RussianPatents.com

Network detection in wireless communication systems

Network detection in wireless communication systems
IPC classes for russian patent Network detection in wireless communication systems (RU 2523968):
Another patents in same IPC classes:
Apparatus and method for controlling sleep cycle synchronisation of sleep mode in wireless communication system Apparatus and method for controlling sleep cycle synchronisation of sleep mode in wireless communication system / 2523955
Invention relates to synchronisation in sleep mode in a wireless communication system. A method of operating a mobile station in sleep mode state includes: if a traffic indication message and unicast data are not received during a listening window, transmitting one of a request message and a header to a base station to request a location of a next-scheduled listening window, and if a response for the one of the request message and the header is received, performing synchronisation for a next sleep cycle.
Method and apparatus for obtaining security key in relay system Method and apparatus for obtaining security key in relay system / 2523954
Invention relates to communication engineering. The method of obtaining a security key in a relay system, wherein a node in a relay system obtains an initial key, in accordance with the initial key, the node obtains a root key of the security key of the radio interface between the node and another node adjoining said node, and in accordance with the root key, the node obtains a security key of the radio interface between the node and said other adjoining node. Therefore, in accordance with the initial key, each lower-level node obtains a root key of the security key of the radio interface between each lower-level node, such that UE data on an interface link Un can be secured accordingly.
Handover method and apparatus in mobile communication system Handover method and apparatus in mobile communication system / 2523702
Method includes determining whether to handover user equipment (UE) using an X2 interface, transmitting a handover request message to a target base station (BS), the handover request message including closed subscriber group (CSG) information of the target BS, and receiving a handover request acknowledgement message from the target BS; determining whether to handover the UE using the X2 interface includes, if there is an X2 interface between the source BS and the target BS and if the target BS does not support a CSG or the target BS supports the same CSG supported by the source BS, determining that it is necessary to perform handover of the UE using the X2 interface, and obtaining the CSG information of the target BS through an X2 interface setup procedure.
Methods and devices facilitating synchronisation of security configurations Methods and devices facilitating synchronisation of security configurations / 2523695
Terminal sends a security mode complete message to the network entity, on the receipt of which the network entity updates new security parameters. The access terminal initiates a mobility procedure while the security mode procedure is on-going, aborts the security mode procedure and reverts back to the old security parameters. The access terminal sends a mobility update message to the network entity including a dedicated status indicator configured to inform the network entity that the access terminal has reverted back to the old security parameters. In response to the mobility update message, the network entity reverts back to the old security parameters.
Method and device in wireless network for determining uplink received power target value Method and device in wireless network for determining uplink received power target value / 2523688
Method and device in a wireless network, comprising a first node and an adjacent second node, for determining an uplink received power target value of the second node to be used by user equipment which is to be served by the second node, wherein the downlink power capacity of the first node exceeds the downlink power capacity of the second node. The method comprises establishing the uplink received power target value of the first node, obtaining the downlink power capacity of the first node, obtaining the downlink power capacity of the second node, calculating the difference in downlink power capacity between the first node and the second node, and determining the uplink received power target value of the second node, based on the calculated difference in downlink power capacity between the nodes and the established uplink received power target value of the first node.
Method and terminal for starting and stopping compressed mode Method and terminal for starting and stopping compressed mode / 2523665
Method of starting a compressed mode includes the following steps: a radio network controller (RNC) predetermines a threshold condition of starting a compressed mode and informs user equipment of the threshold condition; the threshold condition of starting the compressed mode is based on the transmission power of the user equipment; the user equipment detects whether itself meets the threshold condition of starting the compressed mode, and when the threshold condition of starting the compressed mode is met, Node B is informed; the user equipment and Node-B start the compressed mode.
Method and apparatus for power control in wireless communication system Method and apparatus for power control in wireless communication system / 2523440
Invention relates to wireless communication. A method and apparatus for power control in a wireless communication system are disclosed. The method includes assigning an uplink (UL) control channel to a MS from a base station, determining a location to receive a transmit power control (TPC) command based on the UL control channel, and receiving a TPC command in the determined location and increasing or decreasing transmit power, thereby enabling the reduction of overhead for power control command assignment information.
Handover method and system in relay network, relay node, control base station and base station Handover method and system in relay network, relay node, control base station and base station / 2523437
Invention relates to mobile communication. The method includes a relay node receiving a first area identifier which identifies the relay node; sending a system information broadcast message carrying the first area identifier to a terminal in a coverage area; receiving a handover request message forwarded by a control base station; and performing, according to the handover request message, a control operation of accessing the relay node on the terminal. The first area identifier which identifies the relay node is allocated to the relay node, so that the terminal in the relay network can be normally handed over from the base station to the relay node.
Scheduled and autonomous transmission and acknowledgement Scheduled and autonomous transmission and acknowledgement / 2523359
Invention relates to communication engineering. A subset of mobile stations may be allocated a portion of a shared resource with one or more individual access grants, another subset may be allocated a portion of the shared resource with a single common grant, and yet another subset may be allowed to use a portion of the shared resource without any grant. An acknowledgement and continue command is used to extend all or a subset of the previous grants without the need for additional requests and grants, and their associated overhead.
Mobile communication system, radio base station and mobile station Mobile communication system, radio base station and mobile station / 2523261
Invention relates to a mobile communication system. Disclosed is a mobile communication system comprising a mobile station UE which uses carrier combination performed to allow transmission of an uplink data signal to a radio base station eNB using a plurality of elementary carriers having different frequencies, including timer interval TA storage modules, configured to store a timer interval TA corresponding to said plurality of elementary carriers; and state control modules configured to control the state of said plurality of elementary carriers, wherein the state control modules are configured to set as an elementary carrier state, the reading of a timer TA which has run out, an asynchronous state.
