US20150110100A1 - Wireless communication system, wireless communication device, projector, and wireless communication method - Google Patents

Wireless communication system, wireless communication device, projector, and wireless communication method Download PDF

Info

Publication number
US20150110100A1
US20150110100A1 US14/589,346 US201514589346A US2015110100A1 US 20150110100 A1 US20150110100 A1 US 20150110100A1 US 201514589346 A US201514589346 A US 201514589346A US 2015110100 A1 US2015110100 A1 US 2015110100A1
Authority
US
United States
Prior art keywords
address
service set
set identifier
terminal
ssid
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/589,346
Inventor
Koichiro Ota
Kazuyoshi Kitabayashi
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Seiko Epson Corp
Original Assignee
Seiko Epson Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Seiko Epson Corp filed Critical Seiko Epson Corp
Priority to US14/589,346 priority Critical patent/US20150110100A1/en
Publication of US20150110100A1 publication Critical patent/US20150110100A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/12Access restriction or access information delivery, e.g. discovery data delivery using downlink control channel
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/14Access restriction or access information delivery, e.g. discovery data delivery using user query or user detection
    • H04W76/02
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/005Discovery of network devices, e.g. terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/20Selecting an access point
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks

Definitions

  • the present invention relates to technologies for wirelessly transmitting data to a projector.
  • SSID service set identifier
  • an SSID is usually set in advance by an administrator of the network, and an IP address is usually set automatically by the base station.
  • Each device can perform communication by using the IP address and the SSID.
  • a master unit In ad-hoc mode, an administrator of the wireless network is not present. Therefore, in ad-hoc mode, one device (hereinafter referred to as a “master unit”) generates an independent basic service set (IBSS) network and an SSID for identifying an IBSS network, and sends a beacon signal including the SSID.
  • Other devices hereinafter referred to as “slave units”) can take part in a wireless network (an IBSS network) corresponding to the SSID by receiving the SSID and setting the SSID in a wireless adapter.
  • communication in which the other party is identified requires the IP address of the other party.
  • the master unit when the technologies which provide the SSID included in the beacon signal with an IP address are used, if the IP address of the master unit is changed, the master unit generates the SSID again and transmits the SSID.
  • a slave unit since it takes time to perform scanning via a wireless network, a slave unit sometimes accumulates the acquired SS ID information for a predetermined period. In such a case, the slave unit has a plurality of SSIDs, that is, an SSID acquired before address change and an SSID acquired after address change. In this case, even though the wireless networks are generated by the same master unit, the slave unit cannot determine which of the wireless networks corresponding to the SSIDs is a wireless network to which the slave unit makes connection.
  • An advantage of some aspects of the invention is to solve at least part of the problems described above and improve the convenience of wireless communication in ad-hoc mode.
  • the invention can be realized as forms or application examples described below.
  • a wireless communication system which performs communication between first and second terminals in ad-hoc mode
  • the first terminal includes an identification information storing section storing identification information of the first terminal, an IP address storing section storing an IP address of the first terminal, a service set identifier generating section generating a service set identifier by using priority information indicating priority of wireless connection, the identification information, and the IP address, a priority information updating section updating the priority information every time the service set identifier is generated, and a beacon signal generating section generating a beacon signal including the service set identifier
  • the second terminal includes a service set identifier acquiring section acquiring the service set identifier from the beacon signal, memory storing the service set identifier as a candidate for selection, a service set identifier selecting section selecting, when a plurality of service set identifier candidates having the same identification information are stored in the memory, one service set identifier from the plurality of candidates based on the priority information, an IP address acquiring section
  • the second terminal can select one service set identifier based on the updated priority information. This makes it possible to improve the convenience of wireless communication in ad-hoc mode.
  • a firewall is set in the second terminal, and the communicating section establishes wireless communication between the first and second terminals by transmitting a unicast packet including the IP addresses of the first and second terminals to the first terminal and receiving a response to the unicast packet from the first terminal.
  • the service set identifier includes check information for checking correctness of the service set identifier.
  • the first and second terminals each store an address series table for establishing correspondence between IP address related information and the IP address.
  • the SSID does not include the IP address itself. Therefore, the third party cannot acquire the IP address of the first terminal even when the third party receives the SSID sent from the first terminal.
  • a wireless communication device performing communication in ad-hoc mode, including: an identification information storing section storing identification information; an IP address storing section storing an IP address; a service set identifier generating section generating a service set identifier by using priority information indicating priority of wireless connection, the identification information, and the IP address; a priority information updating section updating the priority information every time the service set identifier is generated; and a beacon signal generating section generating a beacon signal including the service set identifier.
  • a projector projecting an image corresponding to data received from an information terminal including: the wireless communication device described in the application example described above, the wireless communication device for receiving the data; a CPU converting the received data into projection data; and an image projection mechanism projecting an image based on the projection data.
  • a wireless communication method for performing communication between first and second terminals in ad-hoc mode including: sending a beacon signal including a service set identifier including IP address related information related to an IP address of the first terminal, priority information indicating priority of wireless connection, and identification information of the first terminal; acquiring the service set identifier from the beacon signal and storing the service set identifier in memory of the second terminal as a candidate for selection; when a plurality of service set identifier candidates having the same identification information are stored in the memory, selecting one service set identifier from the plurality of candidates based on the priority information; acquiring the IP address of the first terminal from the IP address related information of the selected service set identifier; and making a connection to the first terminal by using the acquired IP address.
  • the second terminal can select one service set identifier based on the priority information. This makes it possible to improve the convenience of wireless communication in ad-hoc mode.
  • the second terminal sets a firewall, transmits a unicast packet including the IP addresses of the first and second terminals to the first terminal, and establishes wireless communication between the first and second terminals by receiving a response to the unicast packet from the first terminal.
  • the service set identifier includes check information for checking correctness of the service set identifier.
  • the first and second terminals establish correspondence between the IP address related information and the IP address.
  • the SSID does not include the IP address itself. Therefore, the third party cannot acquire the IP address of the first terminal even when the third party receives the SSID sent from the first terminal.
  • the invention can be realized in various forms such as a network communication method in ad-hoc mode in addition to a wireless communication system.
  • FIG. 1 is an explanatory diagram showing a wireless communication system according to a first embodiment.
  • FIGS. 2A and 2B are explanatory diagrams showing the structure of an SSID which is generated by a projector.
  • FIG. 3 is an operation flowchart of a personal computer.
  • FIGS. 4A and 4B are explanatory diagrams showing an SSID in a second embodiment.
  • FIGS. 5A and 5B are explanatory diagrams showing an SSID in a third embodiment.
  • FIG. 6 is an operation flowchart of a personal computer in the third embodiment.
  • FIGS. 7A to 7D are explanatory diagrams showing an SSID in a fourth embodiment.
  • FIG. 1 is an explanatory diagram showing a wireless communication system according to a first embodiment.
  • the wireless communication system includes a personal computer 10 and a projector 20 .
  • the personal computer 10 includes a CPU 100 , RAM 110 , ROM 120 , a hard disk 122 , a wireless adapter 130 , and an antenna 150 .
  • the wireless adapter 130 includes a service set identifier (SSID) storage region 140 .
  • the wireless adapter 130 corresponds to a “communicating section” in the claims, and the service set identifier storage region 140 corresponds to “memory storing a service set identifier as a candidate for selection” in the claims.
  • SSID service set identifier
  • the hard disk 122 includes an IP address storing section 123 , an identification information storing section 124 , an SSID acquisition program product 125 , an SSID selection program product 126 , and an IP address acquisition program product 127 .
  • the IP address which is stored in the IP address storing section 123 is the IP address of the personal computer 10 .
  • the identification information which is stored in the identification information storing section 124 is the identification information of the personal computer 10 .
  • the SSID acquisition program product 125 acquires an SSID from a beacon signal received from the projector 20 , the SSID used when communication with the projector 20 is performed. When there are a plurality of acquired SSIDs, the SSID selection program product 126 selects one SSID from the plurality of SSIDs.
  • the IP address acquisition program product 127 acquires an IP address of the projector 20 from the acquired SSID of the projector 20 .
  • the SSID acquisition program product 125 corresponds to a “service set identifier acquiring section” in the claims
  • the SSID selection program product 126 corresponds to a “service set identifier selecting section” in the claims
  • the IP address acquisition program product 127 corresponds to an “IP address acquiring section” in the claims.
  • the projector 20 includes a CPU 200 , RAM 210 , ROM 220 , flash memory 222 , a wireless adapter 230 , an antenna 250 , a Video RAM 26 , and an image projection mechanism 270 .
  • the wireless adapter 230 includes a service set identifier (SSID) storage region 240 .
  • the flash memory 222 includes an IP address storing section 223 , an identification information storing section 224 , an SSID generation program product 225 , a priority information update program product 226 , and a beacon signal generation program product 227 .
  • the IP address which is stored in the IP address storing section 223 is the IP address of the projector 20 .
  • the identification information which is stored in the identification information storing section 224 is the identification information of the projector 20 .
  • the SSID generation program product 225 By using the IP address stored in the IP address storing section 223 and the identification information stored in the identification information storing section 224 , the SSID generation program product 225 generates an SSID which is used when communication with the computer 10 is performed.
  • the priority information update program product 226 updates the priority information every time the SSID generation program product 225 generates an SSID.
  • the beacon signal generating section 227 generates a beacon signal including an SSID.
  • the SSID generation program product 225 corresponds to a “service set identifier generating section” in the claims
  • the priority information update program product 226 corresponds to a “priority information updating section” in the claims
  • the beacon signal generating section 227 corresponds to a “beacon signal generating section” in the claims.
  • the projector 20 projects the data received from the personal computer 10 onto a screen (not shown). This is performed in the manner described below.
  • the CPU 100 of the personal computer 10 generates data to be projected by the projector 20 .
  • the CPU 100 transmits the data to the projector 20 by using the wireless adapter 130 and the antenna 150 .
  • the wireless adapter 130 of the personal computer 10 and the wireless adapter 230 of the projector 20 form a wireless LAN specified by IEEE 802.11, for example.
  • the CPU 200 of the projector 20 receives the data by using the antenna 250 and the wireless adapter 230 .
  • the CPU 200 converts the received data into projection data, and writes the projection data into the Video RAM 260 .
  • the image projection mechanism 270 reads the data in the Video RAM 260 , and projects the data onto the screen (not shown).
  • the structure of the image projection mechanism 270 is a structure usually used in the projectors, and therefore the descriptions thereof are omitted.
  • the personal computer 10 and the projector 20 perform communication directly with each other without using abase station, in other words, perform communication in ad-hoc mode.
  • either the personal computer 10 or the projector 20 has to generate an independent basic service set (IBSS) network and an SSID corresponding to the IBSS network.
  • the projector 20 generates an IBSS network and an SSID corresponding to the IBSS.
  • the SSID is used to identify the IBSS network.
  • the IBSS network is an independent network which is identified by the SSID, and any device can take part in the IBSS network by matching the SSID with that of the IBSS network.
  • FIGS. 2A and 2B are explanatory diagrams showing the structure of an SSID which is generated by a projector.
  • the CPU 200 of the projector 20 in the generation of an SSID, the CPU 200 of the projector 20 generates identification information for identifying the projector 20 and an SSID including the IP address of the projector 20 .
  • the SSID is formed of up to 32 characters, and the IP address can be represented by 8 characters in the case of IPV4. Therefore, the CPU 200 can assign up to 24 characters to the identification information of the device.
  • descriptions will be given on the assumption that an SSID is formed of 32 characters.
  • a region in which the identification information of the device is stored is referred to as a device name field, and a region in which the IP address is stored is referred to as an address information field.
  • the CPU 200 assigns the first 24 characters of 32 characters of an SSID to the device name field, and assigns the remaining characters to the address information field.
  • the identification information of the device is “MyProjector”, and the IP address is “192.168.0.192”.
  • the CPU 200 assigns “MyProjector” to the device name field from the beginning thereof in this order, and leaves the remaining space blank. Incidentally, the CPU 200 may assign NULL to the remaining space instead of leaving the space blank.
  • the CPU 200 assigns “C0A800C0” which is the IP address “192.168.0.192” given in hexadecimal to the address information field (the remaining 8-character field).
  • the CPU 200 stores the generated SSID in the SSID storage region 240 ( FIG. 1 ), and intermittently sends a beacon signal including the SSID at predetermined intervals.
  • FIG. 3 is an operation flowchart of the personal computer.
  • the CPU 100 ( FIG. 1 ) of the personal computer 10 searches for neighboring wireless networks. Specifically, the CPU 100 determines whether or not a beacon signal is sent from the projector 20 ( FIG. 1 ). If the beacon signal is sent, the CPU 100 receives the beacon signal and acquires an SSID from the beacon signal. In this embodiment, the SSID has values shown in FIGS. 2A and 2B .
  • step S 310 the CPU 100 determines whether or not the SSID includes an IP address.
  • the maximum value of the IP address is “255.255.255.255”. Therefore, when the IP address is given in hexadecimal, the characters used therein are 0 to 9 and A to F. Thus, when the lower 8 characters of the SSID are only these characters (any of 0 to 9 or A to F), the CPU 100 can determine that these 8 characters represent the IP address. If the SSID includes the IP address, the CPU 100 stores the received SSID in the own SSID storage region 140 , and proceeds to step S 340 . If the SSID does not include the IP address, the CPU 100 goes back to step S 300 , and continuously searches for networks.
  • step S 340 the CPU 100 connects to the network (IBSS network) identified by the SSID.
  • the personal computer 10 can merely take part in the IBSS network.
