There lies a challenge to develop a technique of effectively establishing a direct communication link between client devices in a communication network. In some implementations, an associated STA is a client device which is associated with a particular access point (ap). A non-associated STA is a client device which is not associated with the ap. A tunneled probe request may be transmitted by an associated STA through the ap to be broadcast to other associated STAs. In some implementations, an active scan may be combined with a tunneled probe request in order to establish a communication link between an associated STA and a non-associated STA.
|
17. A method of wireless communication implemented in a wireless device, comprising:
generating a probe frame;
encapsulating the probe frame in a probe request message;
selecting a first channel for transmitting the probe request message to an associated station through an access point (ap) during a first time period;
determining that no response to the probe request message was received from the associated station; and
in response to the determination that no response was received from the associated station, selecting from a plurality of second channels for transmitting the probe request message directly to a plurality of non-associated stations during a second time period, wherein the associated station is associated with the ap.
26. An apparatus of wireless communication comprising:
means for generating a probe frame;
means for encapsulating the probe frame in a probe request message;
means for selecting a first channel for transmitting the probe request message to an associated station through an access point (ap) during a first time period;
means for determining that no response to the probe request message was received from the associated station; and
means for, in response to the determination that no response was received from the associated station, selecting from a plurality of second channels for transmitting the probe request message directly to a plurality of non-associated stations during a second time period, wherein the associated station is associated with the ap.
35. A computer program product for processing data for a program configured to operate instructions in a wireless communication device, the computer program product comprising:
a non-transitory computer-readable medium having stored thereon code for causing processing circuitry to:
generate a probe frame;
encapsulate the probe frame in a payload of a probe request message; and
select a first channel for transmitting the probe request message to an associated station through an access point (ap) during a first time period;
determine that no response to the probe request message was received from the associated station; and
in response to determining that no response to the probe request message was received from the associated station, select from a plurality of second channels for transmitting the probe request message directly to a plurality of non-associated stations during a second time period, wherein the associated station is associated with the ap.
1. An apparatus for wireless communication, comprising:
a message generating module configured to generate a probe request message, the probe request message including an encapsulated probe frame comprising a message type field that indicates to an access point (ap) that the probe request message is a broadcast request;
a channel selection module configured to select a first communication channel during a first time period and to select from a plurality of second communication channels during a second time period; and
a transmission module configured to:
transmit the probe request message to an associated station through the ap during the first time period using the first communication channel;
determine that no response to the probe request message was received from the associated station; and
in response to the determination that no response was received from the associated station, transmit the probe request directly to a plurality of non-associated stations using each of the plurality of second communication channels during the second time period, wherein the associated station is associated with the ap.
2. The apparatus of
3. The apparatus of
4. The apparatus of
5. The apparatus of
6. The apparatus of
8. The apparatus of
9. The apparatus of
10. The apparatus of
11. The apparatus of
12. The apparatus of
13. The apparatus of
14. The apparatus of
15. The apparatus of
16. The apparatus of
18. The method of
19. The method of
20. The method of
22. The method of
23. The method of
25. The method of
27. The apparatus of
28. The apparatus of
means for transmitting the probe request message to the ap; and
means for receiving a response message including a probe response frame, the response message being tunneled through the ap.
29. The apparatus of
30. The apparatus of
31. The apparatus of
32. The apparatus of
34. The apparatus of
36. The computer program product of
37. The computer program product of
code for causing the processing circuitry to transmit the probe request message to the ap; and
receive a response message including a probe response frame, the response message being tunneled through the ap.
38. The computer program product of
39. The computer program product of
40. The computer program product of
41. The computer program product of
42. The computer program product of
43. The computer program product of
|
This application claims priority benefit under 35 U.S.C. §119(e) to U.S. Provisional Patent Application No. 61/415,622 entitled, “DISCOVERY FOR DIRECT LINK CONNECTIONS” filed on Nov. 19, 2010, and U.S. Provisional Patent Application No. 61/417,532 entitled, “DISCOVERY FOR DIRECT LINK CONNECTIONS,” filed on Nov. 29, 2010, each of which is hereby incorporated by reference in their entirety.
1. Field
The present application relates to wireless communication, and in particular, to systems, methods and devices to enable device discovery in wireless local area network (WLAN) systems.
2. Background
In many telecommunication systems, communications networks are used to exchange messages among several interacting spatially-separated devices. Networks may be classified according to geographic scope, which could be, for example, a metropolitan area, a local area, or a personal area. Such networks would be designated respectively as a wide area network (WAN), metropolitan area network (MAN), local area network (LAN), or personal area network (PAN). Networks also differ according to the switching/routing technique used to interconnect the various network nodes and devices (e.g. circuit switching vs. packet switching), the type of physical media employed for transmission (e.g. wired vs. wireless), and the set of communication protocols used (e.g. Internet protocol suite, SONET (Synchronous Optical Networking), Ethernet, etc.).
Wireless networks are often preferred when the network elements are mobile and thus have dynamic connectivity needs, or if the network architecture is formed in an ad hoc, rather than fixed, topology. Wireless networks employ intangible physical media in an unguided propagation mode using electromagnetic waves in the radio, microwave, infra-red, optical, etc. frequency bands. Wireless networks advantageously facilitate user mobility and rapid field deployment when compared to fixed wired networks. However, wireless communication requires significant active resource management among the network users and higher levels of mutual coordination and cooperation for compatible spectrum utilization.
Various embodiments include systems, methods and devices within the scope of the appended claims, each having several aspects, where no single one of which is solely responsible for the desirable attributes described herein. Without limiting the scope of the appended claims, certain prominent features are described herein. After considering this discussion, and particularly after reading the section entitled “Detailed Description,” one will understand how the features of various embodiments are used to establish communication links between devices, and the like.
According to one aspect, an apparatus for wireless communication is disclosed. The apparatus includes a message generating module configured to generate a message, the message including an encapsulated probe frame, a channel selection module configured to select a first communication channel during a first time period and a second communication channel during a second time period, and a transmission module configured to transmit the message to a first communication device through an access point during the first time period and directly to a second communication device during the second time period.
According to another aspect, a method of wireless communication implemented in a wireless device is disclosed. The method includes generating a probe frame, encapsulating the probe frame in a message, selecting one of a first channel for transmitting the message through an access point (AP) during a first time period to a first communication device and a second channel for transmitting the message directly to a second communication device during a second time period, and transmitting the message.
According to another aspect, an apparatus of wireless communication is disclosed. The apparatus includes means for generating a probe frame, means for encapsulating the probe frame in a message, means for selecting one of a first channel for transmitting the message through an access point (AP) during a first time period to a first communication device and a second channel for transmitting the message directly to a second communication device during a second time period, and means for transmitting the message.
According to another aspect, a computer program product for processing data for a program configured to operate instructions in a wireless communication device is disclosed. The computer program product includes a non-transitory computer-readable medium having stored thereon code for causing processing circuitry to generate a probe frame, encapsulate the probe frame in a message, select one of a first channel for transmitting the message through an access point (AP) during a first time period to a first communication device and a second channel for transmitting the message directly to a second communication device during a second time period, and transmit the message.
The features, nature, and advantages of the present disclosure will become more apparent from the detailed description set forth below when taken in conjunction with the drawings in which like reference characters identify correspondingly throughout.
Popular wireless network technologies may include various types of wireless local area networks (WLANs). A WLAN may be used to interconnect nearby devices together, employing widely used networking protocols. The various embodiments described herein may apply any communication standard, such as WiFi or, more generally, any member of the IEEE 802.11 family of wireless protocols.
In some implementations, a WLAN includes various devices which are the components that access the wireless network. For example, there may be two types of devices: access points (APs) and clients (also referred to a stations, or STAs). In general, an AP serves as a hub or base station for the WLAN and a STA serves as a user of the WLAN. For example, a STA may be a laptop computer, a personal digital assistant (PDA), a mobile phone, etc. In an example, a STA connects to an AP via a WiFi (e.g., IEEE 802.11 protocol) compliant wireless link to obtain general connectivity to the Internet or to other wide area networks. In some implementations a STA may also be used as an AP.
In another aspect, wireless networks may operate in infrastructure mode. In infrastructure mode, a STA connects to an AP which serves as a hub for connecting with other wireless clients to the network infrastructure, including, for example, Internet access. Infrastructure mode uses a client-server architecture to provide connectivity to the other wireless clients. In one aspect, wireless networks generate a periodic Beacon signal which broadcasts wireless network characteristics (e.g., maximum data rate, encryption status, AP MAC address, SSID, etc.) to all nearby clients. For example, a service set identifier (SSID) may identify a particular wireless network.
Establishing a direct connection between wireless clients requires discovery of a wireless client device which is capable of establishing a direct connection. A wireless device, or client, associated with a home network may be referred to as an associated STA
A wireless protocol (e.g., IEEE 802.11, or the like) may define a protocol enabling wireless STAs associated with an AP to set up a direct link between them. One such protocol is tunneled direct link setup (TDLS). As described herein, TDLS setup messages may be encapsulated in a message (e.g., a data unit such as a protocol data unit (PDU)) according to a specific ethertype, so that they can be tunneled through an AP. In an example, the ethertype is specified in a field within an Ethernet frame, indicating the protocol used for encapsulating the payload in the message. According to the TDLS protocol, a TDLS setup message may include a discovery request that is sent to associated STAs. The discovery request may then be responded to by STAs which are TDLS capable through a TDLS discovery response. Since the TDLS discovery request and response are encapsulated according to the ethertype used by the AP, the AP does not have to be upgraded in order for TDLS to be used between two associated STAs because all the AP sees are messages encapsulated according to the ethertype. Thus, TDLS direct links can be set up between two TDLS capable STAs without a need to upgrade the AP.
According to some implementations, a probe frame may also be encapsulated in a portion of a message. A probe frame includes, for example, such messages as a probe request and a probe response, but is not limited thereto. A probe request may include information required for establishing a direct communication link between associated STAs. The client device may be capable of processing the message upon detection of the encapsulated probe frame. For example, if a data frame has a probe identifier in one the portions of the message described below with respect to
The encapsulation of a probe frame in a message will now be described with reference to
The content of the messages 210 and 220 discussed above will be described in greater detail with reference to the examples of
The last two octets of a LLC/SNAP header 202 may correspond to an ethertype. An ethertype may identify an associated protocol of the message. For example, an ethertype may identify a protocol field subsequent to the LLC/SNAP header 202. With reference to
The category/action field 304 may indicate an action frame category and a specific action frame. The message 300 may include an encapsulated action frame body (EAFB) 305 following the category/action field 304. The EAFB 305 may be configured as a TDLS frame body and may include TDLS instructions as discussed above, including a TDLS discovery request frame and a TDLS discovery response frame. The category/action field 304 may have unassigned data bits that may be reassigned to include a probe frame. The unassigned data bits may be configured to include the additional information required for a probe request and a probe response. Thus, a TDLS encapsulation protocol may be used for a probe frame, as indicated by a value of the category/action field 304. For example, reserved category field bits 5-126 as defined by IEEE 802.11 may be reassigned to include the probe frame information. Additionally or alternatively, reserved action field bits 16-255 as defined by IEEE 802.11 may be reassigned to include the probe frame information.
An ethertype value corresponding to various protocols allows for the assignment of other values to a type/subtype 403 and an EFB 404 than those specified by any particular protocol. For example, an ethertype value corresponding to a protocol registered to WFA would allow the type/subtype field 403 to take on other values than those defined by the IEEE 802.11 protocol.
Each of the messages 200, 300, 400, and 310 discussed above may contain a greater or fewer number of fields as illustrated in
Alternatively, the subtype field may indicate a probe response type. As illustrated in
Furthermore, the type/subtype field may be set to indicate an action frame body. As illustrated by message 700 in
For example, as illustrated in message 800 of
While certain examples have been illustrated with respect to the use of certain values for a type/subtype field and a category/action field, the values of these fields are not limited to those discussed above. Any number of values may be used to define a type/subtype field and a category/action field to represent various encapsulated frame bodies. Furthermore, each of fields 205, 305, 404, 315, 217, 227.504, 604, 704, 805, and 905 as discussed above may be referred to as a payload of each of the respective messages. A payload may include probe information, which may be in the form of an encapsulated probe frame. A probe frame may include a probe request or a probe response as discussed above. Furthermore, various fields of messages 210, 220, 200, 300, 310, and 400, may also be referred to as portions or layers of the respective messages.
Each probe request and probe response may also include additional information. Furthermore, addresses A1-A3 may be configured to indicate an address of any client device or AP. For example, a tunneled probe request may include a BSSID element that specifies the BSSID of the AP to which the STA transmitting the tunneled probe request is associated. A tunneled probe response may be limited such that it is transmitted only by STAs that are associated with the same BSSID. Additionally or alternatively, a tunneled probe frame may contain information about a peer-to-peer network to which the STA transmitting the probe frame may be concurrently associated.
The method may further incorporate a follow-up TDLS discovery technique as illustrated in
According to some implementations, a tunneled probe response may also include a TDLS capability. A TDLS discovery operation may be performed based on the TDLS capability included in the tunneled probe response. A TDLS capability may be indicated in an extended capabilities element included in the tunneled probe response.
The method may further incorporate a follow-up tunneled Generic Advertisement Service (GAS) request technique as illustrated in
According to some implementations, a tunneled GAS initial request may be transmitted to a unicast destination address rather than a broadcast address based on information obtained from tunneled probing. For example, a GAS initial request may be sent to a peer-to-peer network first prior to being broadcast to all associated STAs. This operation may reduce the response volume of tunneled GAS initial response frames.
In addition to tunneled probing and TDLS discovery, as described above, associated STAs may perform an active scan on certain social channels. A social channel may be a channel which is designated for non-associated STAs to monitor for a probe or discovery request. For example, the social channels may be channels 1, 6, and 11 in a 2.4 GHz band. Performing an active scan may include the transmission of one or more probe requests to at least one of the social channels. In some implementations, a STA performs an active scan by transmitting a probe request on each of the social channels.
According to the method illustrated in
According to some implementations, a STA which is associated with another basic service set (BSS) may be entered into a peer-to-peer listen mode in response to a user input. In a peer-to-peer listen mode, the STA's association with the AP may essentially be interrupted. As discussed above, the interruption may be communicated to the AP as a sleep-mode, power-save mode, or idle-mode in order to quickly re-establish a connection with the AP. A scanning non-associated STA may receive a probe request from an associated STA in a peer-to-peer listen mode. An associated STA in peer-to-peer listen mode is likely to be in a power save mode or idle-mode with respect to the associated AP as discussed above. However, the periodic listen mode may increase the power consumption of the associated STA. An associated STA may not be discovered by a non-associated STA due to the fact that the STA is in a power-save mode or idle-mode while in peer-to-peer listen mode. In some implementations, an associated STA in an active state and communicating on a BSS channel may not have to periodically transmit a probe request on the social channels. The associated STA may rely on a response to the transmitted probe request received by another STA on the BSS channel. As a result, an associated STA may reduce the power consumption of a peer-to-peer listen mode by not entering a listen mode and relying on the above described probe request.
According to some implementations, a STA which is associated with a peer-to-peer network may be discovered when an access point type indicates its presence in a probe response. For example, an access point type may be set to a GO type, and the presence of the STA may be indicated by a probe response transmitted by the AP.
According to some implementations, a WiFi simple configuration (WSC) with a requested device type may be included in a probe frame. By including a WSC, the volume of tunneled probe responses may be moderated by qualifying the types of devices that should respond. The WSC may be used to select a subset of the receiving STAs that may transmit a tunneled probe response.
The configuration of a client device or STA will now be described with reference to
While for purposes of simplicity of explanation, the methodologies are shown and described as a series of acts, it is to be understood and appreciated that the methodologies are not limited by the order of acts, as some acts may, in accordance with one or more aspects, occur in different orders and/or concurrently with other acts from that shown and described herein. For example, those skilled in the art will understand and appreciate that a methodology could alternatively be represented as a series of interrelated states or events, such as in a state diagram. Moreover, not all illustrated acts may be required to implement a methodology in accordance with one or more aspects.
One skilled in the art would understand that the steps disclosed in the example algorithms can be interchanged in their order without departing from the scope and spirit of the present disclosure. Also, one skilled in the art would understand that the steps illustrated in the example algorithms are not exclusive and other steps may be included or one or more of the steps in the example algorithms may be deleted without affecting the scope and spirit of the present disclosure.
Those of skill would further appreciate that the various illustrative components, logical blocks, modules, circuits, and/or algorithm steps described in connection with the examples disclosed herein may be implemented as electronic hardware, firmware, computer software, or combinations thereof. For example, a message transmission module 905 and a message reception module may be a transmitter, receiver, or antenna device. A processing module 902 and 1104 may be a CPU, MPU, or the like. To clearly illustrate this interchangeability of hardware, firmware and software, various illustrative components, blocks, modules, circuits, and/or algorithm steps have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware, firmware or software depends upon the particular application and design constraints imposed on the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope or spirit of the present disclosure.
In one example, the illustrative components, flow diagrams, logical blocks, modules and/or algorithm steps described herein are implemented or performed with one or more processors. In one aspect, a processor is coupled with a memory which stores data, metadata, program instructions, etc. to be executed by the processor for implementing or performing the various example algorithms, flow diagrams, logical blocks and/or modules described herein. For example, with reference to
The memory unit 1100 may be formed as a computer readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a computer. By way of example, and not limitation, such computer-readable media can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. Also, any connection is properly termed a computer-readable medium. For example, if the software is transmitted from a website, server, or other remote source using a coaxial cable, fiber optic cable, twisted pair, digital subscriber line (DSL), or wireless technologies such as infrared, radio, and microwave, then the coaxial cable, fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, radio, and microwave are included in the definition of medium. Disk and disc, as used herein, includes compact disc (CD), laser disc, optical disc, digital versatile disc (DVD), floppy disk and blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable media. In summary, it should be appreciated that a computer-readable medium may be implemented in any suitable computer-program product.
As a hardware implementation, the processing modules 902 of
The functionality described herein (e.g., with regard to one or more of the accompanying figures) may correspond in some aspects to similarly designated “means for” functionality in the appended claims. For example, a processing module 902 of
It will be understood that other aspects will become readily apparent to those skilled in the art from the descriptions herein. One skilled in the art would understand that the present disclosure, the drawings and the descriptions in the present disclosure are to be regarded as illustrative in nature and not as restrictive.
The description set forth in connection with the appended drawings is intended as a description of various aspects of the present disclosure and is not intended to represent the only aspects in which the present disclosure may be practiced. Each aspect described in this disclosure is provided merely as an example or illustration of the present disclosure, and should not necessarily be construed as preferred or advantageous over other aspects. The description includes specific details for the purpose of providing a thorough understanding of the present disclosure. However, it will be apparent to those skilled in the art that the present disclosure may be practiced without these specific details. In some instances, well-known structures and devices are shown in block diagram form in order to avoid obscuring the concepts of the present disclosure. Acronyms and other descriptive terminology may be used merely for convenience and clarity and are not intended to limit the scope of the disclosure.
The description of the disclosed aspects is provided to enable any person skilled in the art to make or use the present disclosure. Various modifications to these aspects will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other aspects without departing from the spirit or scope of the disclosure.
Wentink, Maarten Menzo, Rajamani, Krishnan
Patent | Priority | Assignee | Title |
11716362, | Dec 29 2021 | THE NIELSEN COMPANY US , LLC | Methods and apparatus to de-authenticate and reroute client sessions for media monitoring |
9961170, | Nov 25 2014 | Qualcomm Incorporated | Ethertype packet discrimination data type |
Patent | Priority | Assignee | Title |
5745699, | Sep 24 1993 | Apple Inc | Dynamic address assignment in an arbitrarily connected network |
7594268, | Sep 19 2003 | CA, INC | Preventing network discovery of a system services configuration |
7984160, | Mar 05 2009 | RIVERBED TECHNOLOGY LLC | Establishing a split-terminated communication connection through a stateful firewall, with network transparency |
8064374, | May 09 2008 | Nokia Technologies Oy | Power save mechanism for wireless communication devices |
8077683, | Nov 03 2005 | InterDigital Technology Corporation | Method and system for performing peer-to-peer communication between stations within a basic service set |
8149745, | Dec 26 2007 | Sony Corporation | Wireless communication system, wireless communication device, wireless communication method, and program |
8208451, | Sep 18 2007 | LG Electronics Inc. | Direct link setup procedure in tunneled direct link setup wireless network and station supporting the procedure |
8243623, | Mar 31 2009 | Intel Corporation | Combined device and service discovery technique in stations supporting tunneled direct link setup (TDLS) |
8259632, | Mar 10 2007 | LG Electronics Inc.; LG Electronics Inc | Peer power save mode in tunneled direct link setup (TDLS) wireless network |
8462667, | Mar 31 2009 | Intel Corporation | Combined device and service discovery technique in stations supporting tunneled direct link setup (TDLS) |
8514799, | Jun 22 2010 | LG Electronics Inc. | Method and apparatus of operating channel request and responding to the operating channel request in a wireless local area network system |
8570945, | Mar 14 2008 | LG Electronics Inc | Method and apparatus for transmitting data in DLS wireless network |
8665844, | Oct 15 2008 | LG Electronics Inc | Direct link setup method in tunneled direct link setup (TDLS) wireless network |
8737370, | May 17 2010 | Qualcomm Incorporated | Methods and apparatuses for direct link setup |
8824435, | Sep 09 2009 | LG Electronics Inc | Method of channel scanning in wireless local area network system |
8892874, | Dec 17 2008 | InterDigital Patent Holdings, Inc | Enhanced security for direct link communications |
20080219228, | |||
20090073945, | |||
20090168689, | |||
20090168736, | |||
20110149798, | |||
CN101472318, | |||
EP2076091, | |||
JP2003249939, | |||
JP2011503999, | |||
WO2006081123, | |||
WO2009134066, | |||
WO2009064113, | |||
WO2009113834, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Nov 16 2011 | Qualcomm Incorporated | (assignment on the face of the patent) | / | |||
Feb 14 2012 | WENTINK, MAARTEN MENZO | Qualcomm Incorporated | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 029526 | /0783 | |
Dec 23 2012 | RAJAMANI, KRISHNAN | Qualcomm Incorporated | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 029526 | /0783 |
Date | Maintenance Fee Events |
Oct 14 2019 | REM: Maintenance Fee Reminder Mailed. |
Mar 30 2020 | EXP: Patent Expired for Failure to Pay Maintenance Fees. |
Date | Maintenance Schedule |
Feb 23 2019 | 4 years fee payment window open |
Aug 23 2019 | 6 months grace period start (w surcharge) |
Feb 23 2020 | patent expiry (for year 4) |
Feb 23 2022 | 2 years to revive unintentionally abandoned end. (for year 4) |
Feb 23 2023 | 8 years fee payment window open |
Aug 23 2023 | 6 months grace period start (w surcharge) |
Feb 23 2024 | patent expiry (for year 8) |
Feb 23 2026 | 2 years to revive unintentionally abandoned end. (for year 8) |
Feb 23 2027 | 12 years fee payment window open |
Aug 23 2027 | 6 months grace period start (w surcharge) |
Feb 23 2028 | patent expiry (for year 12) |
Feb 23 2030 | 2 years to revive unintentionally abandoned end. (for year 12) |