Method and device for diverting transmission in multiple access wireless communication system Method and device for diverting transmission in multiple access wireless communication system / 2343646
Description is given of a method and device for switching wireless terminal channels. For this, several communication channels with different physical characteristics are supported in the cell of the base station. Each wireless terminal controls several channels and evaluates several channels at the same time, such that, there can be fast switching between channels. Information on the quality of the channel is sent from each wireless terminal to the base station. The wireless terminal or base station selects the channel, based on the evaluated quality of the channel. By supporting several channels and through periodical changes in channels in different implementation alternatives, the time taken before the wireless terminal finds good or suitable channel conditions is minimised, even if the wireless terminal changes position. Several antennae are used at the base station for simultaneous support of several channels, for example, through control of the directional pattern of the antennae.
Method of generating repeating audio signals for call return and device to this end Method of generating repeating audio signals for call return and device to this end / 2343647
During different set conditions providing source of sound for company service information as substitutive audio signal for call return, receiver can determine whether source of sound for service information for subscriber or set time interval is provided for. Present invention provides for a method and device for obtaining substitutive repeating audio signal for call return based on choice or successively in accordance with a preset condition.
Access channel with limited reception time Access channel with limited reception time / 2343648
Method consists of the following stages: reception of request for channel access from user terminal. Reception of the user terminal can be one of several active user terminals. The transmission cycle duration is determined as a result of reception of a request for channel access. The arrival time of data to the cycle is determined for the user terminal. The arrival time of data to the user terminal is set, so as to designate the channel for the user terminal, starting from the time of arrival of data.
System and method of band subchannel control with adaptive modulation and coding (amc) in communication system of multiple access with orthogonal-frequency division System and method of band subchannel control with adaptive modulation and coding (amc) in communication system of multiple access with orthogonal-frequency division / 2344548
Method for assignment of band channel with adaptive modulation and coding (AMC) to subscriber stations (SS) is realised in wireless communication system, which separates full range of frequencies into multiple subcarrier bands, every of which represents set from previously specified quantity of subranges, every of which represents set of previously specified quantity of adjacent subcarriers. Method comprises the following stages: necessity in use of band channel with AMC is detected; quality of reception is measured in frequency bands; list of frequency bands with high quality of reception is formed; request is sent for assignment of band channel with AMC as well as foresaid list to base station (BS); response is received to mentioned request from BS; in compliance with response, changeover is done in SS in condition of use of band channel with AMC.
Method and device of communication for transfer and reception of messages about services to service center or back Method and device of communication for transfer and reception of messages about services to service center or back / 2344568
Service center (SZ) for transmission of information content should not know or define number of person who initiates loading, and sole connection (TKV) of communication from communication device (TKG) to service center (SZ) does not require making another communication contact, at that information content is requested in the first communication session (SI1) with the first notice (SN1) about service from service center (SZ), and is delivered from service center (SZ) in the second communication session (SI2) with at least one notice (SN2) about service.
System of home register of location for servicing of user of several types of networks System of home register of location for servicing of user of several types of networks / 2344569
System comprises subsystem of all-channel signaling processing, data base subsystem, services processing subsystem and operational maintenance subsystem, at that all subsystems are connected to communication network and accordingly realise information exchange; at that all-channel signaling processing subsystem performs function of OKC-7 processing; data base subsystem is used for storage of user data; services processing subsystem comprises one or more modules for processing of home location register services; operational maintenance subsystem comprises operational maintenance server, services acceptance terminal and close-range terminal of operational maintenance.
Grouping of pilot-signals and control of sets in communication systems with multiple carriers Grouping of pilot-signals and control of sets in communication systems with multiple carriers / 2344570
In one version of realisation access network may assign group identifier (group ID) to every of pilot-signals associated with sector, for instance, on the basis of pilot-signals coverage areas, and transmit pilot-signals with appropriate group ID. PN shift may be used as group ID. Access terminal may group accepted pilot-signals in one or more pilot-signals group according to their group ID, and select representative pilot-signals from every group of pilot-signals for transmission of message about pilot-signal level. Access terminal may also use grouping of pilot-signals for efficient control of sets.
Method and device for switching between common and individual channels for provisioning of broadcasting content services transmission in wireless telephone network Method and device for switching between common and individual channels for provisioning of broadcasting content services transmission in wireless telephone network / 2344571
Wireless communication network comprises different base stations and subscriber stations. Every base station provides services of broadcasting content transfer to subscriber stations via communication channels of one of the following types: 1) common channel used by multiple subscriber stations, 2) individual channels, every of which is separated for use by separate subscriber station. In response to one or several preset changes of condition, i.e. change of number of subscriber stations that request the program, change of transmission power level used by base station, or in case of other change of network condition, communication channel type used for provisioning of broadcasting content to one or several subscriber stations is switched over.
Power control in external circuit for wireless communication systems Power control in external circuit for wireless communication systems / 2344572
One version of realisation comprises base station, which controls channel of speed indicator, decodes speed indicator channel with application of likelihood maximum decoder and determines availability of packet in speed indicator channel by comparison of probability to threshold, and analyses frame validity in packet-oriented channel on the basis of availability and content of packets accepted in speed indicator channel.
Method and device for provisioning of multimedia service of broadcasting/multicasting in system of mobile communication Method and device for provisioning of multimedia service of broadcasting/multicasting in system of mobile communication / 2344573
Method and device are provided for provisioning of one or more communication services of point-point set type, such as multimedia service of broadcasting/multicasting (MBMS), to one or more mobile terminals, or subscriber devices (AA). When one or more mobile terminals are moved to new zone of mobile communication system controlled by other network component, after connection to service, information is transmitted between network elements by method.

FIELD: radio engineering, communication.

SUBSTANCE: invention relates to wireless communication. The wireless communication method includes: identifying scanning capability for a communication device, wherein the scanning capability is based on a network beacon signal transmission interval; preparing a network information message and entering passive scanning mode during the lifecycle of the scanning capability, if the communication device decides to use the scanning capability; and initiating transmission of the network information message if a beacon message corresponding to another network is received by the communication device in passive scanning mode.

EFFECT: facilitating network detection.

14 cl, 11 dwg

 

1. The technical field

[0001] embodiments of the present invention relate to wireless communications and, in particular, to the detection devices outside the network.

2. Background of invention

[0002] Wireless communication has evolved from the use of verbal information as a transmission medium to full digital interaction. Advances in wireless technologies have significantly increased the capabilities, quality of service (QoS - quality of service, data rate, etc. that led to the desire to provide new opportunities for devices. In the mobile communication device is no longer designed for simple phone calls. They have become an integral, and in some cases essential devices for the management of professional and/or personal life users.

[0003] in order to support the desired development of electronic communication, more and more applications that do not support the communication function, preconstruct to support wired and/or wireless communication. Such support wireless communication may in some cases enable the transfer of controlled or observed data to other devices via a wireless connection. As examples of such scenarios can lead a normal control resources is s, biometric sensors, systems support financial transactions, personal communication and/or positioning, etc. Devices that support this activity and the appropriate Association, often operate under conditions of use of limited resources. For example, such devices can be simple (for example, may have limited resources for data processing), can be small (for example, can have spatial limitations due to limitations in size, caused by new applications), may have capacity limitations (for example, when powered by battery), etc.

[0004] the procedure of establishing and maintaining the connections defined in the existing communication protocols may not be suitable for devices with limited resources listed above. For example, the standards of existing wireless protocols may require the implementation of periodic interaction with the purpose of maintaining network devices synchronized with other devices. Such requirements may not take into account the load that has such periodic network connection on the limited resources of the device. As a result, such a limited resource devices may be problematic to carry out the work in accordance Satomi standards.

The INVENTION

[0005] embodiments of the present invention may be directed to a method, device, computer program and system for interoperability of devices with resource conservation devices. In accordance with at least one presented in the example implementation, the device can be synchronized with the network through the use of a beacon signal transmitted at certain intervals of time. Processes related to communication can be planned relative to the time in which it is expected the beacon signal and which is also known as the target transmission time of the beacon (target beacon transmission time - TBTT). While some network devices may have the opportunity to be active in each period TWT for other devices such practices may be too burdensome because of the involved resources. In this regard, can be implemented increased or "sparse" transmission period of a beacon that is equal to the multiple of the interval of signal transmission network beacon that can reduce the burden of communication on the device due to the decrease of the frequency. Similarly, the periods of scanning capabilities are periods of time during which the device can perform passive scanning, which is also can be initiated on the basis of the values multiples of the interval signal transmission network beacon, and may have a duration, expressed in multiples of the interval signal transmission network of the lighthouse.

[0006] In accordance with at least one embodiment of the present invention, the device may identify the scanner to choose: either to use this feature, scan, or participate in the transmission network beacon (for example, when the scanning occurs during TTT also associated with increased transmission period of the beacon). Illustrative scenarios in which the device chooses to use the scanning device before entering passive mode scan can prepare network information message. Such devices can remain in the passive scanning mode throughout the lifetime of the scanner, sending the response in cases when messages are received from devices outside the network. For example, devices can receive the beacon signals from other networks defined, for example, different set identifiers (SSID), which can initiate the transmission of the network information message. Before carrying out the transmission of network information message can be modified by VK is Uchenie them SSIDs, the corresponding received signals of the lighthouse.

[0007] the Network information message may contain information about the configuration of communication used by devices outside of the network to communicate with devices inside the network. For example, information about a transmission period of the beacon can be designed so that the devices outside of the network to synchronize time with this network. Information about the transmission period of the beacon may also include information about the increased transmission period of the beacon to the device, which is desirable/necessary to interact with the lower frequency.

[0008] the Configuration or implementation of various embodiments of the present invention, which have been briefly described above are given merely to explain and, therefore, are not limiting. In addition, the features of the invention associated with a specific embodiment of the present invention can be used in other embodiments depending, for example, is implemented as an implementation option.

BRIEF DESCRIPTION of DRAWINGS

[0009] the Invention will hereinafter become more clear from the description of illustrative options for its implementation in conjunction with the attached drawings, on which:

[0010] Figure 1 shows examples of hardware resources and software is a lot of support, which can be used in various embodiments of the present invention.

[0011] Figure 2 shows an example network environment in accordance with at least one embodiment of the present invention.

[0012] Figure 3 shows examples of different types of messaging that can be used in accordance with at least one embodiment of the present invention.

[0013] Figure 4 shows an example of message transmission between devices that may cause the formation of a distributed local network in accordance with at least one embodiment of the present invention.

[0014] Figure 5 shows example implementations of the lighthouse, which are used in accordance with at least one embodiment of the present invention.

[0015] Fig.6 shows an example of Windows activity in accordance with at least one embodiment of the present invention.

[0016] Fig.7 shows examples of strategies access control in accordance with at least one embodiment of the present invention.

[0017] Fig shows an example of initializing the scanner and process in accordance with at least one embodiment of the present invention.

[0018] Figure 9 shows examples used the opportunities I scan and possible rejection of the use according to at least one embodiment of the present invention.

[0019] Figure 10 shows a more detailed example of how to use the scanner in accordance with at least one embodiment of the present invention.

[0020] 11 shows a block diagram for an example process control communication in accordance with at least one embodiment of the present invention.

DESCRIPTION of EXAMPLES of IMPLEMENTATION

[0021] because the present invention is described here in terms of the many examples of implementation, based on them can be made various changes or modifications within the spirit of the present invention and without departing from its scope defined in the attached claims.

I. General system that can be implemented in embodiments of the present invention

[0022] an example of the system used as the basis for explanations of the various embodiments of the present invention, depicted in figure 1. Device and the configuration shown in figure 1, is presented only as an example and, thus, can be included or not in real options.

[0023] Computing device 100 may correspond to different devices with data processing capabilities, including, but not limited to, personal microcomputers (UMPC - micro personal computer), netbooks, laptops, naseleniya, engineering workstations, handheld computers (PDA - personal digital assistant)equipped with a computer clock, wired or wireless terminals/nodes/etc., mobile handsets, set-top boxes, personal video recorders (PVR - personal video recorder), automated teller machines (ATM - automatic teller machine), gaming console, etc. Elements that represent examples of basic components, including functional elements, the computing device 100 are denoted 102-108. The processor 102 may include one or more components configured to execute instructions; for example, the instructions may comprise software code. At least one scenario execution of the program code may include receiving incoming information from other elements in the computing device 100 to form the result (e.g., data, event, action etc). The processor 102 may be selected (e.g., monolithic) microprocessor device or may be part of a composite device such as ASIC (specialized integrated circuit is an application-specific integrated circuit), a gate matrix, the multi-chip module (MCM multi-chip module), etc.

[0024] the Processor 102 may be electrically connected to other functional components in the computing device 100 through a wired and/or the wireless tire. For example, processor 102 can access the memory 102 with the aim of obtaining stored information (e.g., software code, data, etc. for use in the process. The memory 104 may generally include removable or built-in memory devices that operate in static or dynamic modes. In addition, the memory 104 may include a permanent storage device (ROM - read only memory), random access memory (RAM - random access memory) and a rewritable memory device such as Flash, EPROM (erasable programmable permanent memory - erasable programmable read-only memory), etc. are Examples of removable storage media based on magnetic, electronic and/or optical technologies is shown in the form of component 100 input/output (I/O - input/output) figure 1 and can be, for example, as a means of input/output data. The code may include any interpreted or compiled language programming, including executable computer instructions. Code and/or data can be used to create software modules such as operating systems, utilities, communications, user interfaces, more specialized software modules, etc.

[0025] One or more interfaces 106 may also be connected to various components in the computing device 100. These in erface may provide connectivity between devices (for example, the software interface or Protocol), the communication device is a device (for example, interface wired or wireless) and even communication between the device and the user (e.g. the user interface). These interfaces allow components within the computing device 100, other devices and users to interact with computing device 100. In addition, the interfaces 106 can transmit machine-readable data, such as electronic, magnetic or optical signals present on a machine-readable storage medium, or can translate user actions into signals that can be interpreted by the computing device 100 (for example, printing on a keyboard, speaking into the microphone of the cellular mobile phone, touch the icon on the device with a touch screen and so on). Interfaces 106 may also allow the processor 102 and/or memory 104 to communicate with other modules 108. For example, other modules 108 may include one or more components that support more specialized functionality provided by computing device 100.

[0026] Computing device 100 may communicate with other devices over various networks, also shown in figure 1. For example, the hub 110 may provide wired and/or wireless is obvodnoe connection to such devices as computer 114 and the server 116. The hub 110 may also be connected to the router 112, allowing the devices in the local network (LAN - local area network) to communicate with devices in a WAN - wide area network such as the Internet 120). In such a scenario, another router 130 may transmit and receive information from the router 112, so that the devices in each LAN can communicate. In addition, all of the components shown in this example, the configuration is not required when implementing the present invention. For example, in the LAN 130 served by the router 130, no additional hub, since its functionality can be provided by the router.

[0027] in Addition, communication with remote devices can be provided by different providers near or distant connection 140. Such providers to provide wireless connectivity to the Internet 120 may use, for example, long-range communications using terrestrial cellular systems and satellite communication systems and/or near field communication, using wireless access points. For example, a pocket computer (PDA - personal digital assistant) 142 and cell phone 144 may communicate with the computing device 100 via the Internet 120, which is provided through a wireless connection 140. Similar functionality may also be included in the other the disorder, such as laptop 146, as resources hardware and/or software configured to provide near and/or long-range wireless connection.

II. The example network environment

[0028] figure 2 shows an example of the workspace that will be used to explain various embodiments of the present invention. Because this scenario is used here only as an explanation, the implementation of the present invention is not limited to the described specific example. A workspace can be defined using various criteria. For example, the physical area, such as buildings, theaters, sports arenas, etc. can define the space in which users can interact. Alternatively, workspaces can be defined in terms of devices that use a specific wireless data communication devices that are within communication range (for example, at a certain distance) from each other, the devices that are members of certain classes or groups, etc.

[0029] the Wireless device 200 in figure 2 are indicated by characters from "a" to "G". Device 200 may, for example, to comply with any of the wireless devices that were shown in figure 1, and can also include at least the resources mentioned in the description of the device 100. In addition, these devices can operate using at least one conventional wireless application Protocol. That is, all the device shown in figure 2, can interact with each other inside the working space and, thus, may jointly participate in the wireless network connection.

III. Examples of messaging

[0030] an Example of the communication between the devices in accordance with at least one embodiment of the present invention shown in position 300 figure 3. Although shown only two devices 200A and 200 V, the example shown in figure 3, is presented only for explanation and not intended to limit the scope of the present invention. Various embodiments of the present invention can easily provide wireless communication between more than two devices.

[0031] Additional details regarding example 300 communication shown below in figure 3. Device 200A may have requirements for the communication, in accordance with whom you must interact with the device 200. For example, these requirements may include interaction with users, devices, applications hosted on devices, etc. that initiates the message transfer and in General can be classified by category of transmission 02 data. The data transfer can be implemented using messages that can be transmitted by wireless devices 200A and 200V. However, as a rule, some sort of line or wireless network, you must install before you can make any messaging 302 data.

[0032] the Message 304 of the establishment of the network and control access to the transmission medium data (MAC - media access control) can be used to establish and maintain inside the working space of the basic architecture of a wireless network that can be used to send messages 302 data. In accordance with various embodiments of the present invention, a message containing the device configuration information about the operation and status may be transferred for transparent connectivity wireless network when, for example, the device enters the working space. The network connection may exist between any or all of the devices that exist inside the working space, and can exist at all times while the device is inside the working space. In this way, the message 302 with the data can be transferred between devices using existing networks (no need to install a new network connection is each each time, when a message is sent)that can reduce response time and improve the quality of service (QoS - quality of service).

[0033] In accordance with at least one embodiment of the present invention figure 4 shows an example of creating a distributed local network through messages 304 automatically establishing a network and control the MAC. Device 200 included in the workspace 210 may immediately initiate the creation of a network through the exchange of business information. Note again that the sharing of this information may occur without any hints or even awareness on the part of the user. An example of the interaction shown in figure 4, where the device a to G are exchanged between different messages 304 networking and control of your MAC. In accordance with at least one embodiment of the present invention, the messaging can be performed directly by the caller (for example, by the device, which is described with the help of information elements contained in the message) and the receiving device. Alternatively, the message corresponding to the devices in the workspace 210 may be routed from one device to another, spreading, thus, the information between multiple devices.

IV. An example of a workflow pairs is m: increased transmission period of a beacon

[0034] an example of the information transfer which can be done in messages 304 networking and control of your MAC (for example, using information elements) in accordance with at least one embodiment of the present invention, is shown in figure 5. A graph of activity shown by the position 500 is an example implementation of a standards-based wireless LAN (WLAN-wireless local area network), which is defined in IEEE 802.11. However, embodiments of the present invention is not limited to implementation within the WLAN and, thus, can be applied in other wireless network architectures and communication protocols.

[0035] the Logical architecture of WLAN contains the station (STA - station), wireless access points (AP - access point), an independent basic sets of services (IBSS - independent basic service set), the basic sets of services (BSS - basic service set), distribution system (DS - distribution system) and a broader range of services (ESS - extended service set). Some of these components correspond directly to hardware devices, such as stations and wireless access points. For example, wireless access points can function as bridges between the stations and the network backbone (for example, to ensure network access). Independent basic service set is a wireless network that includes m is Nisha least two stations. Independent basic service set may also sometimes be referred to as a wireless ad hoc network. Basic sets of services are wireless network including a wireless access point that serves one or many wireless clients. The basic sets of services can also sometimes be referred to as infrastructure wireless networks. All the stations in the basic service set can communicate through an access point. The access point can provide connectivity to a wired local area networks and to provide the function of the bridge, when one station initiates a connection to another station or node in the distribution system (for example, to the station that is connected to another access point, which connects through a wired network backbone).

[0036] In a wireless network architecture, such as WLAN, the beacon can be used to synchronise network devices. In situations where new wireless ad hoc network, the initiating device may set the standard for the network beacon based on its internal time, and all devices connecting to the network, can be consistent with this standard beacon. Similarly, devices wishing to connect to an existing wireless network, you can synchronize with the existing lighthouse. If the WLAN device is istwa can synchronize with the beacon, using the synchronization function time (TSF - timing synchronization function). The synchronization function time clock function that is local to the device performing the synchronization and tracking transmission period of the beacon.

[0037] an example of a beacon signal shown in the figure 5 position 502, where the target transmission time of the beacon (TVTT - target beacon transmission time) indicates the time at which the scheduled transfer of the lighthouse. This time is called the "target"as a valid transmission of the beacon may be somewhat delayed relative to TUTT, due to, for example, that the channel is busy during TTT. The active device in the network can communicate with each other in accordance with the transmission period of the beacon (the time between two beacon transmissions). However, there may be times when the activity of the device during each transmission period of the beacon may not be feasible, and perhaps even harmful. For example, devices that do not require frequent communication within the wireless network will not be able to benefit, if you will be active each period of transmission of a beacon. In addition, devices with limited energy and processing resources may be forced wasting these valuable resources because of the need to be active each period of transmission of a beacon.

[0038] In accordance with at least one in which the version of the implementation of the present invention, functionality can be demonstrated using the example of a distributed wireless network, described above, which provides devices with a standard transmission frequency of the lighthouse, which was established in the network or, alternatively, using the "low" frequency of transmission of a beacon. Under the "low" frequency of transmission of the beacon can be assumed to be the mode of transmission of a beacon with a frequency less than the standard rate of lighthouse, originally installed in the network. More rare beacon transmission can occur on the basis of information (for example, information elements), which is included in personnel network beacons, where the included information may identify one or more low frequency transmission of the beacon as multiples of the value of the transmission period of the beacon. Using within the beacon frame values lighthouse and one or more associated increased periods of transmission of the beacon, the network device may make a decision (for example, by random choice) to work if they are based on standard transmission period of a beacon, or on the basis of the increased transmission period of the beacon. In particular, all devices can synchronize on the same initial target transmission time of the beacon (TWTT), for example, when TSF=0, and then can calculate the number of periods that have passed on after the social TUTT, based on the internal functions of the TSF. In this case, the device, using the increased transmission period of the beacon can be active at a time value TWTT that correspond to multiple values, given the increased transmission period of the beacon.

[0039] an Example of the increased transmission interval of the beacon in every tenth TWTT shown in the figure 5 position 504. The decision to use the transmission interval of the beacon can be received by each device individually (e.g., Protocol stacks, which controls the operation of the radio modem). In this case, in accordance with at least one embodiment of the present invention, all devices will work, based on the value of the transmission interval of the beacon, which remains constant throughout the lifetime of the network. Taking into account the requirement that the transmission interval of the beacon remained unchanged throughout the lifetime of a wireless network, a sparse beacon signal can be expressed as a multiple of the value of the period of the beacon signal. The initial intervals can be determined by the device forming the network, and in the example shown in figure 5 (as mentioned above), the first value TWTT equal TSF=0. Other devices, which are sequentially connected to the network can adapt the parameter Jn is erval transmission of the beacon and the time TWTT. For example, TTT when TSF=0 is the "base point", which determines when the transmitted beacons. All devices in the network can update their own counters TSF under existing rules, synchronization, and from TSF they can determine the specific value TWTT in which they should participate in the transmission of the beacon, believing that, despite the value of the transmission interval of the lighthouse, the first lighthouse was transferred when TSF=0.

[0040] for Example, in a network comprising four devices, where the devices 1, 2 and 4 are using more rare transmission of the beacon and have the value of the transmission interval of the beacon (for example, the period of time between beacon transmissions), corresponding to each of the sixth TUTT, all devices can be synchronized, although only device 3 can be active (for example, "to participate in the contest") in all periods of transmission of the beacon 1, 2, 3, 4 and 5 (for example, all devices can participate in the contest at values TWTT 0, TTT, 6, TWTT 12 and so on). Therefore, there may exist at least two different transmission period of a beacon among devices and possibly other extended periods of transmission of the beacon, as the other device group can choose their own increased transmission period of the beacon based on the values of the initial transmission period of the beacon and one or more associated transmitted Indyk is tori extended periods of transmission of a beacon.

[0041] In accordance with at least one embodiment of the present invention, the beacons will contain the parameter is increased the transmission period of the beacon. Parameter increased transmission period of the beacon can be transmitted, for example, information elements (IE (information element)that identifies the manufacturer. Parameter values increased transmission period of the beacon can remain constant throughout the lifetime of the network. However, they can define other intervals of transmission of the beacon when the need arises in achieving greater flexibility, and all preset interval of transmission of the beacon can be given as in the case of increased transmission interval of the beacon.

V. Examples of Windows activity

[0042] figure 6 shows an example implementation of the Windows activity in accordance with at least one embodiment of the present invention. As in figure 5, the "standard" network beacon (for example, the beacon set by the device that generated the network) shows the position 600. Each target transmission time of the beacon (TTT) may be the beacon frame that is transmitted by a device on the network (or, at least, the time periods that are assumed to be transmitting a beacon, excluding any delays). Thus, the interval shown by the position 602 may determine the standard period is peredachi lighthouse.

[0043] Further, it is possible window of activity for a device that is a member of the network shown in Fig.6, the example presented their position 604. These periods of activity occur in accordance with each transmitted TWTT and, therefore, can be defined as oriented normal period of the transmission network beacon. These Windows activity does not necessarily mean that during these time periods, the device has a scheduled activity (for example, the messages in the transmission queue). These Windows activity are simply periods of time in which the device can be active and, therefore, will be able to transmit messages and/or receiving messages from other devices on the network.

[0044] the Behavior of another example of a device in accordance with at least one embodiment of the present invention shown next position 650. Since all devices on the network will work, starting from the same starting point (for example, TSF=0) and with normal transmission period of a beacon (e.g., referred to hereinafter TWTT), each device may select the operating mode based on one or more indicator increased periods of transmission of a beacon that is transmitted in the beacon. For example, the device that corresponds to the activity shown by the position 650, runs, use the UYa extended period 652 transmission of the beacon, which in this example has a ratio of "4". Therefore, increased period 652 transmission of the beacon may carry out the transmission of a beacon in every fourth time TWTT. Window activity, such as shown by the position 654 may also occur in accordance with the increased period 652 transfer of the lighthouse. In at least one implementation, the window activity can begin immediately before the commencement of the increased transmission period of the beacon.

[0045] Although the duration of Windows activity pre-configured information element in the beacon as a constant value, in practice it can have a variable value. For example, window activity may be based on the MAC, which is similar to the parameters of the transmission interval of the beacon and increased transmission period of the beacon. The host device transmitting the beacon can determine this parameter and pass it to the modem for transmission to the lighthouse. It is possible to transfer using, for example, common information element (IE) or an information item of a specific manufacturer to determine the transmission interval of the beacon and increased transmission period of the beacon. The device may attempt to switch to "sleep" or hibernate mode while you're waiting window activity. In reality, however, the sleep mode may be earlier or p is SGE in accordance with management methodology which will be discussed when considering Fig.7-8.

[0046] 7 shows the configuration of the access control channel, which can be implemented in accordance with at least one embodiment of the present invention. Initially can be defined two modes of access to the channel: mode competition with non-empty queue (N-EQC - non-empty queue contention) and the mode of competition with an empty queue (EQC - empty queue contention). When the device has no messages (frames)that are queued in the transmission buffer for transmission to believe that the devices are in the mode of EQC. Conversely, suppose that the devices are N-EQC, when there is at least one frame waiting for transmission.

[0047] the N-EQC may include optional implementation: "Hereditary" 700 "Priority lighthouse 750. When using the inherited implementation 700, when receiving or transmitting the beacon contention access channel can be resolved as set in legacy devices, for example, as defined by the rules of access to the channel specified in the specific means of wireless communication. Hereditary implementation 700 is an example of contention for channel access in accordance with the existing set of access control rules between time points 702 and 704. As soon as the device gets access to the transmission medium at the time 704, it is alucam the possibility of transfer (THOR - transmission opportunity), which can transmit frames to the network (for example, if one or more frames are queued for transmission). "TX", as shown between items 704 and 706 7, refers to the transmission of any messages in the queue. In addition, in the period "t" may be receiving frames from the network as a confirmation of reception of the transmitted frames.

[0048] In the implementation 750 "Priority Beacon device that transmitted the network beacon is allowed to continue transmitting any frames that are queued for transmission in the buffer for transmission. The device is capable of transmitting THOR for transmission of the beacon, and as soon as it passed the lighthouse at the moment 752, it can automatically get the new transfer capability THOR, as shown at the moment 754, to transmit any frames that wait for transmission in the buffer for transmission. In the shown example, the new transfer capability THOR can begin immediately after a period of short interframe pause (SIFS - short interframe space), the next at the end of the beacon frame, which is shown in example 750 interval pause between moments 752 and 754.

[0049] once the device has completed the transmission (for example, to flush its buffers for transmission), it must be in the mode EQC, as shown in implementations 700 and 750 symbols 706 and 756, respectively. If the device during the period is peredachi lighthouse has no frames to transmit, the device enters the mode EQC immediately after transmission/reception of a beacon (e.g., 702 and 752). If EQC, the device may attempt to obtain THOR a certain number of times (specified, for example, the parameter "RepeatEmptyQueueContention" ("repetition of the contest with an empty queue")). When receiving the transmission capabilities of THOR, devices that do not have pending messages, you can try to get a new transfer capability THOR, as shown by the positions 708/710 and 758/760 in implementations 700 and 750, respectively, instead of initiating the transmission of a sequence of frames. Devices that are within the transmission interval of the beacon receive the number of THOR equal to a preset threshold value (for example, the parameter RepeatEmptyQueueContention), can enter into "sleep" or hibernate mode. In the examples, 700 and 750 implementation figure 7 it can happen in moments 712 and 762, respectively. All these events can occur before the end of the window 612 activity. In addition, as the example of hereditary implementation 700, and an example implementation 750 priority lighthouse, assume that message transmission between 704 and 706, as between 754 and 756, respectively, were successful, and thus, at this stage no frames waiting to be (re) transmission.

VI. The establishment of scanning capabilities, use, and sootwetstwujuschtschie

[0050] the Preceding description has related to periods of activity that can occur in accordance with the increased transmission period of a beacon in accordance with at least one embodiment of the present invention. Increased transmission period of the beacon may allow network devices to operate less frequently, which can reduce the use of resources and to increase the operating time. Other periodic, which can exist separately or together with increased periods of transmission of the beacon, include scanning capabilities. On Fig shows part of the graph activity shown earlier position 650, with the aim to give explanations concerning the possibilities 800 scan. Features 800 scan represent periods of time during which the device can be in a state of passive scanning. Features 800 scan may appear periodically, based on the significance of the interval signal transmission network beacon (for example, starting with TSF=0), which can be defined in terms of the parameter aScanlnterval (scan interval) 802 on Fig. In the example shown, this parameter is set to "2"which means that the scanner will appear at the beginning of every second TWT based on the interval of signal transmission network beacon. Because when the ore implementation Fig increased transmission period of the beacon is set to "4", in the shown example, the transmission of a beacon with a larger period will occur during the lifetime of each of the second scanning capabilities.

[0051] the Duration of a possible 800 scanning can also be determined based on the significance of the interval signal transmission network beacon. In the example implementation Fig, duration, configurable by parameter aScanLength (scan duration) 804, set to "1", that is equal to one standard transmission period of the beacon network. Each colored area inside features 800 scan corresponds to the Windows activity of the example device shown in the graph 650, which begin at the same time TWTT that window 800 scan.

[0052] the Ability for devices to be active in the network (for example, to transmit a beacon in accordance with a standard or extended transmission period of the beacon) may appear at the same time TWTT that and the possibility 800 scan. However, in accordance with the variations in implementation of the present invention, the device may decide not to participate in active networking, such as the transfer of the lighthouse, with the aim to perform a passive scan. Examples of scans that will be described below, can facilitate the process of expanding the network by a wasp is estline scan together with the response mechanism to transmit information about connections to other devices, who may wish to join the network.

[0053] an Example implementation of the scanner described with reference to Fig.9. Both devices a and b working with value aScanlnterval=2, which leads to the initiation of scanning capabilities in every second time TUTT, and each has the ability to scan duration (aScanLength), equal to one interval of signal transmission network beacon. First device And chooses not to use the 900 scan. Therefore, the device And may participate in the standard transmission network beacon, as defined by the used communication Protocol. However, in accordance with at least one embodiment, data transfer, except for the transfer of the lighthouse, is not permitted for devices employed in scanning capabilities, and therefore the device after transmission of the beacon may return to sleep mode. In 902, the device And again chooses not to use the scan feature, but when the next opportunity 904 scanning device And may choose to use the scan feature. As a result, the device may perform a passive scan in a lifetime opportunity 904 scan. In accordance with at least one embodiment of the present invention, the use skanirovaniya also include other activity in addition to simple passive scanning. Examples of activity that may occur during use of the scanner will be described with reference to figure 10.

[0054] In contrast to the operation described with reference to the device And

in Fig.9, the device decides not to use any of the capabilities of scanning positions shown 906 and 910. Instead, in both cases, the device participates in the network beacon. During the existence of opportunities 906 and 910 scanning device participates in the network beacon and transmit other information. During the second possibility 908 scanning device decides to use the scanning method described above in relation to the possibility 904 scan. Devices on the same network may schedule the work so that some devices perform a passive scan, while other active transmission of a beacon.

[0055] In the above example, devices, such as devices a and b, which are shown in Fig.9, most likely will not use every opportunity scan for the implementation of passive scanning with the support of such wireless protocols as WLAN. Instead, the average will be used one of aScanProbability (for example, the parameter that determines the probability that the scan feature b the children used) scanning capabilities. Therefore, the probability that a device will perform a scan during the lifetime of one scanning capabilities, can be defined as 1/aScanProbability, and the device may decide separately for each emerging scanning capabilities, whether you use it to scan.

[0056] using presented on Fig.9 scanning capabilities as the basis, figure 10 presents an example of processes that can occur when you use the scan feature.

When using the scanning device And may be some time before the beginning of the passive scanning to prepare to send an informational message is presented on figure 10 as the message "MyNetwork" ("Measat"). Network information message contains information about the connection properties used by devices outside of the network to establish a connection with the network. For example, network information message may contain information about the time, which will allow devices running offline, synchronize with the network time. In addition, the network information message may also contain information related to one or more increased transmission period of a beacon that will allow devices to perform than the Yu with network time, but also to operate in accordance with the increased transmission period of the beacon, already installed in the network.

[0057] for Example, the network information message may contain information about the network, such as the information contained in beacon frames, including the size of the network, the identifier of the base service set (BSSID - basic service set identifier), the operating frequency of the network and other Devices on the network, which transmits the packet from the scanning device may process the frame similarly to the processing of internal network scan reports. The device can individually decide to react if a new network is detected. If the device has decided to respond to the detection, the device will start working in networks are found. The device can either continue to work in the old network, or move all your work in the new network. In the first case, the device can form a gateway between the two networks. In the second case, the device informs the other devices in the old network about his decision to leave the network.

[0058] Example processes that may occur during the lifetime of the opportunity 902 scan, also shown in figure 10. When a device that performs passive scanning, receives the signal 1000 beacon of another network, it initiates the transmission (TX - transmission) and/or broadcast network information is the first message or similar to the selected frame data, contains information about connections associated with the network in which the device is engaged in passive scanning, works at the moment. The frame data in the presented example is a frame 1002 notice "MyNetwork", as the frame may be used to inform new found networks on the availability of the existing network (for example, the network to which it belongs performing passive scanning device). The frame may be similarly transmitted data frames that are transmitted by devices operating within the network (for example, including the basic rules of the competition). In addition, the MAC layer may be notified that the frame should be given this kind of, as if it was a frame sent by any device running on another network (for example, the network ID must be set to the value used in another network). Information about the network identifier of another network can be extracted from the received scanner beacon signal that caused the scanner to transmit the frame MyNetwork.

[0059] the Above process can also be applied in case if there is a special control frame. Admission regular frames can be used in the recruitment MyNetwork, because by default, the transaction will use the normal data frames. The device will not be expected osushestvleniya frames MyNetwork as or different from the frames of all other types. Alternatively, for this purpose can be defined a new control frame. Work may continue, as shown by the positions 1004 and 1006 figure 10, during the existence of opportunities 902 scan.

[0060] a Device that uses the scanner for

implementation of passive scanning other networks can transmit frames MyNetwork (for example, 1002 and 1006) when receiving beacon frames from other networks (e.g., a beacon with the same service set identifier that the network in which the device). When the scan is initiated, the device may first prepare to transmit the frame MyNetwork, and then to enter into competition with non-empty queue. The beacon frames received from other networks, you can run the normal channel access, which is determined in accordance with the wireless application Protocol, and then can be transferred frame MyNetwork. As soon as the device made broadcast frame MyNetwork, it can resume the passive scan and prepare another frame MyNetwork for the next detection (e.g., for subsequent beacons received from other networks). Upon expiration of the lifetime of the scanner device can reset the access mode to the channel and to remove the remaining frames MyNetwork of transmit queues.

[0061] a Block diagram of an example process communication in accordance with at least one embodiment of the present invention represented by figure 11. In step 1100, the device can be determined new time TWTT. Determining whether to initiate the scan feature with the current value TWTT (for example, whether certain at the moment is TWTT multiple of the interval value signal transmission network beacon configured aScanlnterval)may be performed in step 1102. If scanning is not initiated at step 1102, the process may return to step 1100 to wait for the next interval signal transmission network beacon. Otherwise, if there is the possibility of scanning, the process may proceed to step 1104.

[0062] In step 1104 may be performed more determining whether to use the scan feature. This determination may be made based on various factors, such as calculations of probability, other processes of communication occurring in the device, etc. If the device decides not to use the scan feature, then in step 1106, the device may perform a further determination as to whether to participate in the transmission network beacon at step 1106. If the device chooses not participated is to transfer the network beacon, the process may be terminated at step 1008 and return to step 1100 until then, until it finds the next transmission period of the beacon. If the device decided to participate in the transmission network of the lighthouse, then at step 1100, the device may participate in the standard transfer processes lighthouse defined in the wireless application Protocol used in the network, and the process can end at step 1108 after completion of the transmission network beacon or after the lifetime of the scanner, depending on what happens earlier.

[0063] otherwise, in step 1104, the device may decide to use the scan feature. Then the process may proceed to step 1112, which renders the network information message. Network information message may include, for example, information about the connection used by the devices that want to join the network. Information about connections may contain information about the time, which will be used by other devices to synchronize with the network time, and, in some cases, information about extended periods of transmission of the beacon, which is already installed in the network. Mode passive scan may be initiated at step 1114, in this mode, the device scans the beacon corresponding to the other devices and/or networks at step 1116. These beacon signals can be detected, for example, by including them in the SSID that is different from the network scanning device. If the beacon signal is valid, then at step 1118, the device may send, for example, to wirelessly broadcast) network information message. Network information message can be transmitted/transmitted by broadcasting on the basis of the procedures communication control installed in the network (for example, after the competition for access to communication channels), and may include SSID another network, which was taken from a previously adopted lighthouse. Passive scanning may continue at step 1114 to time at step 1120. Further, the process may end at step 1122 and return to step 1100 to prepare for the next detected TWTT.

[0064] let us Add to the above that the various embodiments of the present invention is not limited strictly to the above implementations, and thus, other configurations are possible.

[0065] for Example, devices in accordance with at least one embodiment of the present invention may include means for detecting scanning capabilities for the device, which is based on a multiple of the value interval of signal transmission network beacon, means for training the network info is awareness messages and entering passive mode scan over the life of the scanner, if the device was decided to use the scan feature, and means for transmitting network information message, if the message is a beacon corresponding to another network, was accepted by the device, which was in the passive scanning mode.

[0066] At least one example implementation of the present invention may include electronic signals that cause the device to identify the ability to scan for the device, which is based on a multiple of the value interval of signal transmission network beacon, prepare network information message and enter the passive mode scan over the life of the scanner, if you have decided to use the scan and transmit network information message, if the message is a beacon corresponding to another network, accepted by the device in the passive scanning mode.

[0067] Thus, for specialists in the art it will be obvious that it can be made various changes in form and detail within the framework of the present invention. Scope of the present invention is not limited to any of the above variants of implementation, are presented as examples, and is determined by the points following formula izopet the deposits and cash equivalents.

1. A method of wireless communication, including:
identification scanning capabilities for communication devices, and the ability to scan based on the interval of signal transmission network beacon;
training network information messages and entering passive mode scan for the lifetime of the scanner if the device communications decided to use the scan feature; and
initiating transmission of the network information message, if the message is a beacon corresponding to another network, accepted by the communication device, which is in the passive scanning mode.

2. The method according to claim 1, in which the start time and duration of the scanning capabilities set as multiples of the interval values of the signal transmission network of the lighthouse.

3. The method according to claim 1 or 2, in which the communication device is involved in the transfer of the lighthouse within the network, if the communication device decided not to use the scan feature, and the communication device is not involved in the transfer of the lighthouse during the lifetime of the scanner if the device communications decided to use the scan feature.

4. The method according to claim 3, in which the communications device does not initiate the transmission of data frames during the lifetime of the scanner, when the communication device Uch which helps in the transmission of the beacon within the network during the lifetime of the scanner.

5. The method according to claim 1 or 2, wherein the network information message is modified by the communication device prior to transmission by including the network identifier corresponding to another network, if the network identifier is retrieved by the communication device from a received beacon.

6. The method according to claim 1 or 2, wherein the network information message contains information used by the other communication devices in synchronization with a transmission period of a beacon in the network, including information about the extended period of transmission of a beacon.

7. Machine-readable data carrier with a computer program comprising machine-readable program code configured to implement the method according to any one of claims 1 to 6 when performing the above-mentioned program in the computer.

8. Wireless communication, including:
means for identifying scanning capabilities, with the ability to scan based on the interval of signal transmission network beacon;
means for determining whether to use the scan feature;
means for training the network information message and entering passive mode scan for the lifetime of the scanner, if you have decided to use the opportunity of scanning;
means for receiving beacon messages and
means for re the ACI network information messages, if a beacon message corresponding to another network, accepted by the device in the passive scanning mode.

9. The device according to claim 8, in which the start time and duration of the scanning capabilities are specified as multiples of the interval values of the signal transmission network of the lighthouse.

10. The device according to claim 8 or 9, containing means to participate in the transmission of the beacon within the network if you decide not to use the scan feature.

11. The device according to claim 8 or 9, containing means for modifying network information message before sending it by including the network identifier corresponding to another network, and the network device ID obtained from a received beacon.

12. The device according to claim 8 or 9, in which the network information message contains information used by other devices in synchronization with a transmission period of a beacon in the network, including information about the extended period of transmission of a beacon.

13. The device according to claim 8 or 9, in which the means for initiating the transfer includes funds for the participation in the competition for access to the transmission medium is wireless.

14. The device according to claim 8 or 9, in which entering passive mode scan device is not involved in the transfer of the lighthouse during the existence of vozmozhnostregulirovaniya.

 

© 2013-2014 Russian business network RussianPatents.com - Special Russian commercial information project for world wide. Foreign filing in English.