  • the personal computer 10 needs the IP address of the projector 20 to perform communication directly with the projector 20 .
  • step S 350 the CPU 100 acquires the IP address from the SSID.
  • the CPU 100 extracts 8 characters in the address information field. Since the 8 characters are formed of any of 0 to 9 or A to F as described above, the CPU 100 can determine that they are an 8-digit hexadecimal number.
  • the CPU 100 generates a 32-bit IP address from the 8-digit hexadecimal number.
  • step S 360 the CPU 100 of the personal computer 10 transmits a unicast packet to the IP address acquired in step S 350 , and issues a connection request.
  • the personal computer 10 and the projector 20 have to perform communication by identifying the IP address of the other party.
  • the CPU 100 of the personal computer 10 knows the IP address of the projector 20 , but the CPU 200 of the projector 20 does not know the IP address of the personal computer 10 .
  • the CPU 100 can inform the CPU 200 of the projector 20 of the IP address of the personal computer 10 .
  • unicast means specifying a single IP address and transmitting data.
  • sending a broadcast packet means sending data to all the devices connected to the network.
  • the CPU 100 usually specifies a unique address (a broadcast address) indicating the entire network and sends a packet.
  • the projector 20 which has received the broadcast packet returns a response packet to the personal computer by unicast.
  • the firewall may reject the response packet to the broadcast packet. Therefore, it is preferable that the CPU 100 send a unicast packet as described above. If the CPU 100 receives a valid response packet in step 5370 , the CPU 100 proceeds to step S 380 , and performs data communication with the CPU 200 of the projector 20 .
  • step S 390 When the CPU 100 sends all the data to the projector 20 , the CPU 100 ends the communication in step S 390 . If the CPU 100 does not receive a valid response packet in step S 370 , the CPU 100 goes back to step S 300 , and searches for other networks.
  • the CPU 200 of the projector 20 provides an SSID generated thereby with an IP address.
  • the CPU 100 of the personal computer 10 acquires the IP address of the projector 20 from the received SSID, and transmits data to the IP address. Therefore, in ad-hoc mode, it is possible to perform communication between the personal computer 10 and the projector 20 .
  • the CPU 100 of the personal computer 10 which has received the SSID specifies the IP address of the projector 20 and sends a unicast packet. Therefore, even when the personal computer 10 is placed in the firewall, a response packet from the projector 20 is not rejected by the firewall.
  • FIGS. 4A and 4B are explanatory diagrams showing an SSID in a second embodiment.
  • an SSID is not provided with an IP address itself of the projector 20 , but with an item number of an address series corresponding to the IP address.
  • FIG. 4A shows the structure of an SSID in the second embodiment. In this embodiment, 30 characters are assigned to a device name field, and 2 characters are assigned to an address series field.
  • FIG. 4B is a table of correspondence between the item number of the address series and the IP address. The item number and the IP address have one-to-one correspondence. For example, when the item number is “01”, a corresponding IP address is “192.168.0.1”. The correspondence table is stored in both the personal computer 10 and the projector 20 .
  • step S 350 the CPU 100 acquires the IP address of the projector.
  • the SSID does not include the IP address itself.
  • step S 350 the CPU 100 first acquires the item number of the address series. The CPU 100 then acquires a corresponding IP address by using the table of correspondence between the item number of the address series and the IP address and using the item number of the address series as a key.
  • the SSID does not include the IP address itself. Therefore, the third party cannot acquire the IP address of the projector 20 even when the third party receives the SSID sent from the projector 20 . As a result, it is possible to prevent unauthorized access to and attack on the projector 20 .
  • the IP address of the first embodiment and the item number of the address series of the second embodiment are collectively referred to as “IP address related information”.
  • the IP address related information includes both the IP address itself and information corresponding to the IP address.
  • 2 characters are assigned to the address series field; however, any number of characters can be selected as the number of characters assigned to the address series field as long as the total number of characters of an SSID is 32 characters or less.
  • FIGS. 5A and 5B are explanatory diagrams showing an SSID in a third embodiment.
  • FIG. 5A shows the structure of an SSID in the third embodiment.
  • the SSID of the third embodiment differs from the SSID of the first embodiment in that it is provided with a priority field for 2 characters. A two-digit number is assigned to the priority field.
  • the CPU 200 of the projector 20 increments the value of the priority field by 1 every time the IP address is changed. When the IP address is changed when the value of the priority field is 99, the CPU 200 restores the value of the priority field to 0 (00). The value of the priority field is restored to zero when the IP address is changed when the value of the priority field is a predetermined value.
  • FIG. 6 is an operation flowchart of the personal computer in the third embodiment.
  • steps S 620 and S 630 are performed between steps S 310 and S 340 of the first embodiment.
  • step S 620 the CPU 100 determines whether or not the SSIDs stored in the SSID storage region 140 include a plurality of SSIDs having the same identification information in the device name fields of the SSIDs. If there is only one SSID, the CPU 100 selects the SSID and proceeds to step S 340 . If there are a plurality of such SSIDs, the CPU 100 proceeds to step S 630 and determines which SSID is used.
  • step S 630 the CPU 100 determines which SSID to select.
  • FIG. 5B is a comparison table for determining which SSID has higher priority. An SSID having a greater priority information value has higher priority. As described above, since the priority information is restored to zero when the IP address is changed when the value of the priority field is a predetermined value, the CPU 100 determines the SSID to which higher priority is given by considering the above fact. Assume that the value in the priority field of one SSID stored in the SSID storage region 140 is X and the value in the priority field of the other SSID is Y. The CPU 100 obtains the value of X-Y and the value of
  • the CPU 100 determines whether the value of X ⁇ Y is more than 0, less than 0, or equal to 0.
  • the CPU 100 determines whether the value of
  • 110 ⁇ 90
  • the CPU 100 selects an SSID having X as a value in the priority field.
  • the CPU 100 selects the SSIDs. It is to be noted that, in this case, since the value of X
  • the CPU 100 selects an SSID based on the value in the priority field. Therefore, the CPU of the personal computer 10 sends a unicast packet to the IP address which is currently used by the projector, and does not send a unicast packet to the IP address which is not used by the projector 20 .
  • the number of characters in the priority field is two; however, any number of characters can be adopted.
  • FIGS. 7A to 7D are explanatory diagrams showing an SSID in a fourth embodiment.
  • FIG. 7A shows the structure of an SSID.
  • the fourth embodiment is obtained by adding a check information field to an SSID in the first embodiment. Incidentally, the number of characters in the device name field is reduced by the number of characters in the check information field.
  • FIG. 7B is obtained by adding check information to an SSID of the first embodiment.
  • the check information is calculated by using CRC-8, for example.
  • FIG. 7C shows an SSID which the third party who has seen the SSID of FIG. 7B sets in another device.
  • the SSID of FIG. 7C and the SSID of FIG. 7B have the same values in the device name field, but they have one different value in the address information field, and the device in which the third party sets the SSID is a device different from the projector 20 .
  • Such a situation can occur when, for example, the third party tries to steal the information from the personal computer 10 by faking the SSID.
  • the CPU 100 of the personal computer 10 can easily determine whether or not the SSID is a faked SSID by comparing the check information calculated based on the values of the SSID and the values in the check information field of the SSID. As a result, the CPU 100 does not take part in the network with the faked SSID shown in FIG. 7C and does not transmit the data.
  • FIG. 7D is obtained by providing a correct check information field to the SSID shown in FIG. 7C .
  • CRC-8 is used for generating the check information; however, it is also possible to adopt other methods such as a checksum.

Abstract

A wireless communication system performs ad-hoc mode communication, wherein a first terminal includes an identification information storing section, an IP address storing section, an SSID generating section generating a service set identifier, a beacon signal generating section generating a beacon signal including an SSID, and a priority information updating section updating priority information, and the second terminal includes an SSID acquiring section acquiring the SSID from the beacon signal, memory storing the SSID, an SSID selecting section selecting one SSID based on the priority information, an IP address acquiring section acquiring the IP address of the first terminal from the selected SSID, and a communicating section making a connection to the first terminal by using the acquired IP address.

Description

    CROSS-REFERENCE TO THE RELATED APPLICATIONS
  • This application is a continuation application of U.S. patent application Ser. No. 13/022,041 filed Feb. 7, 2011, which claims priority to Japanese Patent Application No. 2010-051460 filed Mar. 9, 2010, the entire disclosure of which is expressly incorporated by reference herein.
  • BACKGROUND
  • 1. Technical Field
  • The present invention relates to technologies for wirelessly transmitting data to a projector.
  • 2. Related Art
  • As a network configuration of a wireless network, there are infrastructure mode in which devices perform communication with each other via a base station and ad-hoc mode in which the devices perform communication directly with each other. Each device identifies a wireless network by using a service set identifier (SSID) and connects to a wireless network having a common SSID. In infrastructure mode, an SSID is usually set in advance by an administrator of the network, and an IP address is usually set automatically by the base station. Each device can perform communication by using the IP address and the SSID.
  • On the other hand, in ad-hoc mode, an administrator of the wireless network is not present. Therefore, in ad-hoc mode, one device (hereinafter referred to as a “master unit”) generates an independent basic service set (IBSS) network and an SSID for identifying an IBSS network, and sends a beacon signal including the SSID. Other devices (hereinafter referred to as “slave units”) can take part in a wireless network (an IBSS network) corresponding to the SSID by receiving the SSID and setting the SSID in a wireless adapter. Here, communication in which the other party is identified requires the IP address of the other party. In the past, the technologies for allowing a master unit to inform a slave unit of the IP address of the master unit by providing the SSID included in the beacon signal with the IP address have been known (see, for example, JP-A-2005-323117 and JP-A-2006-254301).
  • Incidentally, when the technologies which provide the SSID included in the beacon signal with an IP address are used, if the IP address of the master unit is changed, the master unit generates the SSID again and transmits the SSID. Here, since it takes time to perform scanning via a wireless network, a slave unit sometimes accumulates the acquired SS ID information for a predetermined period. In such a case, the slave unit has a plurality of SSIDs, that is, an SSID acquired before address change and an SSID acquired after address change. In this case, even though the wireless networks are generated by the same master unit, the slave unit cannot determine which of the wireless networks corresponding to the SSIDs is a wireless network to which the slave unit makes connection.
  • SUMMARY
  • An advantage of some aspects of the invention is to solve at least part of the problems described above and improve the convenience of wireless communication in ad-hoc mode. The invention can be realized as forms or application examples described below.
  • Application Example 1
  • According to this application example, there is provided a wireless communication system which performs communication between first and second terminals in ad-hoc mode, wherein the first terminal includes an identification information storing section storing identification information of the first terminal, an IP address storing section storing an IP address of the first terminal, a service set identifier generating section generating a service set identifier by using priority information indicating priority of wireless connection, the identification information, and the IP address, a priority information updating section updating the priority information every time the service set identifier is generated, and a beacon signal generating section generating a beacon signal including the service set identifier, and the second terminal includes a service set identifier acquiring section acquiring the service set identifier from the beacon signal, memory storing the service set identifier as a candidate for selection, a service set identifier selecting section selecting, when a plurality of service set identifier candidates having the same identification information are stored in the memory, one service set identifier from the plurality of candidates based on the priority information, an IP address acquiring section acquiring the IP address of the first terminal from the selected service set identifier, and a communicating section making a connection to the first terminal by using the acquired IP address.
  • According to this application example, even when the IP address of the first terminal is changed and the SSID is changed, the second terminal can select one service set identifier based on the updated priority information. This makes it possible to improve the convenience of wireless communication in ad-hoc mode.
  • Application Example 2
  • In the wireless communication system, a firewall is set in the second terminal, and the communicating section establishes wireless communication between the first and second terminals by transmitting a unicast packet including the IP addresses of the first and second terminals to the first terminal and receiving a response to the unicast packet from the first terminal.
  • According to this application example, even when a firewall is set in the second terminal, a response from the first terminal is not rejected.
  • Application Example 3
  • In the wireless communication system, the service set identifier includes check information for checking correctness of the service set identifier.
  • According to this application example, it is possible to find out an SSID faked by the third party.
  • Application Example 4
  • In the wireless communication system, the first and second terminals each store an address series table for establishing correspondence between IP address related information and the IP address.
  • According to this application example, the SSID does not include the IP address itself. Therefore, the third party cannot acquire the IP address of the first terminal even when the third party receives the SSID sent from the first terminal.
  • Application Example 5
  • According to this application example, there is provided a wireless communication device performing communication in ad-hoc mode, including: an identification information storing section storing identification information; an IP address storing section storing an IP address; a service set identifier generating section generating a service set identifier by using priority information indicating priority of wireless connection, the identification information, and the IP address; a priority information updating section updating the priority information every time the service set identifier is generated; and a beacon signal generating section generating a beacon signal including the service set identifier.
  • According to this application example, even when the IP address of the wireless communication device is changed and the SSID is changed, it is possible to select one service set identifier based on the priority information. This makes it possible to improve the convenience of wireless communication in ad-hoc mode.
  • Application Example 6
  • According to this application example, there is provided a projector projecting an image corresponding to data received from an information terminal, including: the wireless communication device described in the application example described above, the wireless communication device for receiving the data; a CPU converting the received data into projection data; and an image projection mechanism projecting an image based on the projection data.
  • According to this application example, even when the IP address of the projector is changed and the SSID is changed, it is possible to make a connection to an information terminal which supplies data to the projector with reliability and project an image corresponding to the supplied data.
  • Application Example 7
  • According to this application example, there is provided a wireless communication method for performing communication between first and second terminals in ad-hoc mode, including: sending a beacon signal including a service set identifier including IP address related information related to an IP address of the first terminal, priority information indicating priority of wireless connection, and identification information of the first terminal; acquiring the service set identifier from the beacon signal and storing the service set identifier in memory of the second terminal as a candidate for selection; when a plurality of service set identifier candidates having the same identification information are stored in the memory, selecting one service set identifier from the plurality of candidates based on the priority information; acquiring the IP address of the first terminal from the IP address related information of the selected service set identifier; and making a connection to the first terminal by using the acquired IP address.
  • According to this application example, even when the IP address of the first terminal is changed and the SSID is changed, the second terminal can select one service set identifier based on the priority information. This makes it possible to improve the convenience of wireless communication in ad-hoc mode.
  • Application Example 8
  • In the wireless communication method, the second terminal sets a firewall, transmits a unicast packet including the IP addresses of the first and second terminals to the first terminal, and establishes wireless communication between the first and second terminals by receiving a response to the unicast packet from the first terminal.
  • According to this application example, even when a firewall is set in the second terminal, a response from the first terminal is not rejected.
  • Application Example 9
  • In the wireless communication method, the service set identifier includes check information for checking correctness of the service set identifier.
  • According to this application example, it is possible to find out an SSID faked by the third party.
  • Application Example 10
  • In the wireless communication method, the first and second terminals establish correspondence between the IP address related information and the IP address.
  • According to this application example, the SSID does not include the IP address itself. Therefore, the third party cannot acquire the IP address of the first terminal even when the third party receives the SSID sent from the first terminal. The invention can be realized in various forms such as a network communication method in ad-hoc mode in addition to a wireless communication system.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The invention will be described with reference to the accompanying drawings, wherein like numbers reference like elements.
  • FIG. 1 is an explanatory diagram showing a wireless communication system according to a first embodiment.
  • FIGS. 2A and 2B are explanatory diagrams showing the structure of an SSID which is generated by a projector.
  • FIG. 3 is an operation flowchart of a personal computer.
  • FIGS. 4A and 4B are explanatory diagrams showing an SSID in a second embodiment.
  • FIGS. 5A and 5B are explanatory diagrams showing an SSID in a third embodiment.
  • FIG. 6 is an operation flowchart of a personal computer in the third embodiment.
  • FIGS. 7A to 7D are explanatory diagrams showing an SSID in a fourth embodiment.
  • DESCRIPTION OF EXEMPLARY EMBODIMENTS First Embodiment
  • FIG. 1 is an explanatory diagram showing a wireless communication system according to a first embodiment. The wireless communication system includes a personal computer 10 and a projector 20. The personal computer 10 includes a CPU 100, RAM 110, ROM 120, a hard disk 122, a wireless adapter 130, and an antenna 150. The wireless adapter 130 includes a service set identifier (SSID) storage region 140. The wireless adapter 130 corresponds to a “communicating section” in the claims, and the service set identifier storage region 140 corresponds to “memory storing a service set identifier as a candidate for selection” in the claims.
  • The hard disk 122 includes an IP address storing section 123, an identification information storing section 124, an SSID acquisition program product 125, an SSID selection program product 126, and an IP address acquisition program product 127.
  • Here, the IP address which is stored in the IP address storing section 123 is the IP address of the personal computer 10. The identification information which is stored in the identification information storing section 124 is the identification information of the personal computer 10. The SSID acquisition program product 125 acquires an SSID from a beacon signal received from the projector 20, the SSID used when communication with the projector 20 is performed. When there are a plurality of acquired SSIDs, the SSID selection program product 126 selects one SSID from the plurality of SSIDs. The IP address acquisition program product 127 acquires an IP address of the projector 20 from the acquired SSID of the projector 20. The SSID acquisition program product 125 corresponds to a “service set identifier acquiring section” in the claims, the SSID selection program product 126 corresponds to a “service set identifier selecting section” in the claims, and the IP address acquisition program product 127 corresponds to an “IP address acquiring section” in the claims.
  • The projector 20 includes a CPU 200, RAM 210, ROM 220, flash memory 222, a wireless adapter 230, an antenna 250, a Video RAM 26, and an image projection mechanism 270. The wireless adapter 230 includes a service set identifier (SSID) storage region 240.
  • The flash memory 222 includes an IP address storing section 223, an identification information storing section 224, an SSID generation program product 225, a priority information update program product 226, and a beacon signal generation program product 227. Here, the IP address which is stored in the IP address storing section 223 is the IP address of the projector 20. The identification information which is stored in the identification information storing section 224 is the identification information of the projector 20. By using the IP address stored in the IP address storing section 223 and the identification information stored in the identification information storing section 224, the SSID generation program product 225 generates an SSID which is used when communication with the computer 10 is performed. The priority information update program product 226 updates the priority information every time the SSID generation program product 225 generates an SSID. The beacon signal generating section 227 generates a beacon signal including an SSID. The SSID generation program product 225 corresponds to a “service set identifier generating section” in the claims, the priority information update program product 226 corresponds to a “priority information updating section” in the claims, and the beacon signal generating section 227 corresponds to a “beacon signal generating section” in the claims.
  • The projector 20 projects the data received from the personal computer 10 onto a screen (not shown). This is performed in the manner described below. First, the CPU 100 of the personal computer 10 generates data to be projected by the projector 20. Then, the CPU 100 transmits the data to the projector 20 by using the wireless adapter 130 and the antenna 150. Here, the wireless adapter 130 of the personal computer 10 and the wireless adapter 230 of the projector 20 form a wireless LAN specified by IEEE 802.11, for example. The CPU 200 of the projector 20 receives the data by using the antenna 250 and the wireless adapter 230. The CPU 200 converts the received data into projection data, and writes the projection data into the Video RAM 260. The image projection mechanism 270 reads the data in the Video RAM 260, and projects the data onto the screen (not shown). Incidentally, the structure of the image projection mechanism 270 is a structure usually used in the projectors, and therefore the descriptions thereof are omitted.
  • In this embodiment, the personal computer 10 and the projector 20 perform communication directly with each other without using abase station, in other words, perform communication in ad-hoc mode. In ad-hoc mode, either the personal computer 10 or the projector 20 has to generate an independent basic service set (IBSS) network and an SSID corresponding to the IBSS network. In this embodiment, the projector 20 generates an IBSS network and an SSID corresponding to the IBSS. The SSID is used to identify the IBSS network. The IBSS network is an independent network which is identified by the SSID, and any device can take part in the IBSS network by matching the SSID with that of the IBSS network.
  • FIGS. 2A and 2B are explanatory diagrams showing the structure of an SSID which is generated by a projector. In this embodiment, in the generation of an SSID, the CPU 200 of the projector 20 generates identification information for identifying the projector 20 and an SSID including the IP address of the projector 20. The SSID is formed of up to 32 characters, and the IP address can be represented by 8 characters in the case of IPV4. Therefore, the CPU 200 can assign up to 24 characters to the identification information of the device. Hereinafter, descriptions will be given on the assumption that an SSID is formed of 32 characters. In this embodiment, a region in which the identification information of the device is stored is referred to as a device name field, and a region in which the IP address is stored is referred to as an address information field. In this embodiment, the CPU 200 (FIG. 1) assigns the first 24 characters of 32 characters of an SSID to the device name field, and assigns the remaining characters to the address information field. In this embodiment, the identification information of the device is “MyProjector”, and the IP address is “192.168.0.192”. The CPU 200 assigns “MyProjector” to the device name field from the beginning thereof in this order, and leaves the remaining space blank. Incidentally, the CPU 200 may assign NULL to the remaining space instead of leaving the space blank. The CPU 200 assigns “C0A800C0” which is the IP address “192.168.0.192” given in hexadecimal to the address information field (the remaining 8-character field). The CPU 200 stores the generated SSID in the SSID storage region 240 (FIG. 1), and intermittently sends a beacon signal including the SSID at predetermined intervals.
  • FIG. 3 is an operation flowchart of the personal computer. In step S300, the CPU 100 (FIG. 1) of the personal computer 10 searches for neighboring wireless networks. Specifically, the CPU 100 determines whether or not a beacon signal is sent from the projector 20 (FIG. 1). If the beacon signal is sent, the CPU 100 receives the beacon signal and acquires an SSID from the beacon signal. In this embodiment, the SSID has values shown in FIGS. 2A and 2B.
  • In step S310, the CPU 100 determines whether or not the SSID includes an IP address. The maximum value of the IP address is “255.255.255.255”. Therefore, when the IP address is given in hexadecimal, the characters used therein are 0 to 9 and A to F. Thus, when the lower 8 characters of the SSID are only these characters (any of 0 to 9 or A to F), the CPU 100 can determine that these 8 characters represent the IP address. If the SSID includes the IP address, the CPU 100 stores the received SSID in the own SSID storage region 140, and proceeds to step S340. If the SSID does not include the IP address, the CPU 100 goes back to step S300, and continuously searches for networks.
  • In step S340, the CPU 100 connects to the network (IBSS network) identified by the SSID. Incidentally, at this stage, the personal computer 10 can merely take part in the IBSS network. The personal computer 10 needs the IP address of the projector 20 to perform communication directly with the projector 20. In step S350, the CPU 100 acquires the IP address from the SSID. The CPU 100 extracts 8 characters in the address information field. Since the 8 characters are formed of any of 0 to 9 or A to F as described above, the CPU 100 can determine that they are an 8-digit hexadecimal number. The CPU 100 generates a 32-bit IP address from the 8-digit hexadecimal number.
  • In step S360, the CPU 100 of the personal computer 10 transmits a unicast packet to the IP address acquired in step S350, and issues a connection request. To perform mutual communication between the personal computer 10 and the projector 20, the personal computer 10 and the projector 20 have to perform communication by identifying the IP address of the other party. The CPU 100 of the personal computer 10 knows the IP address of the projector 20, but the CPU 200 of the projector 20 does not know the IP address of the personal computer 10. By transmitting the unicast packet as described above, the CPU 100 can inform the CPU 200 of the projector 20 of the IP address of the personal computer 10. Here, unicast means specifying a single IP address and transmitting data.
  • Incidentally, when the CPU 100 of the personal computer 10 sends a broadcast packet, the following problem arises. Here, sending a broadcast packet means sending data to all the devices connected to the network. The CPU 100 usually specifies a unique address (a broadcast address) indicating the entire network and sends a packet. The projector 20 which has received the broadcast packet returns a response packet to the personal computer by unicast. Here, when the personal computer 10 is placed in a firewall, the firewall may reject the response packet to the broadcast packet. Therefore, it is preferable that the CPU 100 send a unicast packet as described above. If the CPU 100 receives a valid response packet in step 5370, the CPU 100 proceeds to step S380, and performs data communication with the CPU 200 of the projector 20. When the CPU 100 sends all the data to the projector 20, the CPU 100 ends the communication in step S390. If the CPU 100 does not receive a valid response packet in step S370, the CPU 100 goes back to step S300, and searches for other networks.
  • As described above, according to this embodiment, the CPU 200 of the projector 20 provides an SSID generated thereby with an IP address. The CPU 100 of the personal computer 10 acquires the IP address of the projector 20 from the received SSID, and transmits data to the IP address. Therefore, in ad-hoc mode, it is possible to perform communication between the personal computer 10 and the projector 20.
  • Moreover, in this embodiment, the CPU 100 of the personal computer 10 which has received the SSID specifies the IP address of the projector 20 and sends a unicast packet. Therefore, even when the personal computer 10 is placed in the firewall, a response packet from the projector 20 is not rejected by the firewall.
  • Second Embodiment
  • FIGS. 4A and 4B are explanatory diagrams showing an SSID in a second embodiment. In the second embodiment, an SSID is not provided with an IP address itself of the projector 20, but with an item number of an address series corresponding to the IP address. FIG. 4A shows the structure of an SSID in the second embodiment. In this embodiment, 30 characters are assigned to a device name field, and 2 characters are assigned to an address series field. FIG. 4B is a table of correspondence between the item number of the address series and the IP address. The item number and the IP address have one-to-one correspondence. For example, when the item number is “01”, a corresponding IP address is “192.168.0.1”. The correspondence table is stored in both the personal computer 10 and the projector 20.
  • Since an operation flowchart of this embodiment is almost the same as the operation flowchart of the first embodiment, only a difference will be described. In step S350, the CPU 100 acquires the IP address of the projector. Here, in the second embodiment, unlike the first embodiment, the SSID does not include the IP address itself. In step S350, the CPU 100 first acquires the item number of the address series. The CPU 100 then acquires a corresponding IP address by using the table of correspondence between the item number of the address series and the IP address and using the item number of the address series as a key.
  • According to the second embodiment, the SSID does not include the IP address itself. Therefore, the third party cannot acquire the IP address of the projector 20 even when the third party receives the SSID sent from the projector 20. As a result, it is possible to prevent unauthorized access to and attack on the projector 20. Incidentally, the IP address of the first embodiment and the item number of the address series of the second embodiment are collectively referred to as “IP address related information”. The IP address related information includes both the IP address itself and information corresponding to the IP address. Incidentally, in this embodiment, 2 characters are assigned to the address series field; however, any number of characters can be selected as the number of characters assigned to the address series field as long as the total number of characters of an SSID is 32 characters or less.
  • Third Embodiment
  • FIGS. 5A and 5B are explanatory diagrams showing an SSID in a third embodiment. FIG. 5A shows the structure of an SSID in the third embodiment. The SSID of the third embodiment differs from the SSID of the first embodiment in that it is provided with a priority field for 2 characters. A two-digit number is assigned to the priority field. The CPU 200 of the projector 20 increments the value of the priority field by 1 every time the IP address is changed. When the IP address is changed when the value of the priority field is 99, the CPU 200 restores the value of the priority field to 0 (00). The value of the priority field is restored to zero when the IP address is changed when the value of the priority field is a predetermined value.
  • FIG. 6 is an operation flowchart of the personal computer in the third embodiment. The same steps in the operation of the personal computer in the third embodiment as those in the operation in the first embodiment are identified with the same step numbers, and the descriptions thereof will be omitted. In the third embodiment, steps S620 and S630 are performed between steps S310 and S340 of the first embodiment. In step S620, the CPU 100 determines whether or not the SSIDs stored in the SSID storage region 140 include a plurality of SSIDs having the same identification information in the device name fields of the SSIDs. If there is only one SSID, the CPU 100 selects the SSID and proceeds to step S340. If there are a plurality of such SSIDs, the CPU 100 proceeds to step S630 and determines which SSID is used.
  • In step S630, the CPU 100 determines which SSID to select. FIG. 5B is a comparison table for determining which SSID has higher priority. An SSID having a greater priority information value has higher priority. As described above, since the priority information is restored to zero when the IP address is changed when the value of the priority field is a predetermined value, the CPU 100 determines the SSID to which higher priority is given by considering the above fact. Assume that the value in the priority field of one SSID stored in the SSID storage region 140 is X and the value in the priority field of the other SSID is Y. The CPU 100 obtains the value of X-Y and the value of |X−Y|. Then, the CPU 100 determines whether the value of X−Y is more than 0, less than 0, or equal to 0. Next, the CPU 100 determines whether the value of |X−Y| is equal to or less than 50 or more than 50. For example, when X=25 and Y=60, X−Y=25−60<0 and |X−Y|=|25−60|≦50. Therefore, the CPU 100 determines that Y has higher priority. In this case, the CPU 100 selects an SSID having Y as a value in the priority field. Moreover, for example, when X=10 and Y=90, X−Y=10−90<0 and |X−Y|=110−90|>50. Therefore, the CPU 100 determines that X has higher priority. In this case, the CPU 100 selects an SSID having X as a value in the priority field. Incidentally, when X−Y=0 (X=Y), the two SSIDs are the same, and therefore X and Y have the same priority. The CPU 100 selects the SSIDs. It is to be noted that, in this case, since the value of X|Y is 0, the value of |X−Y| does not become more than 50.
  • As described above, according to this embodiment, the CPU 100 selects an SSID based on the value in the priority field. Therefore, the CPU of the personal computer 10 sends a unicast packet to the IP address which is currently used by the projector, and does not send a unicast packet to the IP address which is not used by the projector 20. This makes it possible to improve the convenience of wireless communication in ad-hoc mode. In this embodiment, the number of characters in the priority field is two; however, any number of characters can be adopted.
  • Fourth Embodiment
  • FIGS. 7A to 7D are explanatory diagrams showing an SSID in a fourth embodiment. FIG. 7A shows the structure of an SSID. The fourth embodiment is obtained by adding a check information field to an SSID in the first embodiment. Incidentally, the number of characters in the device name field is reduced by the number of characters in the check information field.
  • FIG. 7B is obtained by adding check information to an SSID of the first embodiment. The check information is calculated by using CRC-8, for example. FIG. 7C shows an SSID which the third party who has seen the SSID of FIG. 7B sets in another device. The SSID of FIG. 7C and the SSID of FIG. 7B have the same values in the device name field, but they have one different value in the address information field, and the device in which the third party sets the SSID is a device different from the projector 20. Such a situation can occur when, for example, the third party tries to steal the information from the personal computer 10 by faking the SSID. However, since the SSID has a check information field, the CPU 100 of the personal computer 10 can easily determine whether or not the SSID is a faked SSID by comparing the check information calculated based on the values of the SSID and the values in the check information field of the SSID. As a result, the CPU 100 does not take part in the network with the faked SSID shown in FIG. 7C and does not transmit the data. Incidentally, FIG. 7D is obtained by providing a correct check information field to the SSID shown in FIG. 7C. As described above, according to the fourth embodiment, it is possible to find out the SSID faked by the third party. In this embodiment, CRC-8 is used for generating the check information; however, it is also possible to adopt other methods such as a checksum.
  • The technologies described in the above embodiments can be adopted independently. Therefore, arbitrary two or more technologies may be combined. For example, the address series of the second embodiment and the priority of the third embodiment may be combined. Moreover, in the embodiments described above, descriptions have been given by taking up a projector as an example; however, the projector may be replaced with a printer.
  • Although the invention has been described by way of embodiments, the embodiments described above are merely intended to make the invention more easily understandable, and are not meant to limit the scope of the invention in any way. It is to be understood that many modifications and variations are possible within the spirit of what is described herein and claimed in the appended claims, and the invention includes the equivalent thereof.

Claims (12)

What is claimed is:
1. A wireless communication system which performs communication between first and second terminals, wherein
the first terminal includes
an identification information storing section storing identification information of the first terminal,
an IP address storing section storing an IP address of the first terminal,
a service set identifier generating section generating a service set identifier by using priority information indicating priority of wireless connection, the identification information, and the IP address,
a priority information updating section updating the priority information responsive to the service set identifier generating section generating a new service set identifier; and
a beacon signal generating section generating a beacon signal including the service set identifier, and
the second terminal includes
a service set identifier acquiring section acquiring the service set identifier from the beacon signal,
memory storing the service set identifier as a candidate for selection,
a service set identifier selecting section selecting, when a plurality of service set identifier candidates having the same identification information are stored in the memory, one service set identifier from the plurality of candidates based on a the priority information,
an IP address acquiring section acquiring the IP address of the first terminal from the selected service set identifier, and
a communicating section making a connection to the first terminal by using the acquired IP address.
2. The wireless communication system according to claim 1, wherein
a firewall is set in the second terminal, and
the communicating section establishes wireless communication between the first and second terminals by transmitting a unicast packet including the IP addresses of the first and second terminals to the first terminal and receiving a response to the unicast packet from the first terminal.
3. The wireless communication system according to claim 1, wherein
the service set identifier includes check information for checking correctness of the service set identifier.
4. The wireless communication system according to claim 1, wherein
the first and second terminals each store an address series table for establishing correspondence between IP address related information and the IP address.
5. A wireless communication device performing communication between first and second terminals, comprising:
an identification information storing section storing identification information of the first terminal;
an IP address storing section storing an IP address of the first terminal;
a service set identifier generating section generating a service set identifier by using priority information indicating priority of wireless connection, the identification information, and the IP address;
a priority information updating section updating the priority information responsive to the service set identifier generating section generating a new service set identifier; and
a beacon signal generating section generating a beacon signal including the service set identifier.
6. A projector projecting an image corresponding to received data, comprising:
the wireless communication device according to claim 5, the wireless communication device for receiving the data;
a CPU converting the received data into projection data; and
an image projection mechanism projecting an image based on the projection data.
7. A wireless communication method for performing communication between first and second terminals, comprising:
sending a beacon signal including a service set identifier including IP address related information related to an IP address of the first terminal, priority information indicating priority of wireless connection, and identification information of the first terminal;
updating the priority information responsive to a new service set identifier being generated;
acquiring the service set identifier from the beacon signal and storing the service set identifier in memory of the second terminal as a candidate for selection;
when a plurality of service set identifier candidates having the same identification information are stored in the memory,
selecting one service set identifier from the plurality of candidates based on the priority information;
acquiring the IP address of the first terminal from the IP address related information of the selected service set identifier; and
making a connection to the first terminal by using the acquired IP address.
8. The wireless communication method according to claim 7, wherein
the second terminal
sets a firewall,
transmits a unicast packet including the IP addresses of the first and second terminals to the first terminal, and
establishes wireless communication between the first and second terminals by receiving a response to the unicast packet from the first terminal.
9. The wireless communication method according to claim 7, wherein
the service set identifier includes check information for checking correctness of the service set identifier.
10. The wireless communication method according to claim 7, wherein
the first and second terminals establish correspondence between the IP address related information and the IP address.
11. The wireless communication system according to claim 1, wherein the priority information updating section sets the priority information to zero when the IP address is changed and the priority field has acquired a predetermined value.
12. The wireless communication system according to claim 1, wherein the priority is calculated as being an absolute value of a difference between a first SSID priority value and a second SSID priority value.
US14/589,346 2010-03-09 2015-01-05 Wireless communication system, wireless communication device, projector, and wireless communication method Abandoned US20150110100A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US14/589,346 US20150110100A1 (en) 2010-03-09 2015-01-05 Wireless communication system, wireless communication device, projector, and wireless communication method

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
JP2010-051460 2010-03-09
JP2010051460A JP5293649B2 (en) 2010-03-09 2010-03-09 Wireless communication system, wireless communication terminal, and wireless communication method
US13/022,041 US8958402B2 (en) 2010-03-09 2011-02-07 Wireless communication system, wireless communication device, projector, and wireless communication method
US14/589,346 US20150110100A1 (en) 2010-03-09 2015-01-05 Wireless communication system, wireless communication device, projector, and wireless communication method

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US13/022,041 Continuation US8958402B2 (en) 2010-03-09 2011-02-07 Wireless communication system, wireless communication device, projector, and wireless communication method

Publications (1)

Publication Number Publication Date
US20150110100A1 true US20150110100A1 (en) 2015-04-23

Family

ID=44559916

Family Applications (2)

Application Number Title Priority Date Filing Date
US13/022,041 Active 2033-12-17 US8958402B2 (en) 2010-03-09 2011-02-07 Wireless communication system, wireless communication device, projector, and wireless communication method
US14/589,346 Abandoned US20150110100A1 (en) 2010-03-09 2015-01-05 Wireless communication system, wireless communication device, projector, and wireless communication method

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US13/022,041 Active 2033-12-17 US8958402B2 (en) 2010-03-09 2011-02-07 Wireless communication system, wireless communication device, projector, and wireless communication method

Country Status (2)

Country Link
US (2) US8958402B2 (en)
JP (1) JP5293649B2 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107592679A (en) * 2016-07-06 2018-01-16 精工爱普生株式会社 Wireless communication system and radio communication device
US10372386B2 (en) 2015-04-10 2019-08-06 Canon Kabushiki Kaisha Communication apparatus, method of controlling the same, and storage medium
US11468392B2 (en) * 2017-04-05 2022-10-11 Icontrol, Inc. Methods, systems, and communication protocols for proximity monitoring mobile network and associated methods

Families Citing this family (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8830872B2 (en) * 2011-04-08 2014-09-09 Texas Instruments Incorporated Network configuration for devices with constrained resources
EP2708053A4 (en) * 2011-05-13 2014-11-19 Blackberry Ltd Automatic access to network nodes
KR101797039B1 (en) * 2011-08-31 2017-11-13 삼성전자주식회사 Method for wireless connecting among at least two devices and device capable wireless connection using it
KR101915314B1 (en) 2011-10-25 2018-11-07 삼성전자주식회사 Method and apparatus for wi-fi connecting using wi-fi protected setup in a portable terminal
US9814085B2 (en) * 2011-10-28 2017-11-07 Qualcomm, Incorporated Systems and methods for fast initial network link setup
JP2013222991A (en) 2012-04-12 2013-10-28 Ricoh Co Ltd Radio communication system, radio communication method, and radio terminal device
JP6241033B2 (en) * 2012-12-27 2017-12-06 株式会社リコー Information input device, information output device, information processing system, and program
JP6263962B2 (en) * 2013-03-05 2018-01-24 株式会社リコー COMMUNICATION DEVICE, COMMUNICATION METHOD, AND PROGRAM
US9728227B2 (en) * 2013-07-24 2017-08-08 Ricoh Company, Ltd. Display system, information terminal, display device, and recording medium
JP5660242B1 (en) 2013-09-06 2015-01-28 株式会社リコー Communication system, communication control system, communication apparatus, communication method, and connection program
JP5660241B1 (en) 2013-09-10 2015-01-28 株式会社リコー Communication system, communication control system, communication apparatus, communication method, and connection program
US9608859B2 (en) * 2013-10-25 2017-03-28 Aruba Networks, Inc. System, apparatus and method for reducing failover time through redundancy using virtual access points
CN104243881B (en) * 2014-09-08 2017-09-12 北京奇正悦扬科技有限公司 The method for controlling projection and system of a kind of projecting apparatus
US11696216B2 (en) 2016-02-18 2023-07-04 Comcast Cable Communications, Llc SSID broadcast management to support priority of broadcast
CN106792679A (en) * 2016-11-25 2017-05-31 迈普通信技术股份有限公司 A kind of wireless communications method and system
WO2018220817A1 (en) 2017-06-02 2018-12-06 Necディスプレイソリューションズ株式会社 Electronic device, wireless lan terminal and wireless lan system
JP6984213B2 (en) * 2017-07-31 2021-12-17 セイコーエプソン株式会社 Terminal devices, processing systems, programs, and control methods for terminal devices
JP6547820B2 (en) * 2017-12-14 2019-07-24 ブラザー工業株式会社 Communication device
WO2020028767A1 (en) 2018-08-03 2020-02-06 Netapp, Inc. Assignment of network configuration for a wired network using a wireless network
KR101982199B1 (en) * 2018-10-30 2019-05-24 삼성전자주식회사 Method and apparatus for wi-fi connecting using wi-fi protected setup in a portable terminal
KR102045944B1 (en) * 2019-05-20 2019-11-18 삼성전자주식회사 Method and apparatus for wi-fi connecting using wi-fi protected setup in a portable terminal
KR102181159B1 (en) * 2019-11-12 2020-11-20 삼성전자주식회사 Method and apparatus for wi-fi connecting using wi-fi protected setup in a portable terminal

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030026211A1 (en) * 1999-12-31 2003-02-06 Lin Xu Packet routing in a multi-bearer-type network
US20040179488A1 (en) * 2003-03-13 2004-09-16 Samsung Electronics Co., Ltd. Resynchronization method in wireless ad-hoc network environments
US20050036509A1 (en) * 2003-06-03 2005-02-17 Shrikant Acharya Wireless presentation system
US20060014537A1 (en) * 2004-06-22 2006-01-19 Takashi Arai Wireless LAN communication system, wireless LAN connection method, and wireless LAN terminal apparatus
US20060023693A1 (en) * 2003-01-21 2006-02-02 Lenovo ( Singapore) Pte. Ltd. Information processing apparatus, communication control method, and communication control program
US20060221858A1 (en) * 2005-04-01 2006-10-05 Microsoft Corporation User experience for collaborative ad-hoc networks
US20060221901A1 (en) * 2005-04-01 2006-10-05 Toshiba America Research, Inc. Autonomous and heterogeneous network discovery and reuse
US20070171910A1 (en) * 2005-10-05 2007-07-26 Ravi Kumar Peer-to-peer communication in ad hoc wireless network
US20100111057A1 (en) * 2007-03-15 2010-05-06 Panasonic Corporation Wireless communication device and access point connection method
US7720021B1 (en) * 2006-03-30 2010-05-18 Sprint Spectrum L.P. Method and system for setting up a call to a mobile station via another mobile station
US8391260B1 (en) * 2009-06-22 2013-03-05 Marvell International Ltd Power management systems and methods for peer-to-peer network devices

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100893070B1 (en) * 2002-09-19 2009-04-17 엘지전자 주식회사 Method and apparatus for providing and receiving multicast service in a radio communication system
US7350077B2 (en) * 2002-11-26 2008-03-25 Cisco Technology, Inc. 802.11 using a compressed reassociation exchange to facilitate fast handoff
US7603710B2 (en) * 2003-04-03 2009-10-13 Network Security Technologies, Inc. Method and system for detecting characteristics of a wireless network
US7668126B2 (en) * 2004-02-05 2010-02-23 Texas Instruments Incorporated Beacon coordination and medium access
JP4607477B2 (en) 2004-03-12 2011-01-05 日本碍子株式会社 Film pasting machine
US7768943B1 (en) * 2004-03-25 2010-08-03 Verizon Corporate Services Group Inc. No-sight routing for ad-hoc networks
JP3698711B1 (en) 2004-05-07 2005-09-21 株式会社ソニー・コンピュータエンタテインメント Network identifier setting method, communication method, and wireless communication terminal device
US7676226B2 (en) * 2004-05-17 2010-03-09 Samsung Electronics Co., Ltd. Fast handover method optimized for IEEE 802.11 networks
EP1615380A1 (en) * 2004-07-07 2006-01-11 Thomson Multimedia Broadband Belgium Device and process for wireless local area network association
JP2006254301A (en) * 2005-03-14 2006-09-21 Fuji Xerox Co Ltd Ip address setting system
US7717342B2 (en) * 2005-08-26 2010-05-18 Hand Held Products, Inc. Data collection device having dynamic access to multiple wireless networks
EP1804424A1 (en) * 2005-12-27 2007-07-04 THOMSON Licensing Method for dynamically selecting a channel in a wireless local area network
JP4840230B2 (en) 2007-03-30 2011-12-21 ブラザー工業株式会社 Wireless network system and wireless device for configuring the same
US8358638B2 (en) * 2007-05-24 2013-01-22 Wefi, Inc. Dynamically created and expanded wireless network
JP4425298B2 (en) * 2007-08-01 2010-03-03 富士通株式会社 Packet routing control method, packet routing control program, terminal device, and VPN server
US20090073943A1 (en) * 2007-08-17 2009-03-19 Qualcomm Incorporated Heterogeneous wireless ad hoc network
US9084231B2 (en) * 2008-03-13 2015-07-14 Qualcomm Incorporated Methods and apparatus for acquiring and using multiple connection identifiers

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030026211A1 (en) * 1999-12-31 2003-02-06 Lin Xu Packet routing in a multi-bearer-type network
US20060023693A1 (en) * 2003-01-21 2006-02-02 Lenovo ( Singapore) Pte. Ltd. Information processing apparatus, communication control method, and communication control program
US20040179488A1 (en) * 2003-03-13 2004-09-16 Samsung Electronics Co., Ltd. Resynchronization method in wireless ad-hoc network environments
US20050036509A1 (en) * 2003-06-03 2005-02-17 Shrikant Acharya Wireless presentation system
US20060014537A1 (en) * 2004-06-22 2006-01-19 Takashi Arai Wireless LAN communication system, wireless LAN connection method, and wireless LAN terminal apparatus
US20060221858A1 (en) * 2005-04-01 2006-10-05 Microsoft Corporation User experience for collaborative ad-hoc networks
US20060221901A1 (en) * 2005-04-01 2006-10-05 Toshiba America Research, Inc. Autonomous and heterogeneous network discovery and reuse
US20070171910A1 (en) * 2005-10-05 2007-07-26 Ravi Kumar Peer-to-peer communication in ad hoc wireless network
US7720021B1 (en) * 2006-03-30 2010-05-18 Sprint Spectrum L.P. Method and system for setting up a call to a mobile station via another mobile station
US20100111057A1 (en) * 2007-03-15 2010-05-06 Panasonic Corporation Wireless communication device and access point connection method
US8391260B1 (en) * 2009-06-22 2013-03-05 Marvell International Ltd Power management systems and methods for peer-to-peer network devices

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10372386B2 (en) 2015-04-10 2019-08-06 Canon Kabushiki Kaisha Communication apparatus, method of controlling the same, and storage medium
US10552097B2 (en) 2015-04-10 2020-02-04 Canon Kabushiki Kaisha Communication apparatus, method of controlling the same, and storage medium
US10599368B2 (en) 2015-04-10 2020-03-24 Canon Kabushiki Kaisha Communication apparatus, method of controlling the same, and storage medium
US10901662B2 (en) 2015-04-10 2021-01-26 Canon Kabushiki Kaisha Communication apparatus, method of controlling the same, and storage medium
CN107592679A (en) * 2016-07-06 2018-01-16 精工爱普生株式会社 Wireless communication system and radio communication device
US11468392B2 (en) * 2017-04-05 2022-10-11 Icontrol, Inc. Methods, systems, and communication protocols for proximity monitoring mobile network and associated methods

Also Published As

Publication number Publication date
US8958402B2 (en) 2015-02-17
JP5293649B2 (en) 2013-09-18
CN102196418A (en) 2011-09-21
JP2011188238A (en) 2011-09-22
US20110222518A1 (en) 2011-09-15

Similar Documents

Publication Publication Date Title
US8958402B2 (en) Wireless communication system, wireless communication device, projector, and wireless communication method
US7313111B2 (en) Method and apparatus for indicating service set identifiers to probe for
US7440424B2 (en) Apparatus and method for detecting duplicate IP addresses in mobile ad hoc network environment
US9722979B2 (en) System and method for automatic wireless connection between a portable terminal and a digital device
US9301326B2 (en) Wireless communication system, wireless communication method, and wireless terminal
US9094897B2 (en) Communication apparatus and control method thereof
CN111432044B (en) Multi-link equipment MAC address management method and device and multi-link equipment
US20080276303A1 (en) Network Type Advertising
US9370031B2 (en) Wireless network setup and configuration distribution system
US20190104422A1 (en) System and Method for Easy Configuration and Authentication of Network Devices
TWI508609B (en) Network configuration method and wireless networking system
US20140334287A1 (en) Method and Apparatus for Handling Address Conflict
EP3032850A1 (en) Service discovery technique in wireless communication network for forming p2p group
US20140105094A1 (en) Method and system for secure advertisements and wireless discovery of virtual controller based access point clusters
CN104125568A (en) Wireless access point safe authentication method and system
US9113449B2 (en) Apparatus for managing network zone having plurality of wireless access points, method of connecting mobile terminal to wireless access point by the apparatus, and the mobile terminal
US20180063773A1 (en) System and method of anqp querying using a common anqp group version
JP4836537B2 (en) Radio base station apparatus and communication parameter setting method for radio base station apparatus
CN112636901B (en) Identity recognition method, device, storage medium and electronic equipment
EP1614317A2 (en) Discovering proximate apparatuses and services in a wireless network
CN113037704B (en) Detection device and detection method
CN102196418B (en) Wireless communication system, radio communication device, projector and wireless communications method
CN115604231A (en) Network address configuration method, routing device, node device and storage medium
CN115190275A (en) Network video recorder, video monitoring system and video monitoring method

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION