile phones, multi-processor systems, microprocessor-based or programmable consumer electronics, set-top boxes, network PCs, mini-computers, mainframe computers and the like.
  • the terms “computer”, “host” and “host computer” are generally used interchangeably, and refer to any of the above devices and systems, as well as any data processor.
  • aspects of the invention can be embodied in a special purpose computer or data processor that is specifically programmed, configured or constructed to perform one or more of the computer-executable instructions explained in detail herein.
  • aspects of the invention can be practiced in distributed computing environments where tasks or modules are performed by remote processing devices, which are linked through a communications network, such as a Local Area Network (“LAN”), Wide Area Network (“WAN”) or the Internet.
  • LAN Local Area Network
  • WAN Wide Area Network
  • program modules may be located in both local and remote memory storage devices.
  • aspects of the invention may be stored or distributed on computer-readable media, including magnetically or optically readable computer discs, hard-wired or preprogrammed in chips (e.g., EEPROM semiconductor chips), nanotechnology memory, biological memory, or other data storage medium.
  • chips e.g., EEPROM semiconductor chips
  • computer implemented instructions, data structures, screen displays, and other data under aspects of the invention may be distributed over the Internet or over other networks (including wireless networks), on a propagated signal on a propagation medium (e.g., an electromagnetic wave(s), a sound wave, etc.) over a period of time, or may be provided on any analog or digital network (packet switched, circuit switched or other scheme).
  • portions of the invention reside on a server computer, while corresponding portions reside on a client computer such as a mobile or portable device, and thus, while certain hardware platforms are described herein, aspects of the invention are equally applicable to nodes on a network.
  • one aspect of the invention may be performed on a computer, such as the personal computer 101 , or other computer, which typically employs one or more processors 120 coupled to one or more user input devices 122 and data storage devices 124 .
  • the computer is also coupled to at least one output device such as a display device 126 and one or more optional additional output devices 128 (e.g., printer, plotter, speakers, tactile or olfactory output devices, etc.).
  • the computer may be coupled to external computers, such as via a network connection 130 , a wireless transceiver 132 , or both.
  • the input devices 122 may include a keyboard and/or a pointing device such as a mouse. Other input devices are possible such as a microphone, joystick, pen, game pad, scanner, digital camera, video camera, and the like.
  • the data storage devices 124 may include any type of computer-readable media that can store data accessible by the computer 101 , such as magnetic hard and floppy disk drives, optical disk drives, magnetic cassettes, tape drives, flash memory cards, digital video disks (DVDs), Bernoulli cartridges, RAMs, ROMs, smart cards, etc. Indeed, any medium for storing or transmitting computer-readable instructions and data may be employed, including a connection port to a network such as a local area network (LAN), wide area network (WAN) or the Internet (not shown in FIG. 1B ).
  • LAN local area network
  • WAN wide area network
  • the Internet not shown in FIG. 1B
  • FIG. 2 illustrates an example implementation of a node such as that shown at 104 in FIG. 1 .
  • each node is an assembly, or “stack” of modules each of which contains the hardware and software required to implement its designated function.
  • this access point example of a node is shown as a stack of functional modules including 1) a Wireless Module B 214 , which has the radio-frequency components and other electronics to implement a standard wireless data communication technology such as that described in IEEE specification 802.11b; 2) an embedded computer including processor and memory; and 3) logic to connect with the modules above and below it.
  • Another module in the stack shown as Wireless Module A 215 , has the radio frequency components and other electronics to implement another wireless data communication technology such as that described in IEEE specification 802.11a, but it is otherwise identical with 214.
  • the two modules 214 and 215 share an antenna module 213 , and their embedded computers each execute the software described herein in order to perform the network system functions and wireless communications via the antenna module.
  • a base module 216 supplies power to the upper stack modules 213 , 214 and 215 .
  • each of the nodes in the wireless network local area network system contains the electronics components necessary to implement the data communications functions required of it and at least one embedded computer or processor to execute the software, the same software being used in every node.
  • FIG. 3 is a diagram of the software used by each processor in each node (subject to the exception noted below with reference to FIG. 4 ), the software executes on a processor hardware platform 322 , which is of a well-known type.
  • the software is loaded into the node processor hardware platforms from the main wired network by well-known means.
  • the software is organized into groups shown in FIG. 3 .
  • Software Group 321 is of well-known type including an operating system kernel, board support required by the particular hardware platform, 322 , software for Ethernet connections according to IEEE standard 802.3, for the wireless protocols specified in IEEE standards 802.11a, 802.11b, 802.11g, and for point-to-point protocols generally used in network systems.
  • IP Suite or Group 320 is a set of software of well-known type for Internet protocols, including Internet protocol routing, Transmission Control Protocol, Internet Protocol, User Data Protocol, a Simple Network Management Protocol agent, a web server, Telnet virtual terminal protocol and a Command Line Interface.
  • Management Suite 318 contains software of well-known type including a Simple Discovery Protocol to support the logic of node discovery described elsewhere, an Object Request Broker, of a class known as lightweight because of its compactness and basic functionality, for certain standard network services, and inter-process messaging for linking software processes for each particular type of hardware platform.
  • a Finite State Machine (FSM) Suite 317 contains several software components or blocks whose functions are described below.
  • a FSM coordinator 326 is a main state machine that oversees other components in the Suite 317 .
  • a Discovery Process 327 implements intra-stack discovery logic described in detail later.
  • a Unit Type FSM 323 includes logic followed by each node stack to determine roles of the modules that contain processors, as also described in detail later.
  • An AP selection FSM 324 is a process by which a backhaul module determines to which access points it connects wirelessly with the shortest round trip delay, as described later, operating at startup and constantly thereafter in background seeking the best set of nearby APs.
  • a Network Controller (NC) selection FSM 325 includes logic through which an AP selects the NC through which it will connect with the main wired network system, described later.
  • a Wireless (WiFi) Suite 319 contains software that implements several wireless communications functions.
  • a WiFi Data Handling program 328 of well-known type handles encapsulation and de-encapsulation of the wireless data frames and the interface to the data path of the operating system.
  • Dynamic Frequency Algorithm software 329 of well-known type scans all available wireless channels for possible connections to APs and builds and maintains a record of Received Signal Strength Indicator (RSSI) values which each AP uses to select an operating channel that has the least co-channel interference, thus helping to maximize network performance.
  • RSSI Received Signal Strength Indicator
  • a Background Channel Scanning software routine 330 builds and periodically updates a list of nearby APs with their associated RSSI and Round Trip Delay (RTD) values, which is used by the AP Selection FSM 324 to seek and maintain the best set of APs.
  • a WiFi Backhaul (BH) software task 331 of well-known type manages routine aspects of the Backhaul connections including their association and monitoring.
  • a WiFi Dynamic Functionality Selector/Activator software block 332 of well-known type is responsible for carrying out the Unit Type FSM 323 decisions, described later, by initializing the respective Backhaul and AP modules according to the decisions.
  • a WiFi AP software block 333 of well-known type measures and reports the Round Trip Delay (RTD) values.
  • a module which supports wireless communication according to IEEE specification 802.15.1 requires in addition to the software shown in FIG. 3 , a suite as shown In FIG. 4 which is of well-known type. For convenience it may be loaded into every processor-equipped module, but it is used only by each Bluetooth module.
  • the Bluetooth suite shown in FIG. 4 consists of a Point-to-Point Protocol, Radio Frequency Communication software, a Bluetooth Simple Discovery Protocol, a Logical Link Control and Adaptation Protocol, a Host Control Interface, and a Universal Serial Bus Interface.
  • the Bluetooth module also uses components shown in FIG. 3 , namely the hardware platform 322 , software Group 321 , IP Suite 320 and Management Suite 318 .
  • the Bluetooth module does not use the Wireless (WiFi) Suite 319 nor FSM Suite 317 as shown in FIG. 3 .
  • a wireless mesh is automatically established and maintained even as nodes are added, removed or fail.
  • the mesh is “partial” because not all possible connections between nodes are selected for use, only the minimum necessary to enable the data traffic to be routed between all users and the external main backbone wired network.
  • Control is distributed by means of processing and software present in each node, which operates independently according to programmed rules to discover itself and other nodes and to select connections, thereby becoming integrated into an effective network.
  • selected connections are those that the nodes themselves determine consistently to have the best combination of round-trip delay (RTD) and signal strength, namely the combination that achieves the highest data communication rate, as described below.
  • RTD round-trip delay
  • signal strength namely the combination that achieves the highest data communication rate
  • each processor-equipped wireless module goes through intra-stack discovery (self-discovery), which determines its type and role or mode within the node, which may be as an Access Point or, except in the case of a Bluetooth module, a Backhaul, which is an infrastructure role.
  • intra-stack discovery self-discovery
  • AP Selection after which the node will wait for (Dynamic Host Configuration Protocol) DHCP inquiry to complete.
  • DHCP is a method for dynamically assigning IP addresses to devices on a network, whereby IP addresses are automatically issued within a specified range to devices such as PCs when they are first powered up. The device retains the use of the IP address for a specific license period defined by a system administrator.
  • BH backhaul
  • a role change from backhaul to access point might take place at this point. Provision by well-known means is made in the software so that if the DHCP source changes at any later time between wireless backhaul arid wired Ethernet, the module role will change between backhaul and access point using the same criteria. Such a change may occur, for example, if an Ethernet cable is connected to or disconnected from a node. It should be noted that a module that is to function as a Network Controller (NC) is most conveniently directed to do so by means of an indication in hardware by well-known means such as code in a read-only memory.
  • NC Network Controller
  • FIG. 5 is a table of a type known as a State Transition Table.
  • the column headings correspond with states of the unit type FSM 323 and the row headings correspond with system events input to the FSM.
  • the entry at each intersection of a column and a row shows the result of the input event named in the row heading on the state named in the column heading.
  • the result may be a particular action or actions, transition to another state, or both, or no effect, as specified for the particular intersection.
  • FIG. 6 is of a type known as a Truth Table. It shows the logic variables evaluated in the self-discovery tests by a module capable of wireless data communication, namely: whether it supports IEEE specification 802.11 (iam802.11), whether it is the only such module in the stack (only radio), whether it is the bottom (iamBottomRadio) or top (iamTopRadio) such module in the stack respectively, whether a module supporting wireless communication according to IEEE specification 802.11a is above it (11A_aboveMe), and whether it supports communication according to IEEE specification 802.11b (iam11b).
  • the Results column shows the outcomes for the possible combinations of TRUE and FALSE values of the variables.
  • An X in FIG. 6 indicates that the value of the particular cell has no effect on the outcome.
  • AP in the Results column means that the module will operate as an Access Point supporting wireless communication according to IEEE specification 802.11.
  • API/B means that it will operate as an access point according to IEEE specification 802.15.1, known as “Bluetooth” technology.
  • PENDING means that a decision on whether the module will operate as an access point or backhaul must be made according to the logic in FIG. 7 .
  • FIG. 7 is also of a type known as a Truth Table. It shows logic variables evaluated by tests for whether DHCP was enabled in the configuration of the module (DHCP enabled) and whether a connection was found to a main or backbone network (gateway/server Found). A prescribed time is allowed for the test, which determines the value of gateway/server Found. If the prescribed time has been exceeded, the variable Force BH Timer timeout is TRUE, otherwise Force BH Timer timeout is FALSE.
  • the Results column shows the outcomes for the possible combinations of TRUE and FALSE values of the variables. An X indicates that the value of the particular table entry or cell has no effect on the outcome. “BH” in the Results column means that the module will operate as a Backhaul.
  • AP means that it will operate as an Access Point.
  • TRY_AGAIN means that the test for whether a connection was found to a main or backbone network (gateway/server Found ⁇ must be repeated.
  • radioinfo a report containing the unit radio (or wireless) type and the allowed operation modes as saved in the board configuration (physical hardware);
  • intraStackRprt a report containing the stack topology discovered by the unit (what other modules are in a given stack);
  • DHCP(b) Rprt indicates that DHCP has been established via a wireless port:
  • DHCP(e) Rprt indicates that DHCP has been established via an Ethernet port
  • apQualified internal event (result of Stack Logic FIG. 6 ) that indicates the ability of the unit to operate as an AP;
  • bhQualified internal event (result of Stack Logic FIG. 6 ) that indicates the ability of the unit to operate as a BH;
  • Pending internal event (result of Stack Logic FIG. 6 ) that indicates the ability of the unit to operate as a BH and AP;
  • sdf set DHCP Flag
  • a module executes software, whose functionality is described here, to automatically determine that the associated module has the role of an Access Point.
  • next state is stack discovery (STACK_DISC, column 1).
  • a DHCP(e) Rprt event while in the PENDING state signifying completion of the DHCP enquiry via wired ethernet causes the FSM to change state to AP (column 4).
  • the module determines that a gateway/server is found (TRUE value in second column), and thus the Result in the fourth column is “AP”.
  • a module executes software, whose functionality is described here, to automatically determine that the associated module has the role of a Backhaul.
  • next state is STACK_DISC (column 1).
  • a DHCP(b) Rprt event while in BH state signifying completion of the DHCP enquiry via wireless communication causes the FSM to change state to BH FINAL (column 5).
  • a DHCP(e) Rprt event while in the BH state signifying completion of the DHCP enquiry via wired ethernet causes the FSM to change state to AP (column 4).
  • An AP selection process by a backhaul module determines to which access point the backhaul module will connect to with station service as defined in IEEE specification 802.11 and have a shortest round trip delay time.
  • the access point may be connected to the wired network system wirelessly, i.e., the access points being a “backhaul node” (e.g., the access points 105 and 107 , as shown in FIG. 1 a and disclosed in Paragraph [0023] of the filed application, are “backhaul nodes”).
  • the AP may be connected to the wired network system through a wired connection (e.g., the access point 106 as shown in FIG. 1 a and disclosed in Paragraph [0023] of the filed application). Therefore, a scenario described below may be applied to both wireless or wired connection of the AP to the wired network system. After powering up and performing the intra-stack discovery explained above, a node module will then go through the following steps.
  • an access point module When an access point module receives a DHCP request reply with gateway IP address, it will send ping messages to the gateway to determine the latency or round trip delay. Each module will perform learning bridge functions by well-known means and the messages between an AP and gateway may be routed in multiple wireless hops depending on the topology of an actual network. It is assumed that all AP modules that will receive a DHCP reply do not have a backhaul Using protocol described in IEEE specification 802.11 the access point will broadcast a unique code sequence message as part of the ping messages or beacon with the round trip delay time for it to reach the gateway. The unique code may be an unused information element (e.g. id 215 ) in a probe response packet in order to advertise the AP round trip delay.
  • id 215 an unused information element
  • RSSI Received Signal Strength Indicator
  • the backhaul module Using the RSSI values of the multiple access points, the backhaul module will determine an estimated roundtrip delay for connecting through the different access points from which it received the unique code sequence message. It will then effectively add the value to the round trip delay time for that access point. From this calculation the backhaul will determine the AP it needs to connect to for the shortest roundtrip delay. This calculation process is an ongoing activity.
  • the access point converts the RSSI into an estimated link bit rate using a lookup table, such as that shown in FIG. 9 .
  • a lookup table such as that shown in FIG. 9 .
  • the first column lists the wireless technologies, the second column shows the number of different data rates supported by each technology (MaxIndex), and the remaining columns show the standard data rates in each case, in Mbits/second.
  • the access point uses RSSI/MaxIndex as an index to FIG. 9 to retrieve the estimated link bit rate.
  • the access point estimates the RTD over the proposed link using a 1500 Byte frame using the following formula:
  • the preferred AP is the AP with the lowest Predicted RTD.
  • FIG. 8 An example of possible paths through the access point FSM 324 states in FIG. 8 follows.
  • the entries in FIG. 8 can be understood from the following key.
  • iCcntr increment candidate confidence counter
  • PosInfo report generated by discovery protocol containing stack name
  • setStkName set the stack name
  • Rcv_rport result of wireless scanning posted
  • rcv_logic process wireless scanning report and generate new event
  • rcv_SEL_AP selected AP has the highest score in the scanning report
  • rev_NEW_AP a new AP has the highest score in the scanning report
  • rcv_CAN_AP candidate AP has the highest score in the scanning report
  • the FSM In response to a PosInfo event while in Down state, the FSM will initialize local states, counters and record the stack name to avoid possible loops.
  • the FSM In response to a Next event while in the AP_DETECTED state, the FSM will select the candidate AP as the selected AP, S, change to the AP_SELECTED state and stop the selection timer (stopST).
  • each AP will measure the round trip delay (RTD) to each NC by means of the well-known ICMP (ping) protocol and collect the result or results into an NC RTD report. From the Round Trip Delay (RTD) report value for each network controller (NC) the wireless module will conclude if a network controller (NC) received is a candidate NC (NC_C), namely one that has the best (i.e. least) roundtrip delay time.
  • NC_C candidate NC
  • a number x times in a row e.g., 3 then that NC is selected as the new NC (NC_S).
  • the number (x) is a configurable value.
  • Each node may periodically perform at least some of the functions described in this section.
  • the backhaul connection uses an AES (Advanced Encryption Standard) static encryption key for all user data transmissions.
  • AES Advanced Encryption Standard
  • the backhaul module may use the Atheros AR5001AP chipset, which includes AES keys.
  • Each AP access point
  • Each AP maintains a common key table of enterprise keys, namely a common table consisting of a key table for the WLAN users and an additional key for the WLAN Backhaul modules.
  • an otherwise unused key is defined as a unique key. This unique key is present in the software used by all wireless modules. The purpose of this unique key is to allow temporary non-secure limited connections to be made between an existing module stack and a new stack that has been introduced to the network but not yet configured with the enterprise encryption keys.
  • a connection with restricted capabilities is achieved by using the unique key that is present on all wireless modules.
  • the new stack will connect with the unique key to a suitable AP and the AP will permit WLAN infrastructure management services, but it will not be able to forward any user data traffic to or from the AP.
  • the network administrator can either allow the new stack to make a secure connection or disconnect it as an unknown stack. If the new stack is a valid new entrant to the system it will be configured by the administrator with the correct security keys and it will reset its connection to create a secure backhaul link.
  • the AP will allow traffic from/to Strix devices only, based on a OUI (Organizationally Unique Identifier) filed in the MAC layer.
  • OUI Organizationally Unique Identifier
  • the wireless module may be configured to use a first type of encryption for communication with a wireless mobile unit within the wireless local area network, and to use a second type of encryption of data traffic provided to a selected access point, such that the wireless mobile unit is configured to exchange data with the wireless module without compromising a security of the data traffic provided between the wireless module and the selected access point under the second type of encryption.
  • a picocellular system typically refers to a wireless system having wireless base stations with extremely low power designed to cover an extremely small area, such as one floor of an office building.
  • short range wireless communication as described herein generally refers to an effective range of 500 meters or less (and with Bluetooth, often less than 100 meters), although some systems may reach up to 1 kilometer depending upon the wireless transmission protocol and power level.
  • Access points, nodes or base station units described herein are generally fixed relative to a given location. The location may be any stationary building or geographic space (such as a parking lot or park). Alternatively, the node may be fixed relative to a movable object such as a vehicle (e.g., train, ship or plane).

Abstract

A system and associated method provides for a wireless local area network (WLAN) that permits mobile units to communicate with an external, wired network. Nodes in the WLAN include multiple components, such as a base module, antenna module, and one or more wireless modules. Indeed, this system can employ two or more wireless modules that employ different short-range wireless protocols, such as IEEE 802.11-type and Bluetooth protocols. The nodes may perform self-discovery to determine modules within the node and associated functionality, as well as identify neighboring nodes to thereby establish a mesh-type network. Nodes can be configured to provide connectivity to the wired network, while others (access points) communicate wirelessly with mobile devices. The nodes may then be interconnected wirelessly, or via wires.

Description

    CROSS-REFERENCE TO RELATED APPLICATION(S)
  • This application is a continuation of co-pending U.S. patent application Ser. No. 13/245,254 filed Sep. 26, 2011 and entitled SELF-CONFIGURING, SELF-OPTIMIZING WIRELESS LOCAL AREA NETWORK SYSTEM, which in turn is a continuation of U.S. patent application Ser. No. 12/775,175 filed on May 6, 2010, now U.S. Pat. No. 8,027,324, which in turn is a continuation of U.S. patent application Ser. No. 10/549,342 filed Feb. 5, 2007, now U.S. Pat. No. 7,733,833, which in turn is a U.S. national stage entry under 35 U.S.C. 371 of International Application No. PCT/US04/009237 filed Mar. 24, 2004, which in turn claims the benefit of U.S. Provisional Patent Application No. 60/457,529, filed Mar. 24, 2003 each of which is incorporated by reference herein in its entirety for all purposes.
  • BACKGROUND
  • Wireless telecommunications networks employ nodes or access points within a geographic area or space to provide wireless coverage for users. An access point (AP) is typically a physical edge device that allows wireless user devices to access network resources, and is sometimes referred to as a node. Wireless local area networks (WLAN) typically employ existing protocols such as those under IEEE 802.11, which is a specification that defines WLAN data link and physical layers. The 802.11 specification includes a media access control (MAC) sublayer within the data link layer, and two sublayers of the physical layer (PHY)—orthogonal frequency division multiplexing (OFDM) and a direct-sequence spread-spectrum (DSSS) modulation scheme. The Bluetooth specification (IEEE 802.15) uses a frequency-hopping spread spectrum (FHSS) modulation scheme.
  • The FHSS technique modulates a data signal with a narrow band carrier signal that “hops” in a predictable sequence from frequency to frequency as a function of time over a wide band of frequencies. Interference is reduced because a narrow band interferer affects the spread-spectrum signal only if both are transmitting at the same frequency and at the same time. The transmission frequencies are determined by a spreading {hopping) code. The receiver must be set to the same hopping code and must listen at the incoming signal at the proper time and frequency to receive the signal. OFDM splits a wide frequency band into a number of narrow frequency bands and sends data across the sub-channels. DSSS combines a data signal at the sending station with a higher data rate bit sequence, which often is referred to as a “chip sequence.” A high processing gain increases the signal's resistance to interference.
  • Various IEEE 802.11 protocols exist, including 802.11a, 802.11b, 802.11g, 802.11e, 802.11i and others. These and other protocols are often referred to as “WiFi,” which is short for wireless fidelity. Other short-range wireless protocols include Hiperlan, which has been adopted by the European Telecommunications Standards Institute (ETSI). Other short range wireless protocols and technologies include Bluetooth (IEEE 802.15.1), ultrasonic, infrared, etc. Overall, creating and implementing networks of short range wireless embodies many difficulties.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1A is a diagram of a wireless local area network or WLAN showing one physical configuration of an embodiment of the invention that provides wireless services to various users and a connection with a conventional wired network.
  • FIG. 1B is a block diagram of a suitable computer for employing aspects of the invention.
  • FIG. 2. is a schematic diagram illustrating an example of a “node,” a number of which can be used to build a wireless network such as that of FIG. 1A.
  • FIG. 3 is a block diagram of software present in each node of the WLAN of FIG. 1.
  • FIG. 4 is a block diagram of software pertaining to “Bluetooth” wireless functions.
  • FIG. 5 is a state table that describes finite state machine logic applied by the software in each processor-equipped module of a node to determine its own characteristics (“self discovery”) and its role in the WLAN (whether it acts as an “access point” or as a “backhaul” module).
  • FIG. 6 is a logic table showing an intra-stack self-discovery process.
  • FIG. 7 is a logic table for a PENDING state under FIG. 6.
  • FIG. 8 is a state table that describes finite state machine logic followed by software in processor-equipped modules, which have determined their roles to be that of a “backhaul” module.
  • FIG. 9 is an example of a lookup table that can be used in a calculation of a best combination of round trip delay and signal strength.
  • The headings provided herein are for convenience only and do not necessarily affect the scope or meaning of the claimed invention.
  • In the drawings, the same reference numbers and acronyms identify elements or acts with the same or similar functionality for ease of understanding and convenience. To easily identify the discussion of any particular element or act, the most significant digit or digits in a reference number refer to the FIG. number in which that element is first introduced (e.g., element 04 is first introduced and discussed with respect to FIG. 2).
  • DETAILED DESCRIPTION
  • A wireless local area network system described below solves problems of providing wireless connectivity for a large number of users at low costs for installation and management, with multiple radio-frequency technologies, and high levels of performance, security, robustness and flexibility. It employs a network of “nodes” each of which contains an appropriate set of functional modules to provide at that node the required connectivity services (which can be wired or wireless) and a processor or processors to run the controlling software. The software ensures that nodes are intelligent, self-contained, and act to discover their neighbors. Acting together by means of their distributed intelligence the nodes establish a network of connections that carry data traffic. The software adopts a “mesh” topology for the connections and ensures that routing is optimized, automatically, upon initiation and at frequent intervals thereafter. Thus the system can adjust itself automatically when nodes are added, removed or fail, and the software contains mechanisms that preserve security even in these cases. Other details and aspects are described below.
  • In a broad sense, aspects of the invention include a system and associated method provides for a wireless local area network (WLAN) that permits mobile units to communicate with an external, wired network. Nodes in the WLAN include multiple components, such as a base module, antenna module, and one or more wireless modules. Indeed, this system can employ two or more wireless modules that employ different short-range wireless protocols, such as IEEE 802.11-type and Bluetooth protocols. The nodes may perform self-discovery to determine modules within the node and associated functionality, as well as identify neighboring nodes to thereby establish a mesh-type network. Nodes can be configured to provide connectivity to the wired network, while others (access points) communicate wirelessly with mobile devices. The nodes may then be interconnected wirelessly, or via wires.
  • The invention will now be described with respect to various embodiments. The following description provides specific details for a thorough understanding of, and enabling description for, these embodiments of the invention. However, one skilled in the art will understand that the invention may be practiced without these details. In other instances, well-known structures and functions have not been shown or described in detail to avoid unnecessarily obscuring the description of the embodiments of the invention.
  • The terminology used in the description presented below is intended to be interpreted in its broadest reasonable manner, even though it is being used in conjunction with a detailed description of certain specific embodiments of the invention. Certain terms may even be emphasized below; however, any terminology intended to be interpreted in any restricted manner will be overtly and specifically defined as such in this Detailed Description section.
  • FIG. 1A shows an example configuration of a wireless local area network (WLAN) system that embodies aspects of the invention. Many different configurations are possible using the same methods and principles described here. Wireless users may be making use of various types of personal computers 101 equipped with wireless connectivity or portable wireless digital devices 102. Another class of user that the system is intended to accommodate is made up of small groups of users who have personal computers with wired ethernet connectivity. Such a group is called a workgroup and an example is shown at 103. Numbers of each of various types of network nodes such as those shown at 104, 105, 106, 107, 108 and 109 form a wireless network. Each node is an assembly of modules containing the electronics and software that implement the functions described below.
  • The wireless network is intended to connect with a conventional main or backbone wired network system illustrated here by the application servers 110 and their wired ethernet connections 111. The personal computers 101 and portable devices 102 connect wirelessly into the network through nodes serving as access points 104, 105 and 106 by means of standard digital wireless technology, of which there are several types in general use, and as described below. The access point used by a particular personal computer or device will ordinarily be the closest one that supports the wireless technology used by the personal computer or wireless device. Workgroup computers such as those shown at 103 are connected to their access point nodes such as 107 by means of ethernet cables.
  • A connection by a user or client to a node such as 101, 102 or 103 is known as an Access Point (AP) connection. Access Point nodes also connect back to the main backbone wired network system. If the connection back to the main backbone wired network system is wireless it is known as a “Backhaul” (BH) connection. Some access point nodes in a system, such as that shown here as 104, may connect back to the main backbone wired network system via another access point node acting as a relay such as that shown here at 105. Other access point nodes, such as those shown here at 105 and 107 connect back wirelessly via nodes acting as Network Controllers (NC), shown here at 108 and 109. Yet other access point nodes, such as 106, may connect back through an ethernet wire, 112, via a network controller node such as 109.
  • Networks may contain more or fewer nodes than are shown in this example and many other combinations of wired and wireless data communication functions in particular nodes are possible. Every such network will contain at least one access point for wireless user connection, at least one main network connection by wired ethernet, and at least one network controller for management subsystem services.
  • Unless described otherwise herein, the blocks and elements depicted in FIG. 1A and the other FIG.s are well known or described in detail in the above cross-referenced provisional patent application. Indeed, much of the detailed description provided herein is explicitly disclosed in the above provisional patent application; much of the additional material of aspects of the invention will be recognized by those skilled in the relevant art as being inherent in the detailed description provided in such provisional patent application, or well known to those skilled in the relevant art. Those skilled in the relevant art can implement aspects of the invention based on the FIG.s and the detailed description provided in the provisional patent application.
  • FIG. 1B and the following discussion provide a brief, general description of a suitable environment in which aspects of the invention can be implemented. Although not required, aspects of the invention are described below in the general context of computer-executable instructions, such as routines executed by a general-purpose computer, e.g., a server computer, wireless device or personal computer. Those skilled in the relevant art will appreciate that the invention can be practiced with other communications, data processing or computer system configurations, including: Internet appliances, hand-held devices (including personal digital assistants (PDAs)), wearable computers, all manner of cellular or mobile phones, multi-processor systems, microprocessor-based or programmable consumer electronics, set-top boxes, network PCs, mini-computers, mainframe computers and the like. Indeed, the terms “computer”, “host” and “host computer” are generally used interchangeably, and refer to any of the above devices and systems, as well as any data processor.
  • Aspects of the invention can be embodied in a special purpose computer or data processor that is specifically programmed, configured or constructed to perform one or more of the computer-executable instructions explained in detail herein. As described below, aspects of the invention can be practiced in distributed computing environments where tasks or modules are performed by remote processing devices, which are linked through a communications network, such as a Local Area Network (“LAN”), Wide Area Network (“WAN”) or the Internet. In a distributed computing environment, program modules may be located in both local and remote memory storage devices.
  • Aspects of the invention may be stored or distributed on computer-readable media, including magnetically or optically readable computer discs, hard-wired or preprogrammed in chips (e.g., EEPROM semiconductor chips), nanotechnology memory, biological memory, or other data storage medium. Indeed, computer implemented instructions, data structures, screen displays, and other data under aspects of the invention may be distributed over the Internet or over other networks (including wireless networks), on a propagated signal on a propagation medium (e.g., an electromagnetic wave(s), a sound wave, etc.) over a period of time, or may be provided on any analog or digital network (packet switched, circuit switched or other scheme). Those skilled in the relevant art will recognize that portions of the invention reside on a server computer, while corresponding portions reside on a client computer such as a mobile or portable device, and thus, while certain hardware platforms are described herein, aspects of the invention are equally applicable to nodes on a network.
  • Referring to FIG. 1B, one aspect of the invention may be performed on a computer, such as the personal computer 101, or other computer, which typically employs one or more processors 120 coupled to one or more user input devices 122 and data storage devices 124. The computer is also coupled to at least one output device such as a display device 126 and one or more optional additional output devices 128 (e.g., printer, plotter, speakers, tactile or olfactory output devices, etc.). The computer may be coupled to external computers, such as via a network connection 130, a wireless transceiver 132, or both.
  • The input devices 122 may include a keyboard and/or a pointing device such as a mouse. Other input devices are possible such as a microphone, joystick, pen, game pad, scanner, digital camera, video camera, and the like. The data storage devices 124 may include any type of computer-readable media that can store data accessible by the computer 101, such as magnetic hard and floppy disk drives, optical disk drives, magnetic cassettes, tape drives, flash memory cards, digital video disks (DVDs), Bernoulli cartridges, RAMs, ROMs, smart cards, etc. Indeed, any medium for storing or transmitting computer-readable instructions and data may be employed, including a connection port to a network such as a local area network (LAN), wide area network (WAN) or the Internet (not shown in FIG. 1B).
  • FIG. 2 illustrates an example implementation of a node such as that shown at 104 in FIG. 1. In a typical embodiment each node is an assembly, or “stack” of modules each of which contains the hardware and software required to implement its designated function.
  • In its role as a network access point the node 104 may be required to communicate user data by means of two different standard wireless technologies and to perform some network system functions. Therefore this access point example of a node is shown as a stack of functional modules including 1) a Wireless Module B 214, which has the radio-frequency components and other electronics to implement a standard wireless data communication technology such as that described in IEEE specification 802.11b; 2) an embedded computer including processor and memory; and 3) logic to connect with the modules above and below it. Another module in the stack, shown as Wireless Module A 215, has the radio frequency components and other electronics to implement another wireless data communication technology such as that described in IEEE specification 802.11a, but it is otherwise identical with 214. The two modules 214 and 215 share an antenna module 213, and their embedded computers each execute the software described herein in order to perform the network system functions and wireless communications via the antenna module. A base module 216 supplies power to the upper stack modules 213, 214 and 215.
  • Thus each of the nodes in the wireless network local area network system contains the electronics components necessary to implement the data communications functions required of it and at least one embedded computer or processor to execute the software, the same software being used in every node. These characteristics of the physical implementation of the nodes can be met by many variations on the example given here, using well-known methods.
  • With reference to FIG. 3, which is a diagram of the software used by each processor in each node (subject to the exception noted below with reference to FIG. 4), the software executes on a processor hardware platform 322, which is of a well-known type. The software is loaded into the node processor hardware platforms from the main wired network by well-known means. The software is organized into groups shown in FIG. 3. Software Group 321 is of well-known type including an operating system kernel, board support required by the particular hardware platform, 322, software for Ethernet connections according to IEEE standard 802.3, for the wireless protocols specified in IEEE standards 802.11a, 802.11b, 802.11g, and for point-to-point protocols generally used in network systems. IP Suite or Group 320 is a set of software of well-known type for Internet protocols, including Internet protocol routing, Transmission Control Protocol, Internet Protocol, User Data Protocol, a Simple Network Management Protocol agent, a web server, Telnet virtual terminal protocol and a Command Line Interface. Management Suite 318 contains software of well-known type including a Simple Discovery Protocol to support the logic of node discovery described elsewhere, an Object Request Broker, of a class known as lightweight because of its compactness and basic functionality, for certain standard network services, and inter-process messaging for linking software processes for each particular type of hardware platform.
  • A Finite State Machine (FSM) Suite 317 contains several software components or blocks whose functions are described below. A FSM coordinator 326 is a main state machine that oversees other components in the Suite 317. A Discovery Process 327 implements intra-stack discovery logic described in detail later. A Unit Type FSM 323 includes logic followed by each node stack to determine roles of the modules that contain processors, as also described in detail later. An AP selection FSM 324 is a process by which a backhaul module determines to which access points it connects wirelessly with the shortest round trip delay, as described later, operating at startup and constantly thereafter in background seeking the best set of nearby APs. A Network Controller (NC) selection FSM 325 includes logic through which an AP selects the NC through which it will connect with the main wired network system, described later.
  • A Wireless (WiFi) Suite 319 contains software that implements several wireless communications functions. A WiFi Data Handling program 328 of well-known type handles encapsulation and de-encapsulation of the wireless data frames and the interface to the data path of the operating system. Dynamic Frequency Algorithm software 329 of well-known type scans all available wireless channels for possible connections to APs and builds and maintains a record of Received Signal Strength Indicator (RSSI) values which each AP uses to select an operating channel that has the least co-channel interference, thus helping to maximize network performance. A Background Channel Scanning software routine 330 builds and periodically updates a list of nearby APs with their associated RSSI and Round Trip Delay (RTD) values, which is used by the AP Selection FSM 324 to seek and maintain the best set of APs. A WiFi Backhaul (BH) software task 331 of well-known type manages routine aspects of the Backhaul connections including their association and monitoring. A WiFi Dynamic Functionality Selector/Activator software block 332 of well-known type is responsible for carrying out the Unit Type FSM 323 decisions, described later, by initializing the respective Backhaul and AP modules according to the decisions. A WiFi AP software block 333 of well-known type measures and reports the Round Trip Delay (RTD) values.
  • With reference to FIG. 4, a module which supports wireless communication according to IEEE specification 802.15.1, known as a Bluetooth module, requires in addition to the software shown in FIG. 3, a suite as shown In FIG. 4 which is of well-known type. For convenience it may be loaded into every processor-equipped module, but it is used only by each Bluetooth module. The Bluetooth suite shown in FIG. 4 consists of a Point-to-Point Protocol, Radio Frequency Communication software, a Bluetooth Simple Discovery Protocol, a Logical Link Control and Adaptation Protocol, a Host Control Interface, and a Universal Serial Bus Interface. The Bluetooth module also uses components shown in FIG. 3, namely the hardware platform 322, software Group 321, IP Suite 320 and Management Suite 318. The Bluetooth module does not use the Wireless (WiFi) Suite 319 nor FSM Suite 317 as shown in FIG. 3.
  • By means of the software described here a wireless mesh is automatically established and maintained even as nodes are added, removed or fail. The mesh is “partial” because not all possible connections between nodes are selected for use, only the minimum necessary to enable the data traffic to be routed between all users and the external main backbone wired network. Control is distributed by means of processing and software present in each node, which operates independently according to programmed rules to discover itself and other nodes and to select connections, thereby becoming integrated into an effective network. Furthermore, selected connections are those that the nodes themselves determine consistently to have the best combination of round-trip delay (RTD) and signal strength, namely the combination that achieves the highest data communication rate, as described below. Thus routing is optimum in the sense that the system automatically seeks and uses the fewest, best routes. Because the routing process operates continuously and takes only a few seconds or less to execute, the system quickly restores optimum routing in response to changes such as adding or removing nodes, or node failure.
  • Node/Module Initialization & Maintenance
  • When a new node and its associated stack of units or modules is powered up, each processor-equipped wireless module goes through intra-stack discovery (self-discovery), which determines its type and role or mode within the node, which may be as an Access Point or, except in the case of a Bluetooth module, a Backhaul, which is an infrastructure role. This is followed by AP Selection, after which the node will wait for (Dynamic Host Configuration Protocol) DHCP inquiry to complete. DHCP is a method for dynamically assigning IP addresses to devices on a network, whereby IP addresses are automatically issued within a specified range to devices such as PCs when they are first powered up. The device retains the use of the IP address for a specific license period defined by a system administrator.
  • The following rules are applied to determine if any of the modules on the stack will be a backhaul (BH) and if so which module on the stack will be the backhaul. In order for a wireless module, such as module 214 or 215, to determine its role in a stack, the wireless module uses the following three criteria:
  • (1) Position on the stack,
  • (2) Knowledge of other modules in the stack, and
  • (3) How the DHCP was obtained—wirelessly or via wired Ethernet
  • Based on the DHCP source {wireless backhaul or wired Ethernet) and the functions of other stack modules, a role change from backhaul to access point might take place at this point. Provision by well-known means is made in the software so that if the DHCP source changes at any later time between wireless backhaul arid wired Ethernet, the module role will change between backhaul and access point using the same criteria. Such a change may occur, for example, if an Ethernet cable is connected to or disconnected from a node. It should be noted that a module that is to function as a Network Controller (NC) is most conveniently directed to do so by means of an indication in hardware by well-known means such as code in a read-only memory.
  • FIG. 5 is a table of a type known as a State Transition Table. The column headings correspond with states of the unit type FSM 323 and the row headings correspond with system events input to the FSM. The entry at each intersection of a column and a row shows the result of the input event named in the row heading on the state named in the column heading. The result may be a particular action or actions, transition to another state, or both, or no effect, as specified for the particular intersection.
  • FIG. 6 is of a type known as a Truth Table. It shows the logic variables evaluated in the self-discovery tests by a module capable of wireless data communication, namely: whether it supports IEEE specification 802.11 (iam802.11), whether it is the only such module in the stack (only radio), whether it is the bottom (iamBottomRadio) or top (iamTopRadio) such module in the stack respectively, whether a module supporting wireless communication according to IEEE specification 802.11a is above it (11A_aboveMe), and whether it supports communication according to IEEE specification 802.11b (iam11b). The Results column shows the outcomes for the possible combinations of TRUE and FALSE values of the variables. An X in FIG. 6 indicates that the value of the particular cell has no effect on the outcome. “AP” in the Results column means that the module will operate as an Access Point supporting wireless communication according to IEEE specification 802.11. “AP/B” means that it will operate as an access point according to IEEE specification 802.15.1, known as “Bluetooth” technology. “PENDING” means that a decision on whether the module will operate as an access point or backhaul must be made according to the logic in FIG. 7.
  • FIG. 7 is also of a type known as a Truth Table. It shows logic variables evaluated by tests for whether DHCP was enabled in the configuration of the module (DHCP enabled) and whether a connection was found to a main or backbone network (gateway/server Found). A prescribed time is allowed for the test, which determines the value of gateway/server Found. If the prescribed time has been exceeded, the variable Force BH Timer timeout is TRUE, otherwise Force BH Timer timeout is FALSE. The Results column shows the outcomes for the possible combinations of TRUE and FALSE values of the variables. An X indicates that the value of the particular table entry or cell has no effect on the outcome. “BH” in the Results column means that the module will operate as a Backhaul. “AP” means that it will operate as an Access Point. “TRY_AGAIN” means that the test for whether a connection was found to a main or backbone network (gateway/server Found} must be repeated. Well-known means, such as a decrementing counter, limit the repetitions of the test to a suitable number. When the limit has been reached the software assigns the module to operate as a Backhaul.
  • Examples of possible paths through the FSM states in FIG. 5 follow. Further, the entries in FIG. 5 can be understood from the following key (where numbers in the columns indicate next states)
  • radioinfo: a report containing the unit radio (or wireless) type and the allowed operation modes as saved in the board configuration (physical hardware);
  • Force BH Timer: a safety timer applied to DHCP response from the backbone;
  • next: internal event generated by the FSM to simplify the implementation; intraStackRprt: a report containing the stack topology discovered by the unit (what other modules are in a given stack);
  • DHCP(b) Rprt: indicates that DHCP has been established via a wireless port:
  • DHCP(e) Rprt: indicates that DHCP has been established via an Ethernet port;
  • apQualified: internal event (result of Stack Logic FIG. 6) that indicates the ability of the unit to operate as an AP;
  • bhQualified: internal event (result of Stack Logic FIG. 6) that indicates the ability of the unit to operate as a BH;
  • Pending: internal event (result of Stack Logic FIG. 6) that indicates the ability of the unit to operate as a BH and AP;
  • init: initialize state machine;
  • rsi: read self information;
  • sdf: set DHCP Flag;
  • intra stack logic: execute MODULE INTRA-STACK LOGIC, FIG. 6
  • pndLogic: execute PENDING LOGIC, FIG. 7
  • Example 1
  • Under this example through the Tables, a module executes software, whose functionality is described here, to automatically determine that the associated module has the role of an Access Point.
  • 1) When power is applied hardware configuration information including the type of wireless communication supported and permitted modes is supplied automatically as a radioInfo event input while the FSM 323 is in the self-discovery (SELF_DISC) state (column 0), which causes the FSM to initialize the local states (init), read self information (rsi), and initiate the next event.
  • 2) In reaction to a next event while in the SELF_DISC state, the FSM 323 changes state to the next state. In this case the next state is stack discovery (STACK_DISC, column 1).
  • 3) In the STACK_DISC state (column 1) if the FSM 323 receives intraStackRprt event the FSM executes the intra-stack tests and logic (intra stack logic) described in connection with FIG. 6. MODULE INTRA-STACK LOGIC and starts the Force BH Timer. It can be seen that the intra-stack tests and logic will result in changing state to AP/B, AP, BH or PENDING based on the discovered stack topology.
  • 4) A DHCP(e) Rprt event while in the PENDING state, signifying completion of the DHCP enquiry via wired ethernet causes the FSM to change state to AP (column 4). Under the PENDING LOGIC TABLE of FIG. 7, the module determines that a gateway/server is found (TRUE value in second column), and thus the Result in the fourth column is “AP”.
  • Example 2
  • Under this example through the Tables, a module executes software, whose functionality is described here, to automatically determine that the associated module has the role of a Backhaul.
  • 1) When power is applied hardware configuration information including the type of wireless communication supported is supplied automatically as a radioInfo event input while the FSM 323 is in the self-discovery (SELF_DISC) state (column 0), which causes the FSM to initialize the local states (init), read self information (rsi), and initiate the next event.
  • 2) In reaction to a next event while in the SELF_DISC state, the FSM changes state to the next state. In this case the next state is STACK_DISC (column 1).
  • 3) In the STACK_DISC state (column 1) if the FSM receives intraStackRprt event the FSM executes the intra-stack tests and logic (intra stack logic) described in connection with FIG. 6. MODULE INTRA-STACK LOGIC and starts the Force BH Timer. It can be seen that the intra-stack tests and logic will result in changing state to AP/B, AP, BH or PENDING based on the discovered stack topology.
  • 4) While in the PENDING state (column 2), failure to complete a DHCP enquiry will cause “Force BH Timer” timeout which will result in the FSM changing state to the BH state (column 4).
  • 5) A DHCP(b) Rprt event while in BH state, signifying completion of the DHCP enquiry via wireless communication causes the FSM to change state to BH FINAL (column 5).
  • 6) A DHCP(e) Rprt event while in the BH state, signifying completion of the DHCP enquiry via wired ethernet causes the FSM to change state to AP (column 4).
  • AP Selection
  • An AP selection process by a backhaul module determines to which access point the backhaul module will connect to with station service as defined in IEEE specification 802.11 and have a shortest round trip delay time. In general, the access point (AP) may be connected to the wired network system wirelessly, i.e., the access points being a “backhaul node” (e.g., the access points 105 and 107, as shown in FIG. 1 a and disclosed in Paragraph [0023] of the filed application, are “backhaul nodes”). Alternatively, the AP may be connected to the wired network system through a wired connection (e.g., the access point 106 as shown in FIG. 1 a and disclosed in Paragraph [0023] of the filed application). Therefore, a scenario described below may be applied to both wireless or wired connection of the AP to the wired network system. After powering up and performing the intra-stack discovery explained above, a node module will then go through the following steps.
  • (1) AP Selection,
  • (2) Wait for DHCP request reply, and
  • (3) Inter-stack discovery.
  • The following discussion describes the process.
  • When an access point module receives a DHCP request reply with gateway IP address, it will send ping messages to the gateway to determine the latency or round trip delay. Each module will perform learning bridge functions by well-known means and the messages between an AP and gateway may be routed in multiple wireless hops depending on the topology of an actual network. It is assumed that all AP modules that will receive a DHCP reply do not have a backhaul Using protocol described in IEEE specification 802.11 the access point will broadcast a unique code sequence message as part of the ping messages or beacon with the round trip delay time for it to reach the gateway. The unique code may be an unused information element (e.g. id 215) in a probe response packet in order to advertise the AP round trip delay.
  • During this process all other nodes that have a backhaul module will start to scan the wireless neighborhood for the unique code sequence message. If a backhaul module receives only one unique message, it will connect to the AP sending the unique message. If it receives more than one unique code sequence message it will execute a comparison process to determine the access point it needs to connect to. Information needed to determine this is:
  • (1) AP to Gateway round trip delay (RTD) time.
  • (2) Received Signal Strength Indicator (RSSI) value of the access point signal strength.
  • Using the RSSI values of the multiple access points, the backhaul module will determine an estimated roundtrip delay for connecting through the different access points from which it received the unique code sequence message. It will then effectively add the value to the round trip delay time for that access point. From this calculation the backhaul will determine the AP it needs to connect to for the shortest roundtrip delay. This calculation process is an ongoing activity.
  • Specifically, to determine the RTD value (typically in microseconds), the access point converts the RSSI into an estimated link bit rate using a lookup table, such as that shown in FIG. 9. Referring to FIG. 9, the first column lists the wireless technologies, the second column shows the number of different data rates supported by each technology (MaxIndex), and the remaining columns show the standard data rates in each case, in Mbits/second.
  • Assuming that the RSSI is within a range of 0-60 the access point uses RSSI/MaxIndex as an index to FIG. 9 to retrieve the estimated link bit rate. The access point then estimates the RTD over the proposed link using a 1500 Byte frame using the following formula:

  • Predicted RTD=AP_RTD+1500*8*2/(Estimated bit rate).
  • The preferred AP is the AP with the lowest Predicted RTD.
  • An example of possible paths through the access point FSM 324 states in FIG. 8 follows. The entries in FIG. 8 can be understood from the following key.
  • init: initialize state machine;
  • S: selected AP;
  • C: candidate AP;
  • N: new AP;
  • iCcntr: increment candidate confidence counter;
  • Ccntr- -: decrement candidate confidence counter;
  • ST: selection timer, when expired force_sel event is generated;
  • _stopST: stop selection timer;
  • PosInfo: report generated by discovery protocol containing stack name;
  • setStkName: set the stack name;
  • Rcv_rport: result of wireless scanning posted;
  • rcv_logic: process wireless scanning report and generate new event;
  • rcv_SEL_AP: selected AP has the highest score in the scanning report;
  • rev_NEW_AP: a new AP has the highest score in the scanning report;
  • rcv_CAN_AP: candidate AP has the highest score in the scanning report;
  • Next: internal event;
  • link lost: indication of wireless link lost;
  • force_sel: safety selection timer—multiple APs may have the same score;
  • max: assigned maximum value of the variable.
  • Example AP Selection FSM
  • 1) In response to a PosInfo event while in Down state, the FSM will initialize local states, counters and record the stack name to avoid possible loops.
  • 2) In response to a Rcv_rport event while in Down state, the FSM will execute a Next event and perform the rcv_logic which will parse the report and generate one of the following events:
  • rcv_SEL_AP, rcv_NEW_AP or rcv_CAN_AP. Since there is no candidate AP at this point rcv_NEW_AP event will be generated.
  • 3) A Next event while in Down state will cause the FSM to change state to AP_DETECTED (column 1) and start the selection timer ST.
  • 4) In response to a rcv_NEW_AP event while in AP_DETECTED state the FSM will abort any current candidate AP, adopt the new AP as a better candidate and set the candidate confidence counter (C_cntr) to 1 whatever its current state.
  • 5) In response to a Rcv_rport event while in AP_DETECTED state the FSM will perform the rcv_logic which will generate a rcv_CAN_AP event.
  • 6) In response to a rcv_CAN_AP event while in the AP_DETECTED state the FSM will increment the candidate confidence counter and check for completion, namely if i_C_cntr==max. If i_C_cntr==max the FSM will generate a Next event
  • 7) In response to a rcv_SEL_AP event while in the AP_DETECTED state, the FSM will clear the candidate confidence counter.
  • 8) In response to a Next event while in the AP_DETECTED state, the FSM will select the candidate AP as the selected AP, S, change to the AP_SELECTED state and stop the selection timer (stopST).
  • Failure or removal of an AP module will result in a link lost event which will cause the BH to follow the process described above to AP_SELECTED with a newly discovered best choice of AP.
  • With respect to completing the mesh by integration of network controllers (NC), of which there must be at least one and there may be more in order to provide redundancy in case of failure, each AP will measure the round trip delay (RTD) to each NC by means of the well-known ICMP (ping) protocol and collect the result or results into an NC RTD report. From the Round Trip Delay (RTD) report value for each network controller (NC) the wireless module will conclude if a network controller (NC) received is a candidate NC (NC_C), namely one that has the best (i.e. least) roundtrip delay time. If the RM receives the same NC as a candidate NC, a number x times in a row (e.g., 3) then that NC is selected as the new NC (NC_S). The number (x) is a configurable value. Each node may periodically perform at least some of the functions described in this section.
  • Backhaul Security
  • The backhaul connection uses an AES (Advanced Encryption Standard) static encryption key for all user data transmissions. (For example, the backhaul module may use the Atheros AR5001AP chipset, which includes AES keys.) Each AP (access point) maintains a common key table of enterprise keys, namely a common table consisting of a key table for the WLAN users and an additional key for the WLAN Backhaul modules. In addition, on the encryption key table an otherwise unused key is defined as a unique key. This unique key is present in the software used by all wireless modules. The purpose of this unique key is to allow temporary non-secure limited connections to be made between an existing module stack and a new stack that has been introduced to the network but not yet configured with the enterprise encryption keys.
  • When a new stack with a backhaul module powers up without any security keys configured, it still needs to connect to the existing system before it can be configured with the enterprise security keys. A connection with restricted capabilities is achieved by using the unique key that is present on all wireless modules. The new stack will connect with the unique key to a suitable AP and the AP will permit WLAN infrastructure management services, but it will not be able to forward any user data traffic to or from the AP. By making use of this connection with restricted capabilities, the network administrator can either allow the new stack to make a secure connection or disconnect it as an unknown stack. If the new stack is a valid new entrant to the system it will be configured by the administrator with the correct security keys and it will reset its connection to create a secure backhaul link. In the restricted mode, the AP will allow traffic from/to Strix devices only, based on a OUI (Organizationally Unique Identifier) filed in the MAC layer.
  • It is further noted according to an embodiment of the present invention that the wireless module may be configured to use a first type of encryption for communication with a wireless mobile unit within the wireless local area network, and to use a second type of encryption of data traffic provided to a selected access point, such that the wireless mobile unit is configured to exchange data with the wireless module without compromising a security of the data traffic provided between the wireless module and the selected access point under the second type of encryption.
  • D. CONCLUSION
  • Aspects of the invention are particularly useful in providing communications with mobile wireless units or devices within a picocellular system. A picocellular system typically refers to a wireless system having wireless base stations with extremely low power designed to cover an extremely small area, such as one floor of an office building. Indeed, short range wireless communication as described herein generally refers to an effective range of 500 meters or less (and with Bluetooth, often less than 100 meters), although some systems may reach up to 1 kilometer depending upon the wireless transmission protocol and power level. Access points, nodes or base station units described herein are generally fixed relative to a given location. The location may be any stationary building or geographic space (such as a parking lot or park). Alternatively, the node may be fixed relative to a movable object such as a vehicle (e.g., train, ship or plane).
  • Unless the context clearly requires otherwise, throughout the description and the claims, the words “comprise,” “comprising,” and the like are to be construed in an inclusive sense as opposed to an exclusive or exhaustive sense; that is to say, in the sense of “including, but not limited to.” Additionally, the words “herein,” “above,” “below” and words of similar import, when used in this application, shall refer to this application as a whole and not to any particular portions of this application. When the claims use the word “or” in reference to a list of two or more items, that word covers all of the following interpretations of the word: any of the items in the list, all of the items in the list and any combination of the items in the list.
  • The above detailed description of embodiments of the invention is not intended to be exhaustive or to limit the invention to the precise form disclosed above. While specific embodiments of, and examples for, the invention are described above for illustrative purposes, various equivalent modifications are possible within the scope of the invention, as those skilled in the relevant art will recognize. For example, while processes or blocks are presented in a given order, alternative embodiments may perform routines having steps, or employ systems having blocks, in a different order, and some processes or blocks may be deleted, moved, added, subdivided, combined, and/or modified. Each of these processes or blocks may be implemented in a variety of different ways. Also, while processes or blocks are at times shown as being performed in series, these processes or blocks may instead be performed in parallel, or may be performed at different times. Where the context permits, words in the above Detailed Description using the singular or plural number may also include the plural or singular number respectively.
  • The teachings of the invention provided herein can be applied to other systems, not necessarily the system described herein. For example, while much of the above Detailed Description discusses the IEEE 802.11 and Bluetooth standards, aspects of the invention may be implemented using other wireless standards, protocols or frequencies, such as CDMA, GSM, and IEEE 802.1 and 802.20. The elements and acts of the various embodiments described above can be combined to provide further embodiments.
  • All of the above patents and applications and other references, including any that may be listed in accompanying filing papers, as well as patent application Ser. No. 10/549,342, filed Mar. 24, 2004, entitled “Self-Configuring, Self-Optimizing Wireless Local Area Network System”; U.S. patent application Ser. No. 10/139,609, filed May 2, 2002, entitled “Wireless Base Station To Base Station Synchronization In A Communication System, Such As A System Employing a Short-range Frequency Hopping Or Time Division Duplex Scheme”; and Application No. PCT/US03/28840, filed Sep. 12, 2003, entitled “Network Access Points Using Multiple Devices”, all commonly assigned, are incorporated herein by reference. Aspects of the invention can be modified, if necessary, to employ the systems, functions, and concepts of the various references described above to provide yet further embodiments of the invention.
  • These and other changes can be made to the invention in light of the above Detailed Description. While the above description details certain embodiments of the invention and describes the best mode contemplated, no matter how detailed the above appears in text, the invention can be practiced in many ways. Details of the node placement routine may vary considerably in its implementation details, while still be encompassed by the invention disclosed herein. As noted above, particular terminology used when describing certain features or aspects of the invention should not be taken to imply that the terminology is being re-defined herein to be restricted to any specific characteristics, features or aspects of the invention with which that terminology is associated. In general, the terms used in the following claims should not be construed to limit the invention to the specific embodiments disclosed in the specification, unless the above Detailed Description section explicitly defines such terms. Accordingly, the actual scope of the invention encompasses not only the disclosed embodiments, but also all equivalent ways of practicing or implementing the invention under the claims.
  • While certain aspects of the invention are presented below in certain claim forms, the inventors contemplate the various aspects of the invention in any number of claim forms. For example, while only one aspect of the invention is recited as embodied in a computer-readable medium, other aspects may likewise be embodied in a computer-readable medium. Accordingly, the inventors reserve the right to add additional claims after filing the application to pursue such additional claim forms for other aspects of the invention.

Claims (21)

1-27. (canceled)
28. An apparatus, comprising:
a base module positioned within a stack, said stack being associated with a node of a wireless local area network, and said wireless local area network being configured to communicate with an external network;
an antenna module positioned within the stack; and
one or more wireless modules positioned within the stack and coupled to the base and antenna modules,
wherein a first wireless module of the wireless modules is configured to
identify other wireless modules in the stack,
determine whether the first wireless module is a backhaul module or an access point module, and
responsive to determining that the first wireless module is a backhaul node, determine an access point with which to connect.
29. The apparatus of claim 28, wherein to determine whether the first wireless module is a backhaul module or an access point module, the first wireless module is configured to determine whether a Dynamic Host Configuration Protocol is being received wirelessly or via a wired ETHERNET connection.
30. The apparatus of claim 28, wherein the first wireless module comprises a finite state machine configured to determine an access point with which to connect.
31. The apparatus of claim 28, wherein at least two of the one or more wireless modules employ different short-range wireless protocols.
32. The apparatus of claim 31, wherein the different short-range wireless protocols comprise at least two different IEEE 802.11-type protocols, or a combination of at least one of the at least two different IEEE 802.11-type protocols and a BLUETOOTH protocol.
33. The apparatus of claim 28, wherein the apparatus is configured to communicate wirelessly with one or more mobile units within the wireless local area network.
34. The apparatus of claim 28, wherein the apparatus is configured to provide connectivity to the external wired network.
35. The apparatus of claim 28, wherein the first wireless module is configured to automatically perform discovering backhaul connectivity to the external wired network by:
determining one or more wireless communication paths to one or more access points connected to the external wired network wirelessly or through a wired connection,
identifying a shortest communication path of the one or more wireless communication paths to a selected access point, and
establishing a communication path using the shortest communication path with the selected access point to provide communications between the first wireless module with the wired network via the selected access point.
36. The apparatus of claim 35, wherein, to identify the shortest communication path to the selected access point, the first wireless module is further configured to determine round trip delay times for communicating with the first wireless module using a return signal strength indicator from each of the one or more access points.
37. The apparatus of claim 35, wherein at least one of the wireless modules is configured to use a first type of encryption for communicating with at least one wireless mobile unit within the wireless local area network, and to use a second type of encryption for data traffic provided to the selected access point, such that the wireless mobile unit is configured to exchange data with said at least one of the wireless modules without compromising a security of the data traffic provided between the said at least one of the wireless modules and the selected access point under the second type of encryption.
38. The apparatus of claim 35, wherein the selected access point of the one or more access points is a backhaul node connected wirelessly to said external wired network wirelessly.
39. The apparatus of claim 28, wherein determining an access point with which to connect includes considering a return signal strength indicator from each of candidate access points.
40. A method, comprising:
performing, by a first wireless module of a plurality of wireless modules comprised in a stack associated with a node of a wireless local area network, an automatic self-discovery by identifying other wireless modules in the stack,
automatically determining whether the first wireless module is a backhaul module or an access point module,
responsive to determining that the first wireless module is a backhaul node, determine an access point with which to connect,
wherein the stack further comprises a base module and an antenna module to which the one or more wireless modules are coupled.
41. The method of claim 40, wherein to determine whether the first wireless module is a backhaul module or an access point module, the first wireless module is configured to determine whether a Dynamic Host Configuration Protocol is being received wirelessly or via a wired ETHERNET connection.
42. The method of claim 40, wherein the first wireless module comprises a finite state machine configured to determine an access point with which to connect.
43. The method of claim 40, wherein at least two of the one or more wireless modules employ different short-range wireless protocols and the different short-range wireless protocols comprise at least two different IEEE 802.11-type protocols, or a combination of at least one of the at least two different IEEE 802.11-type protocols and a BLUETOOTH protocol.
44. The method of claim 40, further comprising automatically discovering connectivity to the external wired network by at least one of said wireless modules or each of said wireless modules by performing:
determining one or more wireless communication paths to one or more access points connected to said external wired network wirelessly or through a wired connection;
identifying a shortest communication path of said one or more wireless communication paths to a selected access point of the one or more access points; and
establishing a communication path using said shortest communication path with the selected access point to provide communications between the first wireless module with the wired network via the selected access point.
45. The method of claim 44, further comprising determining round trip delay times for communicating with the first wireless module using a return signal strength indicator from each of the one or more access points to identify the shortest communication path to the selected access point.
46. The method of claim 44, wherein determining the one or more communication paths to the one or more access points is performed periodically to continuously provide optimal data traffic routing and to reroute the data traffic to a new access point of said one or more access points if the one selected access point fails.
47. The method of claim 40, wherein determining to which access point to connect includes considering a return signal strength indicator from each of candidate access points.
US14/029,354 2003-03-24 2013-09-17 Self-configuring, self-optimizing wireless local area network system Abandoned US20140086060A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US14/029,354 US20140086060A1 (en) 2003-03-24 2013-09-17 Self-configuring, self-optimizing wireless local area network system
US15/145,541 US20160323815A1 (en) 2003-03-24 2016-05-03 Self-configuring, self-optimizing wireless local area network system

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
US45752903P 2003-03-24 2003-03-24
PCT/US2004/009237 WO2004086667A2 (en) 2003-03-24 2004-03-24 Self-configuring, self-optimizing wireless local area network system
US54934207A 2007-02-05 2007-02-05
US12/775,175 US8027324B2 (en) 2003-03-24 2010-05-06 Self-configuring, self-optimizing wireless local area network system
US13/245,254 US8559410B2 (en) 2003-03-24 2011-09-26 Self-configuring, self-optimizing wireless local area network system
US14/029,354 US20140086060A1 (en) 2003-03-24 2013-09-17 Self-configuring, self-optimizing wireless local area network system

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US13/245,254 Continuation US8559410B2 (en) 2003-03-24 2011-09-26 Self-configuring, self-optimizing wireless local area network system

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US15/145,541 Continuation US20160323815A1 (en) 2003-03-24 2016-05-03 Self-configuring, self-optimizing wireless local area network system

Publications (1)

Publication Number Publication Date
US20140086060A1 true US20140086060A1 (en) 2014-03-27

Family

ID=44352216

Family Applications (5)

Application Number Title Priority Date Filing Date
US10/549,342 Active 2026-04-23 US7733833B2 (en) 2003-03-24 2004-03-24 Self-configuring, self-optimizing wireless local area network system
US12/775,175 Expired - Fee Related US8027324B2 (en) 2003-03-24 2010-05-06 Self-configuring, self-optimizing wireless local area network system
US13/245,254 Expired - Fee Related US8559410B2 (en) 2003-03-24 2011-09-26 Self-configuring, self-optimizing wireless local area network system
US14/029,354 Abandoned US20140086060A1 (en) 2003-03-24 2013-09-17 Self-configuring, self-optimizing wireless local area network system
US15/145,541 Abandoned US20160323815A1 (en) 2003-03-24 2016-05-03 Self-configuring, self-optimizing wireless local area network system

Family Applications Before (3)

Application Number Title Priority Date Filing Date
US10/549,342 Active 2026-04-23 US7733833B2 (en) 2003-03-24 2004-03-24 Self-configuring, self-optimizing wireless local area network system
US12/775,175 Expired - Fee Related US8027324B2 (en) 2003-03-24 2010-05-06 Self-configuring, self-optimizing wireless local area network system
US13/245,254 Expired - Fee Related US8559410B2 (en) 2003-03-24 2011-09-26 Self-configuring, self-optimizing wireless local area network system

Family Applications After (1)

Application Number Title Priority Date Filing Date
US15/145,541 Abandoned US20160323815A1 (en) 2003-03-24 2016-05-03 Self-configuring, self-optimizing wireless local area network system

Country Status (4)

Country Link
US (5) US7733833B2 (en)
EP (1) EP1606958A4 (en)
JP (1) JP4515451B2 (en)
WO (1) WO2004086667A2 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105873023A (en) * 2016-05-09 2016-08-17 深圳市天工测控技术有限公司 Indoor positioning system and method based on BLE mesh networking
WO2021120110A1 (en) * 2019-12-19 2021-06-24 深圳市汇顶科技股份有限公司 Positioning method and apparatus, and positioning system

Families Citing this family (80)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8019836B2 (en) * 2002-01-02 2011-09-13 Mesh Comm, Llc Wireless communication enabled meter and network
WO2004086667A2 (en) * 2003-03-24 2004-10-07 Strix Systems, Inc. Self-configuring, self-optimizing wireless local area network system
EP1606961A4 (en) 2003-03-24 2011-04-20 Strix Systems Inc Node placement method within a wireless network, such as a wireless local area network
US8326484B2 (en) * 2004-05-20 2012-12-04 General Motors Llc Programmable wireless in-line connector
US7286834B2 (en) * 2004-07-13 2007-10-23 Sbc Knowledge Ventures, Lp System and method for location based policy management
US7460489B2 (en) * 2004-07-21 2008-12-02 Tropos Networks, Inc. Wireless mesh network timed commit provisioning
US7415278B2 (en) * 2004-10-27 2008-08-19 Azalea Networks Method and system for creating and deploying a mesh network
TWI391018B (en) 2004-11-05 2013-03-21 Ruckus Wireless Inc Throughput enhancement by acknowledgment suppression
US7505447B2 (en) 2004-11-05 2009-03-17 Ruckus Wireless, Inc. Systems and methods for improved data throughput in communications networks
US8619662B2 (en) 2004-11-05 2013-12-31 Ruckus Wireless, Inc. Unicast to multicast conversion
US8638708B2 (en) 2004-11-05 2014-01-28 Ruckus Wireless, Inc. MAC based mapping in IP based communications
US7519021B1 (en) 2005-04-11 2009-04-14 Sprint Communications Company Lp Third party access to Ethernet service from wireless base stations
US7773555B1 (en) 2005-04-11 2010-08-10 Sprint Communications Company L.P. Extension of an ethernet backhaul system for wireless base stations over a cable television distribution network
US20060227767A1 (en) * 2005-04-11 2006-10-12 Sprint Communications Company L. P. Fault tolerant architecture for wireless base stations using ethernet backhaul
US8428584B2 (en) * 2005-07-01 2013-04-23 Research In Motion Limited System and method for accelerating network selection by a wireless user equipment (UE) device
US20070091859A1 (en) * 2005-10-26 2007-04-26 Aseem Sethi System and method for association of mobile units with an access point
US8559350B2 (en) 2005-12-20 2013-10-15 Microsoft Corporation Mechanism to convey discovery information in a wireless network
US8478300B2 (en) 2005-12-20 2013-07-02 Microsoft Corporation Proximity service discovery in wireless networks
US7613426B2 (en) 2005-12-20 2009-11-03 Microsoft Corporation Proximity service discovery in wireless networks
US20070218910A1 (en) * 2006-03-15 2007-09-20 Motorola, Inc. Dynamic beam steering of backhaul traffic
US7688835B2 (en) * 2006-03-15 2010-03-30 Motorola, Inc. Dynamic wireless backhaul
US10681151B2 (en) 2006-05-15 2020-06-09 Microsoft Technology Licensing, Llc Notification framework for wireless networks
US7843834B2 (en) * 2006-09-15 2010-11-30 Itron, Inc. Use of minimal propagation delay path to optimize a mesh network
US8515473B2 (en) * 2007-03-08 2013-08-20 Bae Systems Information And Electronic Systems Integration Inc. Cognitive radio methodology, physical layer policies and machine learning
US8681691B2 (en) 2007-07-25 2014-03-25 Microsoft Corporation Base station initiated proximity service discovery and connection establishment
US7974574B2 (en) 2007-07-25 2011-07-05 Microsoft Corporation Base station initiated proximity service discovery and connection establishment
US8547899B2 (en) 2007-07-28 2013-10-01 Ruckus Wireless, Inc. Wireless network throughput enhancement through channel aware scheduling
FR2925803B1 (en) * 2007-12-21 2010-02-26 Canon Kk METHOD FOR DETERMINING A SET OF RELAY COMMUNICATION DEVICES FOR DATA TRANSFER
US8355343B2 (en) 2008-01-11 2013-01-15 Ruckus Wireless, Inc. Determining associations in a mesh network
EP2081324B1 (en) 2008-01-21 2013-01-09 Alcatel Lucent Method and system for selecting a radio access platform,
US9105031B2 (en) 2008-02-22 2015-08-11 Microsoft Technology Licensing, Llc Authentication mechanisms for wireless networks
GB2459450A (en) * 2008-04-21 2009-10-28 Bubblenets Ltd Automatic interconnection of Intelligent Wireless Nodes to provide connection to external networks
US7978632B2 (en) * 2008-05-13 2011-07-12 Nortel Networks Limited Wireless mesh network transit link topology optimization method and system
US8214468B2 (en) * 2008-05-15 2012-07-03 Dell Products L.P. System and method for configuring devices for wireless communication
US8132004B2 (en) * 2008-06-12 2012-03-06 The Boeing Company Multiple independent levels of security containing multi-level security interface
US8224256B2 (en) * 2009-01-29 2012-07-17 Fisher-Rosemont Systems, Inc. Wireless field maintenance adapter
WO2010099053A2 (en) * 2009-02-24 2010-09-02 David Ryan Managing radio resources using extended management information bases in wireless networks
KR101540797B1 (en) 2009-03-12 2015-07-30 삼성전자 주식회사 Method for connecting wireless communication devices and wireless communication device using this method
US9532232B2 (en) 2009-05-15 2016-12-27 Fisher-Rosemount Systems, Inc. Detection and location of wireless field devices
CN102356364A (en) * 2009-05-15 2012-02-15 费希尔-罗斯蒙德系统公司 Handheld field maintenance tool with improved functionality
CN101896009B (en) * 2009-05-18 2013-03-27 中兴通讯股份有限公司 System and method for self-discovering remote radio unit and self-establishing topological structure
US8458718B2 (en) * 2009-08-27 2013-06-04 The Boeing Company Statically partitioning into fixed and independent systems with fixed processing core
US9979626B2 (en) * 2009-11-16 2018-05-22 Ruckus Wireless, Inc. Establishing a mesh network with wired and wireless links
US9999087B2 (en) 2009-11-16 2018-06-12 Ruckus Wireless, Inc. Determining role assignment in a hybrid mesh network
CN102244853B (en) * 2010-05-13 2014-07-16 中兴通讯股份有限公司 Network element self-discovery method and system
CN101873357A (en) * 2010-05-24 2010-10-27 上海宏美通信设备有限公司 Method for automatically discovering wireless access points
US10268180B2 (en) 2010-07-28 2019-04-23 Fisher-Rosemount Systems, Inc. Handheld field maintenance tool with simulation of field device for instruction or qualification
CA2806729A1 (en) * 2010-08-06 2012-02-09 Acquire Media Ventures Inc. Method and system for pacing, ack'ing, timing, and handicapping (path) for simultaneous receipt of documents
US8990560B2 (en) 2011-06-17 2015-03-24 The Boeing Company Multiple independent levels of security (MILS) host to multilevel secure (MLS) offload communications unit
US9826571B2 (en) * 2011-06-30 2017-11-21 Aruba Networks, Inc. Mesh node role discovery and automatic recovery
US9936441B2 (en) * 2011-08-01 2018-04-03 Aruba Networks, Inc. Infrastructure-assisted client management using synthesized beacon reports
US10848979B2 (en) 2011-08-01 2020-11-24 Hewlett Packard Enterprise Development Lp System, apparatus and method for managing client devices within a wireless network
US9544810B2 (en) * 2011-11-14 2017-01-10 T-Mobile Usa, Inc. Device-based architecture for self organizing networks
US9320065B2 (en) * 2012-03-06 2016-04-19 Koninklijke Philips N.V. Wireless docking automatic configuration and optimization system
KR20140063334A (en) * 2012-11-16 2014-05-27 삼성전자주식회사 Apparatus and method for connecting to a local area communication in a portable terminal
CN103079214A (en) * 2012-12-16 2013-05-01 北京泛联至诚科技有限公司 Internet of Things communication relay node deployment method based on road and crossing distribution and density
US9042829B2 (en) * 2013-01-04 2015-05-26 Nokia Corporation Method, apparatus, and computer program product for wireless short-range communication
US9226211B2 (en) * 2013-01-17 2015-12-29 Intel IP Corporation Centralized partitioning of user devices in a heterogeneous wireless network
CN104349482B (en) * 2013-07-26 2019-01-11 株式会社理光 Distribute the method and system of wireless channel
US9712541B1 (en) 2013-08-19 2017-07-18 The Boeing Company Host-to-host communication in a multilevel secure network
US9357484B2 (en) 2013-11-11 2016-05-31 Avaya Inc. Elastic wireless control plane
CN104640191B (en) * 2013-11-15 2018-01-16 株式会社理光 The channel power regulation of the positional information of self-organizing subnet based on confined area
TWI507076B (en) * 2014-02-10 2015-11-01 Hon Hai Prec Ind Co Ltd Wlan access device and method of controlling wireless signals
US9578620B2 (en) 2014-04-22 2017-02-21 Comcast Cable Communications, Llc Mapping and bridging wireless networks to provide better service
US20170048731A1 (en) * 2014-09-26 2017-02-16 Hewlett Packard Enterprise Development Lp Computing nodes
US9407624B1 (en) 2015-05-14 2016-08-02 Delphian Systems, LLC User-selectable security modes for interconnected devices
US10425310B2 (en) * 2015-12-23 2019-09-24 Cisco Technology, Inc. Network device mitigation against rogue parent device in a tree-based network
CN108702395B (en) 2016-01-28 2020-12-01 慧与发展有限责任合伙企业 Wireless mesh network formation
US10897710B2 (en) 2017-05-01 2021-01-19 Analog Devices International Unlimited Company Disjoint security in wireless networks with multiple managers or access points
US10755263B1 (en) 2017-06-21 2020-08-25 Wells Fargo Bank, N.A. Wallet to wallet P2P lending
US10834659B2 (en) * 2018-03-05 2020-11-10 Phazr, Inc. Link aggregation for mesh networks
US10574627B2 (en) 2018-03-07 2020-02-25 Cisco Technology, Inc. Dynamic orthogonal local DHCP IP pools for wireless access points
CN110418375B (en) * 2018-04-27 2022-12-02 慧与发展有限责任合伙企业 Automatically determining mesh roles for network devices
US11503479B2 (en) * 2019-05-10 2022-11-15 Parallel Wireless, Inc. Backhaul dynamic link distance
IT201900025183A1 (en) * 2019-12-27 2021-06-27 Erreffe Progetti S R L Method for intelligent communication of company workstations in hostile environments
US11283644B2 (en) 2020-03-04 2022-03-22 At&T Intellectual Property I, L.P. Facilitation of access point authenticated tunneling for 5G or other next generation network
US20210306925A1 (en) * 2020-03-31 2021-09-30 Arris Enterprises Llc Small cell with predefined handover parameters
CN111711535B (en) * 2020-06-03 2023-04-28 广州维德科技有限公司 Multi-system integrated communication system
WO2023069087A1 (en) * 2021-10-20 2023-04-27 Zeku, Inc. Apparatus and method of joint equalization and decoding using a finte state machine for long-range mode bluetooth communication
US11800398B2 (en) 2021-10-27 2023-10-24 T-Mobile Usa, Inc. Predicting an attribute of an immature wireless telecommunication network, such as a 5G network

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020191573A1 (en) * 2001-06-14 2002-12-19 Whitehill Eric A. Embedded routing algorithms under the internet protocol routing layer of a software architecture protocol stack in a mobile Ad-Hoc network
US20030123457A1 (en) * 2001-12-27 2003-07-03 Koppol Pramod V.N. Apparatus and method for distributed software implementation of OSPF protocol
US20040028017A1 (en) * 2002-07-29 2004-02-12 Whitehill Eric A. System and method for determining physical location of a node in a wireless network during an authentication check of the node
US20040100923A1 (en) * 2002-11-26 2004-05-27 Sony Corporation Wireless intelligent switch engine
US7009966B2 (en) * 2000-02-18 2006-03-07 Tellabs Operations, Inc. Method and apparatus for a data first optical network
US7085541B2 (en) * 2003-01-31 2006-08-01 Bbnt Solutions Llc Systems and methods for directional antenna power control in a wireless network
US7103313B2 (en) * 2002-06-05 2006-09-05 Nokia Corporation Automatic determination of access point content and services for short-range wireless terminals
US7106816B2 (en) * 2002-12-18 2006-09-12 Qualcomm Incorporated Supporting multiple wireless protocols in a wireless device
US7254117B2 (en) * 2001-10-20 2007-08-07 Electronics And Telecommunications Research Institute Closed-loop power control apparatus for mobile satellite communication system and method thereof
US7433691B1 (en) * 2002-03-25 2008-10-07 Meshnetworks, Inc. System and method for enabling an access point in an ad-hoc wireless network with fixed wireless routers and wide area network (WAN) access points to identify the location of subscriber device
US7733833B2 (en) * 2003-03-24 2010-06-08 Strix Systems, Inc. Self-configuring, self-optimizing wireless local area network system

Family Cites Families (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ATE321387T1 (en) 1991-10-01 2006-04-15 Broadcom Corp LOCAL RADIO FREQUENCY NETWORK
EP0582373B1 (en) * 1992-07-17 1999-10-06 Sun Microsystems, Inc. Method and apparatus for implementing self-organization in a wireless local area network
CA2124974C (en) 1993-06-28 1998-08-25 Kajamalai Gopalaswamy Ramakrishnan Method and apparatus for link metric assignment in shortest path networks
CA2129199C (en) 1994-07-29 1999-07-20 Roger Y.M. Cheung Method and apparatus for bridging wireless lan to a wired lan
US5987011A (en) 1996-08-30 1999-11-16 Chai-Keong Toh Routing method for Ad-Hoc mobile networks
US6232884B1 (en) * 1997-01-02 2001-05-15 Charles H. Gabbard Remotely operable vehicle disabling system
US6252884B1 (en) * 1998-03-20 2001-06-26 Ncr Corporation Dynamic configuration of wireless networks
US6760748B1 (en) 1999-01-20 2004-07-06 Accenture Llp Instructional system grouping student terminals
US6499006B1 (en) 1999-07-14 2002-12-24 Wireless Valley Communications, Inc. System for the three-dimensional display of wireless communication system performance
US6526034B1 (en) * 1999-09-21 2003-02-25 Tantivy Communications, Inc. Dual mode subscriber unit for short range, high rate and long range, lower rate data communications
US6697325B1 (en) * 1999-12-07 2004-02-24 Nortel Networks Limited System, device, and method for expediting reconvergence in a communication network
JP3461493B2 (en) * 2000-11-01 2003-10-27 日本電気株式会社 Network system and relay station device
US6594493B1 (en) * 2000-02-09 2003-07-15 Lucent Technologies Inc. Paging arrangement for wireless communications
US6996065B2 (en) 2000-07-06 2006-02-07 Lucent Technologies Inc. Dynamic backup routing of network tunnel paths for local restoration in a packet network
US6697335B1 (en) * 2000-07-27 2004-02-24 Lucent Technologies Inc. Quality of service routing in information networks over paths having performance-dependent costs
US6971063B1 (en) 2000-07-28 2005-11-29 Wireless Valley Communications Inc. System, method, and apparatus for portable design, deployment, test, and optimization of a communication network
US6625454B1 (en) 2000-08-04 2003-09-23 Wireless Valley Communications, Inc. Method and system for designing or deploying a communications network which considers frequency dependent effects
US6970453B2 (en) 2000-10-03 2005-11-29 Nortel Networks Limited System interface supporting IP endpoint data exchange and regulation
US6691293B2 (en) 2000-11-01 2004-02-10 Fujitsu Limited Layout instrument for semiconductor integrated circuits, layout method for semiconductor integrated circuits and recording medium that stores a program for determining layout of semiconductor integrated circuits
US6704301B2 (en) * 2000-12-29 2004-03-09 Tropos Networks, Inc. Method and apparatus to provide a routing protocol for wireless devices
US7283494B2 (en) * 2001-04-18 2007-10-16 Skypilot Networks, Inc. Network channel access protocol-interference and load adaptive
US7272121B2 (en) * 2001-06-19 2007-09-18 Telcordia Technologies, Inc. Methods and apparatus for a modular wireless system
US7016362B2 (en) * 2002-01-11 2006-03-21 Lockheed Martin Corporation System for and method of implementing wireless neighborhood area networks
US20030172142A1 (en) * 2002-03-11 2003-09-11 David Su Method for building a vapa by using wireless-LAN interface card
EP1495588A4 (en) * 2002-04-18 2005-05-25 Sarnoff Corp Methods and apparatus for providing ad-hoc networked sensors and protocols
US6754192B2 (en) * 2002-04-29 2004-06-22 Harris Corporation Temporal transition network protocol (TTNP) in a mobile ad hoc network
US7107577B2 (en) * 2002-11-20 2006-09-12 Telefonaktiebolaget Lm Ericsson (Publ) Software architecture for controlling an apparatus with one or more hardware units
US7382749B2 (en) * 2002-11-26 2008-06-03 Sony Corporation Systems, methods, and apparatus with a common wireless communications protocol
US7350077B2 (en) * 2002-11-26 2008-03-25 Cisco Technology, Inc. 802.11 using a compressed reassociation exchange to facilitate fast handoff
US7295960B2 (en) 2003-01-22 2007-11-13 Wireless Valley Communications, Inc. System and method for automated placement or configuration of equipment for obtaining desired network performance objectives
US6982949B2 (en) * 2003-02-28 2006-01-03 Microsoft Corporation Vertical roaming in wireless networks through improved wireless network cell boundary detection

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7009966B2 (en) * 2000-02-18 2006-03-07 Tellabs Operations, Inc. Method and apparatus for a data first optical network
US20020191573A1 (en) * 2001-06-14 2002-12-19 Whitehill Eric A. Embedded routing algorithms under the internet protocol routing layer of a software architecture protocol stack in a mobile Ad-Hoc network
US7254117B2 (en) * 2001-10-20 2007-08-07 Electronics And Telecommunications Research Institute Closed-loop power control apparatus for mobile satellite communication system and method thereof
US20030123457A1 (en) * 2001-12-27 2003-07-03 Koppol Pramod V.N. Apparatus and method for distributed software implementation of OSPF protocol
US7433691B1 (en) * 2002-03-25 2008-10-07 Meshnetworks, Inc. System and method for enabling an access point in an ad-hoc wireless network with fixed wireless routers and wide area network (WAN) access points to identify the location of subscriber device
US7103313B2 (en) * 2002-06-05 2006-09-05 Nokia Corporation Automatic determination of access point content and services for short-range wireless terminals
US20040028017A1 (en) * 2002-07-29 2004-02-12 Whitehill Eric A. System and method for determining physical location of a node in a wireless network during an authentication check of the node
US20040100923A1 (en) * 2002-11-26 2004-05-27 Sony Corporation Wireless intelligent switch engine
US7106816B2 (en) * 2002-12-18 2006-09-12 Qualcomm Incorporated Supporting multiple wireless protocols in a wireless device
US7085541B2 (en) * 2003-01-31 2006-08-01 Bbnt Solutions Llc Systems and methods for directional antenna power control in a wireless network
US7733833B2 (en) * 2003-03-24 2010-06-08 Strix Systems, Inc. Self-configuring, self-optimizing wireless local area network system
US8027324B2 (en) * 2003-03-24 2011-09-27 Strix Systems, Inc. Self-configuring, self-optimizing wireless local area network system
US8559410B2 (en) * 2003-03-24 2013-10-15 Strix Systems, Inc. Self-configuring, self-optimizing wireless local area network system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105873023A (en) * 2016-05-09 2016-08-17 深圳市天工测控技术有限公司 Indoor positioning system and method based on BLE mesh networking
WO2021120110A1 (en) * 2019-12-19 2021-06-24 深圳市汇顶科技股份有限公司 Positioning method and apparatus, and positioning system

Also Published As

Publication number Publication date
US8559410B2 (en) 2013-10-15
WO2004086667A3 (en) 2005-01-27
US8027324B2 (en) 2011-09-27
US7733833B2 (en) 2010-06-08
US20120014285A1 (en) 2012-01-19
EP1606958A2 (en) 2005-12-21
JP4515451B2 (en) 2010-07-28
US20100220630A1 (en) 2010-09-02
US20160323815A1 (en) 2016-11-03
JP2006524958A (en) 2006-11-02
EP1606958A4 (en) 2011-04-13
WO2004086667A2 (en) 2004-10-07
US20070127417A1 (en) 2007-06-07

Similar Documents

Publication Publication Date Title
US8027324B2 (en) Self-configuring, self-optimizing wireless local area network system
US10567979B2 (en) Wireless communication device, wireless communication system, wireless communication method, and program
US10278105B2 (en) Seamless mobility in wireless networks
US9204390B2 (en) Energy-saving mobile node control method using wireless multi-interfaces
US7881277B2 (en) Communication method and apparatus for distributed network system where cognitive radio technology is applied
US8041319B2 (en) Method and apparatus to intelligently perform scanning and assist scanning by profiling scanning history
US7251489B2 (en) Wireless base station neighbor discovery in a communication system, such as a system employing a short-range frequency hopping scheme
US7907562B2 (en) Managing dense wireless access point infrastructures in wireless local area networks
US8787309B1 (en) Seamless mobility in wireless networks
CN101218835B (en) Direct wireless client to client communication
US20080320108A1 (en) Management Policies For Dense Wireless Access Point Infrastructures in Wireless Local Area Networks
JP2010520731A (en) Device and method for connection recovery in a wireless network
CN102625232A (en) Additional data usable in apparatus positioning
GB2396782A (en) Apparatus for controlling load balance of multi-access points in a wireless lan system and method thereof
JP2008529382A (en) Beacon transmission for wireless networks
Ulukan et al. Angular MAC protocol with location based scheduling for wireless ad hoc networks
KR100431471B1 (en) An internet service system using sectorizated wireless LAN, and its handover and roaming method among sectors
Bae et al. Cooperative radio resource management mechanisms based on autonomous session establishment between APs in IEEE 802.11 WLAN
Jang A multiple channel access protocol for ad hoc wireless networks

Legal Events

Date Code Title Description
AS Assignment

Owner name: STRIX SYSTEMS, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KALIKA, LEONID;BERG, ALEXANDER;ABRAHAM, GABI;AND OTHERS;SIGNING DATES FROM 20061024 TO 20070105;REEL/FRAME:034983/0343

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION