专利摘要:
METHOD TO REDUCE CONGESTION IN A WIRELESS CELL NETWORK Wireless download provides tools to a service provider to encourage or direct a subscriber to download from a first network, for example, a cellular network, to a second network, for example. for example, a WiFi network. The cellular service provider can use network data to determine wireless download priorities for mobile subscribers individually or in a group. The cellular service provider may use wireless network data that they have and / or wireless network data over networks that they obtain from wireless devices (which can obtain WiFi network data from WiFi network signaling frames or active scan and that they can report to the cellular service provider). Scanning assignments can be given to each wired device to ensure that the reporting task is shared among subscribers or adjusted to fill data gaps. With network data, the cellular service provider has the ability to generate lists of prioritized networks useful for wireless devices, either individually or in (...).
公开号:BR112012029719B1
申请号:R112012029719-8
申请日:2011-05-25
公开日:2021-03-16
发明作者:Gregory G. Raleigh;Ali Raissinia;James Lavine
申请人:Headwater Research Llc;
IPC主号:
专利说明:

This application is a continuation in part and incorporates the following published non-provisional patent applications for reference: Publication No. US 2010/0188975, filed March 2, 2009, entitled “Verifiable Device Assisted Service Policy Implementation”, Publication US No. 2010/0192170, filed on March 2, 2009, entitled “Device Assisted Service Profile Management with User Preference, Adaptive Policy, Network Neutrality, and User Privacy”, Publication No. US 2010/0191612, filed on March 2 2009, entitled “Verifiable Device Assisted Service Usage Monitoring with Reporting, Synchronization, and Notification”, Publication No. US 2010/0191576, filed on March 2, 2009, entitled “Verifiable Device Assisted Service Usage Billing with Integrated Accounting, Mediation Accounting , and MultiAccount ”, Publication No. US 2010/0188991, filed on March 2, 2009, entitled“ Network Based Service Policy Implementation with Network Ne utrality and User Privacy ”, Publication No. US 2010/0188990, filed on March 2, 2009, entitled“ Network Based Service Profile Management with User Preference, Adaptive Policy, Network Neutrality and User Privacy ”, Publication No. US 2010/0192212 , filed on March 2, 2009, entitled “Automated Device Provisioning and Activation”, Publication No. US 2010/0191604, filed on March 2, 2009, entitled “Device Assisted Ambient Services”, Publication No. US 2010/0191575, filed on March 2, 2009, entitled “Network Based Ambient Services”, Publication No. US 2010/0188993, filed on March 2, 2009, entitled “Network Tools for Analysis, Design, Testing, and Production of Services”, Publication US No. 2010/0190470, filed on March 2, 2009, entitled "Roaming Services Network and Overlay Networks", Publication No. US 2010/0192120, filed on March 2, 2009, entitled "Open Development System for Access Service Providers ", Publication US No. 2010/0192207, filed on March 2, 2009, entitled "Virtual Service Provider Systems", Application serial number US 12 / 380,757, filed on March 2, 2009, and titled "Service Activation Tracking System", Publication US No. 2010/0191613, filed on March 2, 2009, entitled "Open Transaction Central Billing System", Publication No. US 2010/0188995, filed on March 2, 2009, entitled "Verifiable and Accurate Service Usage Monitoring for Intermediate Networking Devices ", Publication No. US 2010/0188994, filed on March 2, 2009, entitled" Verifiable Service Billing for Intermediate Networking Devices ", Publication No. US 2010/0191846, filed on March 2, 2009, entitled" Verifiable Service Policy Implementation for Intermediate Networking Devices ", Publication No. US 2010/0188992, filed on March 2, 2009, entitled" Service Profile Management with User Preference, Adaptive Policy, Network Neutrality and User Privacy for Intermediate Networking Devices ", Publication No. US 2010/0191847, filed on March 2, 2009, entitled" Simplified Service Network Architecture ", Publication No. US 2010/0197266, filed on January 27, 2010, entitled" Device Assisted CDR Creation, Aggregation, Mediation, and Billing ", Publication No. US 2010/0198698, filed on January 27, 2010, entitled" Adaptive Ambient Services ", Publication No. US 2010/0199325, filed on January 27, 2010, entitled "Security Techniques for Device Assisted Services", Publication No. US 2010/0197267, filed January 27, 2010, entitled "Device Group Partitions and Settlement Platform", Publication No. US 2010/0198939, filed January 27, 2010 2010, entitled "Device Assisted Services Install", Publication No. US 2010/0195503, filed on January 27, 2010, entitled "Quality of Service for Device Assisted Services", and Publication No. US 2010/0197268, filed on 28 January 2 010, entitled "Enhanced Roaming Services and Converged Carrier Networks with Device Assisted Services and a Proxy".
This application seeks priority and incorporates the following published non-provisional patent applications for reference: Provisional Application serial number US 61 / 348.022, filed on May 25, 2010, entitled "Device Assisted Services for Protecting Network Capacity", Application Provisional US serial number 61 / 381.159, filed on September 9, 2010, entitled "Device Assisted Services for Protecting Network Capacity", Provisional application US serial number 61 / 381.162, filed on September 9, 2010, entitled "Service Controller Interfaces and Workflows ", Provisional Application serial number US 61 / 384,456, filed on September 20, 2010, entitled" Securing Service Processor with Sponsored SIMs ", Provisional Application serial number US 61 / 389,547, filed on October 4, 2010 , entitled "User Notifications for Device Assisted Services", Provisional Order serial number US 61 / 385.020, filed on September 21, 2010, entitled "Servi ce Usage Reconciliation System Overview ", Provisional Order serial number US 61 / 387.243, filed on September 28, 2010, entitled" Enterprise and Consumer Billing Allocation for Wireless Communication Device Service Usage Activities ", Provisional Order serial number US 61 / 387.247 , filed on September 28, 2010, entitled "Secured Device Data Records", Provisional Application serial number US 61 / 407,358, filed on October 27, 2010, entitled "Service Controller and Service Processor
Architecture ", Provisional Application serial number US 61 / 418.507, filed on December 1, 2010, entitled" Application Service Provider Interface System ", Provisional Application serial number US 61 / 418.509, filed on December 1, 2010, entitled" Service Usage Reporting Reconciliation and Fraud Detection for Device Assisted Services ", Provisional Order serial number US 61 / 420.727, filed on December 7, 2010, entitled" Secure Device Data Records ", Provisional Order serial number US 61 / 422.565, filed on December 13, 2010, entitled "Service Design Center for Device Assisted Services", Provisional Order serial number US 61 / 422.572, filed on December 13, 2010, entitled "System Interfaces and Workflows for Device Assisted Services", Provisional Order US serial number 61 / 422,574, filed on December 13, 2010, entitled "Security and Fraud Detection for Device Assisted Services", Provisional Order US serial number 61 / 435,564, filed on January 24, 2011, entitled "Framework for Device Assisted Services", and Provisional Order serial number US 61 / 472,606, filed on April 6, 2011, entitled "Managing Service User Discovery and Service Launch Object Placement on a Device ".
In addition, this application incorporates the following provisional patent applications for reference: Provisional Application serial number US 61 / 206,354, filed on January 28, 2009, entitled "Services Policy Communication System and Method", Provisional Application serial number US 61 / 206,944, filed on February 4, 2009, entitled "Services Policy Communication System and Method", Provisional Application serial number US 61 / 207,393, filed on February 10, 2009, entitled "Services Policy Communication System and Method" , Provisional Application serial number US 61 / 207,739, filed on February 13, 2009, entitled "Services Policy Communication System and Method", Provisional Application serial number US 61 / 270,353, filed on July 6, 2009, entitled "Device Assisted CDR Creation, Aggregation, Mediation and Billing ", Provisional Application serial number US 61 / 275,208, filed on August 25, 2009, entitled" Adaptive Ambient Services ", Pe Provisional Order serial number US 61 / 237,753, filed on August 28, 2009, entitled "Adaptive Ambient Services", Provisional Order serial number US 61 / 252,151, filed on October 15, 2009, entitled "Security Techniques for Device Assisted Services ", Provisional Order serial number US 61 / 252,153, filed on October 15, 2009, entitled" Device Group Partitions and Settlement Platform ", Provisional Order serial number US 61 / 264,120, filed on November 24, 2009, entitled "Device Assisted Services Install", and Provisional Order serial number US 61 / 264.126, filed on November 24, 2009, entitled "Device Assisted Services Activity Map". COPYRIGHT NOTICE
A portion of the disclosure in that patent document contains material that is subject to copyright protection. The copyright owner has no objection to anyone's faithful reproduction of the patent document or patent disclosure, as it appears in the patent and trademark records of the Trademark and Patent Office, but in any case has all copyright. . BACKGROUND
Wireless networks, such as WiFi, 2G, 3G, 4G and WiMAX, whether governed by standard or proprietary protocols, often overlap each other. Multiple wireless networks of the same type, perhaps with specific differences in configuration, also often overlap each other.
A wireless device chooses an available wireless network to associate with. The choice is usually made based on the user's selection, whether a better selection is available or not for the given situation. BRIEF DESCRIPTION OF THE DRAWINGS Figure 1 depicts a diagram of an example of a system that includes a wireless network download mechanism. Figure 2 depicts a diagram of an example of a system for providing a list of prioritized networks for stations on a wireless network. Figure 3 depicts a diagram of an example of a system for generating temporarily adjusted prioritized lists of networks. Figure 4 depicts a diagram of an example of a system for monitoring network performance in a list of prioritized networks. Figure 5 depicts a diagram of an example of a system for using motion tracking to prioritize networks on a network map. Figure 6 depicts a diagram of an example of a system for using knowledge of subscriber network connections to prioritize lists of networks for subscribers. Figure 7 depicts a diagram of an example of a system for using performance history to customize a list of prioritized networks. Figure 8 depicts a diagram of an example of a system for selecting network connections based on network prioritization. Figure 9 depicts a conceptual view associated with an incentive network selection. Figure 10 depicts a diagram of an example of a system for offering incentives to a subscriber to connect to a network. Figure 11 depicts a diagram of an example of a system for repeatedly going through performance tests. Figure 12 depicts a diagram of an example of a system with wireless network download capability. Figure 13 depicts an example of a computer system in which techniques described in this document can be implemented. Figure 14 depicts a flowchart of an example of a method for offloading a prioritized wireless network. DETAILED DESCRIPTION
In the description that follows, several specific details are presented to provide a complete understanding of the modalities of the invention. A person skilled in the relevant technique will recognize, however, that the modalities of the invention can be put into practice without one or more specific details or in combination with other components, etc. In other situations, well-known deployments or operations are not shown or described in detail to avoid obscure aspects of various modalities.
A wireless download technique provides tools for a predetermined service provider to encourage or direct a subscriber to download from a first network to a second network. For the purpose of this introductory example, the service provider may be referred to as a cellular service provider, the first network may be referred to as a cellular network, and the second network may be referred to as a WiFi network. can use network data to determine wireless download priorities for cell phone subscribers based on an individual or group. In order to determine wireless download priorities, the cellular service provider may use wireless network data it has and / or wireless network data it obtains over networks from wireless devices (which can obtain network data of WiFi from signaling frames of WiFi networks or active scanning and which can report to the cellular service provider). Scan assignments can be given for each wireless device to ensure that the reporting task is shared between subscribers or adjusted to fill data gaps. With network data, the cellular service provider has the ability to generate lists of prioritized networks useful for wireless devices, either individually or in groups. These lists of prioritized networks can be represented as a network map.
Your cellular service provider can get more than just network data. For example, wireless devices can provide connection data, such as the likelihood that an authorization request will result in an eventual connection or the delay in granting access. The wireless device can print timestamps on certain data to enable the service provider to determine how the network or other relevant features may vary at, for example, time of day or day of the week. Other data may include the location of the wireless device, which can provide useful data for determining coverage zones for a service area with different performances and other characteristics. Using a combination of timestamp and location data, the server can extract motion tracking, or motion tracking can be explicitly provided by subscribers, which is representative of the speed at which a subscriber moves. All of this data can be useful for generating prioritized lists that are most useful for wireless devices.
The cellular service provider may also obtain subscriber-specific data. Some of this data may be available from a subscriber account or service plan parameters. Other data can be in the form of user preferences or performance history for a wireless device. The rules for adjusting network priorities may take into account a cost function with parameters that may vary in implementation, configuration or preference. Preferences can be encouraged in the form of offers to encourage subscribers to, for example, download from a cellular network to a WiFi network. Incentive offers may include offers to lower service costs or provide additional or improved services. Figure 1 depicts a diagram of a system 100 that includes a wireless network download mechanism 106. System 100 includes wireless devices 102-1 to 102-N (collectively referred to as wireless devices 102), wireless networks wire 104-1 to 104-N (collectively referred to as wireless networks 104), and a wireless network unloading mechanism 106.
Wireless devices 102 will include, at a minimum, a processor, memory (although memory can be implanted in the processor), a radio, and a radio interface (although the radio interface can be implanted as "part of the radio"). Wireless devices 102 will typically have at least one input device and at least one output device that include input and output interfaces, if applicable.
Wireless devices 102 can be deployed as stations. A station as used in this document can be referred to as a device with a medium access control (MAC) address and a physical layer interface (PHY) for the wireless medium that complies with, for example, the IEEE 802.11 standard . A station can be described "in accordance with IEEE 802.11" when compliance with the IEEE 802.11 standard is intended to be explicit (that is, a device acts as described in at least a portion of the IEEE 802.11 standard.) A person of common ability in the relevant art, you will understand what the IEEE 802.11 standard currently comprises and that the IEEE 802.11 standard may change over time, and it would be expected to apply the techniques described in this document in accordance with future versions of the IEEE 802.11 standard if an applicable change is made. done. IEEE Std 802.11 ™ -2007 (Revision of IEEE Std 802.11- 1999) is incorporated by reference. IEEE 802.11k- 2008, IEEE 802.lln-2009, IEEE 802.llp-2010, IEEE 802.llr- 2008, IEEE 802.llw-2009, and IEEE 802.11y-2008 are also incorporated by reference.
In alternative embodiments, one or more of the wireless devices 102 may comply with other standards or with absolutely no standard, and may have different interfaces for a wireless medium or another medium. It should be noted that not all standards refer to wireless devices as "stations", but when the term is used in this document, it should be understood that an analogous unit would be present on all applicable wireless networks. Thus, use of the term "station" should not be construed as limiting the scope of a modality that describes wireless devices as stations to a standard that explicitly uses the term, unless a limitation is appropriate in the context of the discussion.
Wireless networks 104 will typically include an internet unit (IWU) that interconnects wireless devices on one of the relevant wireless networks 104 with another network, such as a wired LAN. The IWU is sometimes referred to as a wireless access point (WAP). In the IEEE 802.11 standard, a WAP is also defined as a station. Thus, a station can be a non-WAP station or a WA station. In a cellular network, WAP is often referred to as a base station.
Wireless networks 104 can be deployed using any applicable technology that can differentiate in network type or in other ways. Wireless networks 104 can be of any appropriate size (for example, metropolitan area network (MAN), personal area network (PAN), etc.). Wireless broadband MANs may or may not conform to IEEE 8 02.16, which is incorporated by reference. Wireless PANs may or may not conform to IEEE 802.15, which is incorporated by reference. Wireless networks 104 can be identifiable by network type (for example, 2G, 3G, 4G, and WiFi), service provider, WAP / base station identifier (for example, WiFi SSID, base station and sector ID) , geographic location, or other identification criteria.
Wireless networks 104 may or may not be coupled via an intermediary network. The intermediary network can include virtually any type of communications network, such as, but not limited to, the Internet, a public switched telephone network (PSTN), or an infrastructure network (for example, private LAN). The term "Internet" as used in this document refers to a network of networks that uses certain protocols such as the TCP / IP protocol, and possibly other protocols such as the hypertext transfer protocol (HTTP) for markup language documents. hypertext (HTML) that make up the World Wide Web (the web).
In the example in Figure 1, the wireless network unloading mechanism 106 is coupled to the wireless device 102-1. In a specific deployment, the wireless network offload mechanism 106 is deployed to a server and is coupled to the wireless device 102-1 over the Internet. However, at least a portion of the wireless network download mechanism 106, described in more detail later with reference to Figure 2, can alternatively be deployed to the wireless device 102-1, with or without a connection to a server that includes another portion (e.g., a server portion) of the wireless offload mechanism 106.
In an example of operation, periodically, occasionally or when instructed, the wireless device 102-1 performs an available network characterization scan (ANCS) on one or more of the wireless networks 104. Other devices such as the wireless device 102- 2 or how another station may or may not also perform an ANCS. ANCS can be used to characterize performance available for each network (for example, data rate, bit rate variability, latency, latency jitter, quality of service (QoS), response time, etc.).
There are some objective criteria for measuring performance (for example, throughput). Intelligent network monitoring can enable real-time monitoring of network service usage (for example, at the level / packet layer, level / layer of network stack application interface, and / or application level / layer) of the network wireless (for example, radio access networks and / or core networks) and to effectively manage the use of network service to protect network capacity (for example, while still maintaining an acceptable user experience) . Techniques Assisted Device Usage Services (DAS) and, in some cases, techniques based on assisted network, to provide monitoring of device network service usage, network carriers / operators would provide greater insight into which devices, which users and what applications and when and where network congestion problems occur, enabling operators to intelligently add additional features to certain areas when needed (for example, offloading data traffic to femtocells or WiFi access points and adding more network features) network), differently control the use of network service, and / or to charge differently for use of network service based on, for example, a busy network state, to protect network capacity.
Performance need not be based solely on network performance. For example, a subscriber may be interested in economic performance (for example, price). Thus, in this document, performance is sometimes characterized by the use of a cost function that can include various parameters, including network performance, economic performance, reliability, and / or other parameters that are indicative of user preference or service provider. Where a particular type of performance is applicable, the meaning can be made explicit (for example, by referring to "network performance" instead of simply "performance") or can be extracted from the context.
The wireless device 102-1 generates an ANCS report using ANCS results in order to characterize the performance available for each network scanned from wireless networks 104. The ANCS report can also include an identification of networks currently available for the 102-1 wireless device, location, time, and potentially some performance characterization. The wireless device 102-1 makes the ANCS report available to the wireless network download mechanism 106. The wireless device 102-1 can also make device-specific information available, such as location, performance thresholds, a movement, knowledge of other devices or interference, a performance history, applications (for example, a VoIP application or streaming media), device-specific rules regarding when the device will connect to a network or download (for example , based on reliability, performance state, congestion state, QoS, incentive state, et al.), or a cost function (for example, based on signal strength, channel strength, basic bit rate of radio, network speed, network transfer rate, speed jitter, transfer rate jitter, network delay, delay jitter, network availability, standing network reliability percentage of access concession, network reliability in delay in granting access, variation in performance as a function of position, et al.). Alternatively, some device-specific information may or may not be shared with the wireless network download mechanism 106, and used to customize a priority list or multidimensional network map that is generated or received on the wireless device 102-1. The wireless network download mechanism 106 generates a multidimensional network map from the ANCS report and / or other data that is known to the wireless network download mechanism 106. The wireless network download mechanism 106 can provide the multidimensional network map for the wireless device 102-1, from which the wireless device 102-1 can generate or modify a set of wireless operating instructions. Alternatively, the wireless network download mechanism 106 can generate a set of instructions from the multidimensional map, which makes it available to the wireless device 102. The set of instructions can be the implementation of a general algorithm that is customized by the wireless device 102-1 after it has been received, or the instruction set can be generated specifically for the wireless device 102-1 or a set of devices that includes the wireless device 102-1, to be run on the device according to device-specific parameters (eg power saving settings, location, time of day, etc.). Advantageously, the wireless device 102-1 has the ability to use the instruction set to enable intelligent downloading of the wireless device 102-1 from one of the wireless networks 104 to another. In some embodiments, the wireless device 102-1 has the ability to modify the multidimensional network map before making a network selection decision. The wireless network unloading mechanism can provide one or more parameters and / or algorithms for the wireless device 102-1 to make the network selection decision.
Differentiated network access control to protect network capacity includes applying policies to determine which network a service activity is connected to (for example, 2G, 3G, 4G, home or roaming, WiFi, cable, DSL, fiber, Wired WAN, and / or other wired or wireless access network), and application of differentiated network access control rules (for example, traffic control rules) depending on which network the service activity is connected to. In some embodiments, differentiated network access control to protect network capacity differently includes the control of network service usage activities based on the service usage control policy and a user input (for example, user selection or user preference). Depending on the deployment, the network service usage control policy may consider the availability of alternative networks, policy rules for selecting alternative networks, network busy state or availability status for alternative networks, specific network selection or network policies. preference for a given network service activity or set of network service activities, to name a few.
In a specific deployment, wireless device 102 assists in determining (for example, measuring and / or characterizing) a busy network state experienced by the device (for example, which can be used to determine network access control policy for one or more network capacity controlled services). For example, the network busy state experienced by the device can be recorded by the device and included in a network busy state report that is sent to a network element / function (for example, a wireless network offload mechanism 106 as described in this document). The network busy status report can include, for example, data rate, average transfer rate, minimum transfer rate, transfer rate jitter, latency, latency jitter, bit error rate, data error rate , packet error rate, packet drop rate, number of access attempts, number of successful accesses, number of unsuccessful accesses, QoS level availability, QoS level performance, variability in any of the previous parameters, and / or the historical statistics of any of the previous parameters, to name several as an example. The network busy status report can include, for example, 2G, 3G, 4G or WiFi base station ID, SSID, cell sector ID, CDMA ID, FDMA channel ID, TDMA channel ID, GPS location, and / or physical location to identify the edge network element that is associated with the network busy status report for a network element, to name several as an example. In a specific deployment, the network busy state is monitored by one or more network elements that can measure and / or report the network busy state (for example, wireless network download mechanism 106, BTS, BTSC, base station monitor, and / or air wave monitor).
As an exemplary enlightening example, wireless device 102 (for example, network performance characterization software or hardware agent on the device) acts in conjunction with a network element (for example, a wireless network download mechanism 106) to characterize the network busy state of an alternative network access point or base station resource. In such modalities, the device can detect an available alternative network, connect to a network element (for example, a wireless network download mechanism 106) via the alternative network, conduct a download and / or upload transfer sequence , during which network performance is monitored, and causes performance to be characterized and recorded. Performance can be characterized by the network element (for example, a wireless network download mechanism 106), the wireless device 102 (for example, network performance characterization software or hardware agent), or both.
As another enlightening modality, wireless device 102 (for example, network performance characterization software or hardware agent on the device) can detect an available alternative network, connect to the alternative network, allow the user to use the connection network services, monitor the resulting network performance and record performance results.
In a specific deployment, one or more of the wireless devices that use wireless services on one or more core networks and / or alternate networks are used as described in this document to collect alternate network performance, busy state and / or state information of QoS.
In a specific deployment, the main networks and / or alternative networks can be monitored and characterized by devices that are permanently located in the vicinity of one or more base stations of alternative network or access points and configured to communicate with a download mechanism. wireless network 106. A permanently located mobile terminal can provide network monitors to report, for example, busy network status, to a central network element, such as the wireless network download mechanism 106, which can, for example , aggregate such network busy state information to determine the network busy state for one or more network coverage areas.
For example, air wave monitors and / or base station monitors can be provided to facilitate reliable characterization of the network busy state in a coverage area of one or more base stations and / or base station sectors and / or WiFi access points, such as attached mobile terminals (for example, trusted terminals that may include additional network busy state monitoring and / or reporting functionality) installed (for example, temporarily or permanently) in the coverage area of one or more base stations and / or base station sectors (for example, where a sector is a combination of a directional antenna and a frequency channel) so that mobile terminals perform network busy status monitoring and reporting for the wireless network offload 106, the local base station and / or other network / function element (s). In some embodiments, mobile terminals permanently attached provide network monitors to report, for example, the network busy state (or performance, reliability or QoS), to a central network element, such as the wireless network offload mechanism 106 , which can, for example, aggregate such network busy state information to determine the network busy state for one or more network coverage areas. In some modalities, mobile terminals are always present in those locations where they are installed and always activated (for example, by performing network monitoring), and can be trusted (for example, mobile terminals can be loaded with various hardware credentials and / or software). For example, using mobile terminals, reliable characterization of network busy state can be provided, which can then be reported to a central and aggregated network element to perform various techniques related to network busy state as described in this document in various modalities.
In a specific deployment, the wireless offload mechanism 106 uses the network busy status report (or performance reports or QoS reports) from user devices and / or permanent mobile terminals connected to the same alternative network for determine the network busy state for an alternate network edge element connected to the device.
In some embodiments, the network element / function (for example, a wireless access point or base station) sends a busy status report for the network edge element to the device (for example, and to other devices connected to the element network edge), which the device can then use to implement differentiated network access control policies (for example, for network capacity controlled services) based on the busy state of the network. In some embodiments, a busy network state is provided by a network element (for example, wireless network download mechanism 106 or service cloud) and broadcast to the device (for example, in secure communication with the device wireless 102).
In some embodiments, wireless device 102 (for example, network performance profiling software or hardware agent) selects the access network connection according to a network service profile setting that determines which network the device you should choose among the available WWAN, WLAN, WPAN, Ethernet and / or DSL network connections. This choice can be based on performance, reliability, busy state or QoS capability of one or more alternative networks. The characterization of alternative networks can be based on end-to-end performance, not just radio or air frequency performance. For example, the service profile settings may be based on the performance of the actual access network (e.g., home DSL / cable, coffee shop, shopping center, public WiFi access point, or work network) behind the WiFi and not in the fact that it is WiFi (for example, or any other network, such as DSL / cable, satellite, or Tl), which is seen as different from a WiFi network in the cafeteria. For example, in a WiFi access point situation where there is a significant number of users on a standby DSL or Tl, the wireless network offload mechanism 106 can be based on a service provider cloud or an MVNO cloud , control services may be provided by a VSP capability offered by the service provider, or the wireless network download mechanism 106 may belong to the access point service provider that uses the wireless network download mechanism 106 by alone without any association with an access network service provider. Figure 2 depicts a diagram of an example of a system 200 for providing a list of prioritized networks for stations on a wireless network. In the example in Figure 2, system 200 includes a network 202, a point of presence (PoP) 204, a network switch 206, wireless networks 208-1 to 208-N (collectively referred to as wireless networks 208) , and a communications service provider (CSP) 210. Wireless network 208-1 includes a WAP 212 and, in operation, stations 214-1 to 214-N (collectively referred to as stations 214). The CSP 210 includes a mechanism for providing a list of prioritized networks 216.
Network 202 can include any applicable network that is capable of coupling station 214-1 to CSP 210. PoP 204 is coupled to network 202. The term "PoP" is often used to refer to a PoP on the Internet. However, the term as used with reference to Figure 2 means a PoP on network 202, regardless of the type of network. The network switch 206 can be referred to as a wireless network switch because it couples the WAP 212 to a (typically) wired network, such as a LAN. The term "WAP" is often used to refer to the AP station on an IEEE 802.11 compliant network. However, the term should be constructed to include the relevant node when the wireless network makes use of another access technology (for example, the term "base station" is often used to refer to a cellular network's access node) . In some cases, one or more of PoP 204, network switch 206, and WAP 212 can be colocalized.
Wireless networks 208 may be of a convenient or known and applicable type of wireless network. The basic service set (BSS) is a term used in IEEE 802.11 to refer to a group of stations that communicate with each other. The basic service area is defined by the propagation characteristics of the wireless medium. (Note: the term "area" is typically used to describe the three-dimensional space of a basic service area). A station in the basic service area can communicate with other stations in the BSS. A BSS with a WAP, as described in the example in Figure 2 for wireless network 208-1, can be referred to as an infrastructure BSS. To avoid confusion with the acronym IBSS which refers to an independent BSS (also known as an a hoc BSS), an infrastructure BSS is not referred to as an IBSS. An infrastructure BSS is defined by the distance from the WAP; so that stations 214, which are all on the 208-1 wireless network, are within the range of WAP 212 (as illustrated by stations 214 which are portrayed as being inside the cloud associated with the 208-1 wireless network) . In an infrastructure BSS, stations have to associate with a WAP to obtain network services. Stations typically initiate the process and the WAP decides whether to grant or deny access based on the content of an association request. Although this process is described in the context of the IEEE 802.11 language, a similar description is applicable to other wireless networking technologies.
The 208-1 wireless network is contained in size by the range of WAP 212, although multiple WAPs (not shown) can be used to increase the size of the 208-1 wireless network. A set of extended services (ESS) can comprise multiple BSSs, each connected to a main support network. All WAPs in an ESS are given the same service set identifier (SSID), which can be considered to be the "name" of the wireless network. The degree to which basic service areas overlap in an extended service area is specific to deployment and / or technology. The WAP 212 may or may not support multiple wireless networks with the same radio. Within WAP 212, each SSID should be associated with a virtual LAN (VLAN). A relatively common implementation of this is when the WAP 212 supports a guest network (a first VLAN) and a (a second VLAN). Stations 214 would likely see two separate networks in the radio domain. Thus, wireless networks 208 may or may not have separate WAPs. A WAP that supports multiple networks may or may not have the same range for each network, particularly if the broadcast power or frequency bands are different (for example, a WAP could be compatible with 802.11a and 802.11b / g).
In the example in Figure 2, stations 214 are within a service area of wireless networks 208. As shown by way of example, some of the stations, for example, station 214-N, may be within the service area of a different wireless network, for example, wireless network 208- N, from other stations 214. Stations 214 can send information about a subset of wireless networks 2 08 if stations 214 are in the respective service areas of wireless networks 208 By subset, the intention is that, depending on the deployment or station capabilities, a station may or may not send information about all wireless networks 208 whether they are in their respective service areas, and may or may not send information about any one of the wireless networks 208. Depending on the deployment or station capabilities, a station may or may not send information about a network when it is no longer in the wireless service area, such as when a WAP failed the or the station leaves the service area. As shown by way of example, station 214-1 is in the service area of wireless networks 208-1 and 208-2. So that station 214-1 can send information about wireless networks 208-1 and 208-2, or wireless network 208-1 or wireless network 208-2, or none of the wireless networks 208-1 and 208-2; station 214-1 may or may not also send information about the 208-N wireless network, for example, based on historical data, data received from station 214-N, or data received from another source, even that station 214-1 is not within the service area of the 208-N wireless network.
Stations 214 are operationally connected to CSP 210 via WAP 212. Where CSP 210 is part of a corporate network that includes wireless network 208-1, stations 214 may or may not actually be coupled to CSP 210 through PoP 204 because the CSP 210 could be on the main wired support network to which the WAP 212 is connected. However, this observation does not make it difficult to understand the example in Figure 2 for a person of ordinary skill in the relevant technique.
CSP 210 may be part of a public or private entity in, for example, telecom (land line or wireless), Internet, cable, satellite, and / or managed services businesses. CSPs often specialize in an industry, such as telecommunications, entertainment and media, and Internet / Web services, although service providers can operate in multiple areas. While it is likely that the CSP would have the ability to better deploy the 216 prioritized network list provisioning mechanism due to the data available to the CSP, it is also possible to offer the 216 prioritized network list provisioning mechanism through a service provider application (ASP), if sufficient data is provided to the ASP either from stations or CSPs, or perhaps from a managed service provider (MSP) that provides services on behalf of the CSP or another entity. Alternatively, the 216 prioritized list provisioning mechanism could be deployed on a private network, or on another server.
In the example in Figure 2, it is assumed that stations 214 are known to CSP 210. If CSP 210 provides services for each of stations 214, CSP 210 may have account information associated with each of stations 214, you may be aware device-specific data (for example, roaming, bandwidth consumption, application usage, etc.), and can receive additional information associated with stations 214 and / or networks near stations 214 over time. How stations 214 are known and what information is made available to the CSP 210 may depend on the deployment. For example, the CSP 210 can be controlled by a wireless mobile communications company that provides cellular services to the activated stations 214, for example, a 4G network. (As mentioned earlier, some services could be provided through an ASP; so it should be borne in mind that this is simply an example and it should be understood that other applicable deployments have appropriate variations).
In the example in Figure 2, the prioritized network provisioning mechanism 216 provides a list of prioritized networks for stations 214, which are represented in the example in Figure 2 by a dashed line 218. The list does not need to be identical for one of the stations 214. For example, the prioritized network list provisioning mechanism 216 could customize the list sent to station 214-1 based on account parameters, current device-specific parameters, or device-specific history parameters. Alternatively, the list sent to each of stations 214 could be customized (or not) at stations 214.
The prioritized list can be provided through an applicable channel. For example, the prioritized list provisioning mechanism 216 could push the prioritized list to a station over a cellular network provided by a company that controls the CSP 210, over a public network outside the company's control, through a private network, or through another channel. The station could also pull the prioritized list from the 216 priority network list delivery mechanism. While it is likely that the priority list will be provided over a wireless network periodically or as needed, it is also possible to provide the priority list in advance, which means that it could, for example, be provided when a wireless device is wired to a computer that was provided or can get the prioritized list.
Advantageously, the prioritized list may include information that is not available to stations 214 at a given point in time. For example, stations 214 can perform a passive scan of nearby network service areas. Stations 214 can sort the list of applicable wireless networks based on, for example, an received indicator signal strength (RSSI) for each of the wireless networks. This type of list is referred to in this document as a "classified list", which means that a list has been classified according to a current key value. However, certain data is not used when sorting the list of wireless networks. Certain data can be categorized as "historical data", which is data previously obtained about the characteristics of a subset of wireless networks, and "data obtained remotely" which is data that one or more of the 214 stations did not collect on their own . (Data collected by a station can be referred to as "locally obtained data") A "prioritized list" is defined as a classified list that has been further classified using data obtained remotely and / or from history. When it is desirable to explicitly indicate the type of prioritized list, the prioritized list can be referred to as a prioritized list historically and contemporaneously, a prioritized list remotely and locally, or (when both types are used to create the prioritized list) a historically prioritized list and contemporaneously, remotely and locally. A prioritized list that can include any of these types is referred to as a "prioritized list". Advantageously, stations 214 may use a prioritized list that is provided from the prioritized network list provisioning mechanism 216 to guide network association behavior.
Stations 214 can obtain data by scanning. Passive scans can identify wireless networks that use signaling frames, which will include some information about the wireless network. Active scans can usually get more data than a passive scan. The obtained data can be used to modify the prioritized list. In a modality in which a station can generate its own prioritized list (in addition to (or instead of) receiving the prioritized list from the prioritized network provisioning mechanism 216 in CSP 210, for example), the station will use historical data accumulated by scanning, and additional remotely obtained and / or historical data could be provided through a server or other source.
In an example where stations 214 are served by CSP 210 or another communication service provider, CSP 210 can optimize capacity for stations 214 as a group. The capacity for stations 214 can be optimized for stations as a group by CSP 210 which has information about networks 208 and who decide on a prioritized list for each of stations 214 resulting in stations 214 choosing to associate with stations. networks 208 so that stations 214, on the whole, perform better. The CSP 210 can take into account network loading on the 2 08 networks when generating the prioritized lists provided by the prioritized network list provisioning mechanism 216 for stations 214. In this way, the CSP 210 can determine which of the networks 208 has the widest available bandwidth, and can optionally determine what the loading of networks 208 will be after stations 214 make use of the prioritized lists. Advantageously, the CSP 210 can use the current network load to predict the load on networks 208 based on data provided by stations, historical data, and prioritized lists that have not yet been sent. The CSP 210 can also consider station-specific data, such as the applications being used, QoS requirements, history of bandwidth consumption, a cost function, etc., when determining how to generate the prioritized lists.
Stations 214 may have a network optimization mechanism (not shown) in which an algorithm is implemented to optimize capacity. The network optimization engine can reorganize a prioritized list based on specific device parameters and / or user preferences. Figure 3 shows a diagram of an example of a system 300 for generating temporarily adjusted prioritized lists of networks. In the example in Figure 2, system 300 includes a network interface 302, a network statistics data store 304, a network statistics characterization mechanism 306, a subscriber data store 308, a subscriber 310, a time adjustment mechanism 312, and a priority list generation mechanism 314.
The network interface 302 is intended to include a convenient or known interface applicable to a network. The network interface 302 can have a variety of deployments, including a network interface card (NIC), a modem, or other technology that facilitates interconnection with a network.
The 304 network statistics data store and other data stores described in this document can be deployed, for example, as software embedded in a computer-readable medium on a general or specific machine, in firmware, in hardware, a combination thereof, or an applicable known or convenient device or system. Data stores in this document are intended to include any organization of data, including tables, comma-separated value (CSV) files, traditional databases (for example, SQL), or other applicable or known or applicable organizational formats. Components associated with data storage such as database interfaces can be considered as "part of" a data store, part of another system component or a combination of them, although the physical location and other characteristics of components associated with storage data are not critical to understanding the techniques described in this document.
The network statistics data store 304 can store network statistical data structures. As used in this document, a data structure is associated with a particular way of storing and organizing data on a computer so that it can be used efficiently within a given context. Data structures are generally based on a computer's ability to obtain and store data anywhere in its memory, specified by an address, a string of bits that can itself be stored in memory and manipulated by the program. Thus, some data structures are based on computing the addresses of data items within the structure itself; while other data structures are based on storing data item addresses within the structure itself. Many data structures use both principles, sometimes combined in non-trivial ways. The implementation of a data structure usually entails writing a set of procedures that create and manipulate situations in that structure.
The network statistics data store 304 can store data structures that have data that is received from or derived from stations on a network. The amount of data a station can obtain and provide to the 3 00 system will depend on the station's capabilities, the type of network, device-specific settings (for example, active scan settings), and other factors. Data can include values such as RSSI, channel strength, basic radio bit rate, loading, network speed, network transfer rate, speed jitter, transfer rate jitter, network delay, delay jitter, availability network, successful network access grant, delay in granting access, location, to name a few. The network statistics data store 304 can store data from a plurality of stations to create a data store obtained remotely. Over time, the 304 network statistics data store can obtain a large store of historical data.
The network statistics characterization mechanism 306 can use network statistics to characterize networks. For example, the network statistics characterization mechanism 306 can, for example, analyze location and RSSI to determine a variation in performance as a function of position, analyze data for granting access to determine a probability of granting access, analyze the number of stations associated with a network, applications in use at the stations, and the capacity of a network to determine the capacity available for the network or the like. Thus, the network statistics characterization mechanism 306 can take standard network measurements, combine network measurements with network history data and network data that is obtained remotely from a particular station and transform network statistics in a more useful way. The characterized network statistical data structures can be stored in the 304 network statistics data store (an arrow indicating that such storage is not shown in the example of Figure 3 in order to avoid interruption in the illustrative flow).
When the 300 system is on a private network managed by a service provider (for example, a mobile service provider), subscribers typically have an account. The subscriber data store 308 can store data structures (or subscriber data structures). Advantageously, account data structures can include data that is useful for generating prioritized lists. For example, an account may include cost function parameters that are indicative of when a subscriber would like to download from one network to another. Such data can be used to customize a list of prioritized networks for a particular subscriber. As another example, an account could include performance or favored network preferences that enable network prioritization based on subscriber preferences. As another example, the 308 subscriber data store could include a useful motion tracking to predict movement between coverage areas. It should be noted that some or all of the contents of the 308 subscriber data store could instead be stored on a device, and the prioritized list could be customized based on specific device settings, movement (for example, tracking motion) or the environment.
The subscriber-specific characterization mechanism 310 can use subscriber-specific data to modify network list priorities. For example, a subscriber can indicate which applications are used on a mobile device. The subscriber-specific characterization mechanism 310 can determine from the applications which networks are most desirable given the operational parameters of the application.
As another example, if a motion tracking suggests that a subscriber is on a train because it is moving relatively fast, the subscriber-specific characterization mechanism 310 can strongly prioritize a cellular network over a short-range network (e.g. WiFi). "Relatively fast" means that the subscriber moves at a rate that suggests that delivery from one network to another will be required with relatively high probability due to the subscriber's movement. It is possible for motion tracking to show a relatively high speed, but a relatively low risk of delivery (for example, if a subscriber is on a merry-go-round). Delivery from one access point on a network to another access point on the same network is probably not as much of a concern as delivery from one type of network (for example, WiFi) to another type of network (for example, example, cellular) or from two different networks of the same type (for example, a first private WiFi network and a second private WiFi network). The motion tracking itself can be considered as a specific subscriber characterization in the sense that the subscriber data store 308 can receive location data from, for example, a subscriber's mobile device, and the specific characterization mechanism subscriber 310 can determine the speed of change in location over time to determine whether the subscriber is moving relatively very fast.
The time adjustment mechanism 312 can adjust network priorities based on, for example, time of day. For example, if the 304 network statistics data store has historical data that shows that certain networks have high loads at certain times of the day, the 312 time adjustment mechanism may prioritize networks that have lower loads in the near future. The time adjustment mechanism 312 can also change priorities using data from the subscriber data store 308. For example, if a subscriber indicates that he has a preference for not switching networks once associated, the time adjustment mechanism 312 can use subscriber activity history to determine a likely amount of time the subscriber will be connected to a network and network history data to determine probable loads on multiple networks during that time and prioritize networks like the one the subscriber can be connected to a network that will meet the minimum performance preferences for the duration of the connection.
During the period when the subscriber data store 308 is on a client device, the time adjustment mechanism 312 could provide time-based priorities and the client device could customize the list of prioritized networks. In an alternative deployment, the time adjustment mechanism 312 is on the client device and the client device receives the prioritized lists that are different at different times, then the 312 time adjustment mechanism customizes the prioritized list (or chooses the appropriate one) based on the current time. The prioritized network list generation mechanism 314 generates a list of networks according to the network statistics characterization mechanism 306 and, if applicable, the subscriber specific characterization mechanism 310 and time adjustment mechanism 312. The list of networks Prioritized networks can be provided for devices via the 302 network interface.
Advantageously, system 300 can characterize available capacity statistics for a network and determine how much reliable capacity is typically available (if any) on that network. This is achieved by having devices that report network data, for example, how many devices are connected to the network, and by prioritizing the network to which one or more devices will connect or disconnect from the network based on an algorithm to optimize ( for example, average, worst case, median, etc.) capacity offered to a group of devices served by the 300 system. The algorithm can take into account the account load of one or more alternative networks before sending the list of prioritized networks or instead communicate with a device to connect to or disconnect from the network. The 300 system can thus characterize statistics of available capacity and provide lists of prioritized networks with reliable capacity as a function of time to
adjust an available capacity factor. This technique is applicable to one or more devices optimized in the whole. Figure 4 depicts a diagram of an example of a 400 system for monitoring the performance of prioritized network lists. In the example in Figure 4, system 400 includes a radio interface 402, a radio 404, a geo-location mechanism 406, a data store of geographically prioritized networks 408, a geo-analysis connection mechanism 410, a data store performance threshold 412, a selective network monitoring mechanism 414, and an ANCS 416 reporting mechanism.
In the example in Figure 4, radio interface 402 includes sufficient known or convenient technology applicable to enable a wireless device to use a radio to connect to a wireless network. Devices that use something other than a radio are theoretically possible; the term "radio interface" is used with the understanding that the communication device may or may not be limited to a specific subset of the electromagnetic spectrum (EM), that is, radio waves. The radio interface 402 may include multiple interfaces for use with multiple radios and / or different radio frequencies or wireless protocols.
In the example in Figure 4, radio interface 402 is coupled to a radio 404. Radio 404 can include multiple radios for use with different radio frequencies or wireless protocols. For the sake of illustrative simplicity, radio 044 will generally be treated as if it operated consistently on one channel (potentially with multiple subchannels). Alternatively, the radio 404 can send reports or scan on one frequency and send / receive other communications on another frequency.
In the example in Figure 4, geolocation engine 406 receives a prioritized list and modifies the list using a device location. The geolocation mechanism 406 can use location to determine which networks should be included in the list of networks and what should be the priorities for the networks. In a specific deployment, the geolocation mechanism 406 can be used in conjunction with a server that sends a prioritized geographic list that the geolocation mechanism 406 customizes on the device. For example, the server can send a prioritized geographic list to a geographic area that the geo-location engine 406 can adjust or use according to current device location and / or motion tracking. Geographic prioritization can be according to the cost function, where the parameters of the cost function vary depending on location (for example, network performance may vary as a function of position).
Alternatively, the 406 geo-location engine could be deployed on a server and used to generate geographic lists of prioritized networks for delivery to subscribers. Using known device locations, the server can, depending on the deployment, send a geographic list of prioritized networks to a local geographic area close to the device or to geographic areas that have been historically frequented by the device.
In the example in Figure 4, data storage for geographically prioritized networks 408 includes network data structures that are organized by priority, where priority determination includes a device location consideration. A prioritized list could be stored as data structures in the data storage of geographically prioritized networks 408 initially and data structures transformed later according to geographic location data, or the data structures could be generated with the relevant priority. In either case, when device location changes sufficiently, the geographical priority will change and the data structures can be transformed (or new data structures generated) to have the updated geographical priority.
In the example in Figure 4, the geographic analysis connection mechanism 410 uses the geographic list of prioritized networks stored in the data store of geographically prioritized networks 408 to instruct radio 404 to connect to a higher priority network that is available. Alternatively, the geographic analysis connection mechanism 410 could form a connection using the prioritized list as received from a server and uses the geographic list of prioritized networks for subsequent connection determinations. As noted earlier, it is also possible that the 406 geo-locating mechanism could be at least partially located on a server and the prioritized list could include the device location when prioritizing the network list.
As the device location changes, the network performance can also change. The geographic analysis connection engine 410 can determine whether a performance has fallen below a performance threshold using the performance threshold data store 412. When performance falls below the performance threshold, the geographic analysis connection mechanism 410 can connect to a second network. The second network may be the next network in the geographic list of prioritized networks. It can be seen that the geo-locating mechanism 406 can update the data storage of geographically prioritized networks 408 so that network priorities change while a device is connected to a first network. Thus, when performance falls below the performance threshold, the geographic analysis connection engine 410 can use the updated geographic list of prioritized networks to find a higher priority network that is available and instruct the 404 radio to connect to it . Thus, the second network may or may not be the next highest priority network in the prioritized geographic list when the connection to the first network has been established.
Advantageously, the performance threshold setting can prevent frequent jumps between networks. Even if a second network has a higher geographical priority than a first network to which a device has a current connection, it may or may not be desirable to switch, because of the risk of switching from side to side as performance fluctuates to the next. first and second networks (or other). Thus, the performance threshold can be indicative of a performance that is "good enough" even if the expected performance of a second network exceeds the performance of the first network.
The performance threshold can be adjusted dynamically. While it is desirable to avoid frequent jumps between networks, a change in location can result in significantly higher performance on a second network. Even if the performance in the first network is "good enough" the expected performance of the second network can be sufficiently superior so that the desire to avoid frequent skips is obscured by the potential improved performance of the second network. Thus, the performance threshold may be a function of current performance on a first network and an expected performance of a second network in addition to or instead of a performance threshold network switching preference.
When the performance threshold takes into account the performance of a first network to which a device is connected and a performance of a second network, the performance parameters of the first network and the second network need not be the same. For example, the performance of the second network could include an access grant reliability parameter and an expected delay in an access grant parameter, although none of these parameters are used to characterize the performance of the first network. Other parameters may or may not be considered for the characterization of both networks (for example, post-connection network performance parameters or economic performance parameters).
In the example in Figure 4, the selective network monitoring mechanism 414 can monitor networks other than the first network to which a subscriber is connected. Monitoring can include passive scans, which result in listening to signaling frames (or equivalent transmissions) from a WAP. The information available from signaling boards depending on the specific network variables. Active scanning typically produces more network information, but consumes more resources (for example, wireless bandwidth, battery power, etc.).
The selective network monitoring mechanism 414 can monitor networks that are in the geographic list of prioritized networks. Not all networks are necessarily treated equally when determining which to monitor, which is why the 414 selective network monitoring mechanism is called "selective". For example, a prioritized list could indicate a preference for monitoring certain networks (not necessarily based on the priority of the network). Selective monitoring of certain networks may be in order to limit the number of networks scanned by each of a plurality of devices that are relatively close to each other, to check on a network that has been marked as having poor performance to see if performance has changed, to keep the device abreast of high priority networks in the event that the performance of a current network falls below a performance threshold, to obtain additional information about a network or the like.
The selective network monitoring mechanism 414 can work in coordination with the geographic analysis connection mechanism 410. For example, selective monitoring can be for networks that are high on the priority network geographic list in order to maintain network priorities o updated as possible. The selective network monitoring mechanism 414 can also ensure that a dynamic performance threshold is updated with the most current network data. The date of the selective network monitoring can be used on the device or sent to a server and provided in the form of a prioritized list after processing on the server.
The ANCS 416 reporting engine generates reports from the ANCS of the 414 selective network monitoring engine. The ANCS 416 reporting engine provides the ANCS reports to radio 044 for transmission through the radio interface 402 to a server . The server can ensure that future prioritized lists are relatively current and that, assuming that an indication is provided by the server rather than derived from rules on the device, selective network scan indicators allow the device to scan networks in coordination with other devices or at least without wasting resources by providing less useful data in relation to networks compared to more useful data that the server could use to more effectively prepare lists of prioritized networks for subscribers.
Advantageously, system 400 provides location data and ANCS reports to a server to generate lists of prioritized networks using location and ANCS reports to the device sending the ANCS report and other subscribers (regardless of whether other subscribers also send ANCS reports). The CSP 210 in Figure 2 could, for example, include such a server.
Advantageously, the 400 system can customize prioritized network lists using a current device location. For example, the 406 geo-locating engine can customize lists of prioritized networks for a large geographic area according to the current device location, a motion tracking (eg, future location predictor), or knowledge regarding the history of network connection preferences. Alternatively, geolocation mechanism 406 may receive a list of networks prioritized for a local geographic area dependent on a current device location and / or history of network connection preferences. Alternatively, the geo-location mechanism 406 can choose between multiple network maps of the local geographic area according to a current device location and / or history of network connection preferences.
Advantageously, the 400 system allows selective monitoring of networks in a list of prioritized networks to identify networks that are best for a device to connect in a given geographic area. A device can apply rules in place to determine an optimal network using a list of prioritized networks. The device can also selectively scan other networks to update the list of prioritized networks according to what is found. This can benefit both the device and other subscribers.
Advantageously, system 400 can reduce the likelihood of frequent hopping from one network to another as the network priority list changes or performance on a given network fluctuates over time. The 410 geographic analysis connection mechanism can ensure that a device remains connected to a network until performance falls below the minimum performance threshold. Figure 5 depicts a diagram of an example of a 500 system for using motion tracking to prioritize networks on a network map. In the example in Figure 5, system 500, a location detection mechanism 502, a location data storage 504, a location tracking generation mechanism 506, a location tracking data store 508, a reporting mechanism location tracking 510, a radio 512, a radio interface 514, and a location tracking application mechanism 516.
In the example of Figure 5, the location detection mechanism 502 has the ability to determine a current location for a device. Although in this document, the location of the device is treated as a known value, it should be understood that location detection is often an estimate of current location. For example, a GPS System does not always have the ability to accurately determine location. As another example, three WAPs could detect three signals that have three different signal strengths from the device and determine the location based on distance, for example, which the RSSI seems to indicate, but this triangulation technique is typically quite inaccurate. However, any applicable known or convenient location estimation technique, regardless of its accuracy, may be sufficient if it is sufficiently accurate to enable the application of the techniques described in association with location detection in this document.
In the example of Figure 5, the location detection mechanism 502 stores the location detected in the location data store 504. The data structures of the location data store 504 can be as simple as coordinates in two-dimensional or three-dimensional space. It can be seen that although networks have ranges that extend into three-dimensional space, it can be useful to simplify to a two-dimensional space (typically as an overlay on land or a floor of a building). More important than whether a Z axis component (altitude) is recorded is a date and time stamp for a given location. Thus, a minimalist location data structure will include an X-axis component (for example, longitude), a Y-axis component (for example, latitude), and a timestamp, and a useful variant may include a Z axis component (for example, altitude). The units of the geometry axis components do not need to be the same. For example, the X and Y axis components could be GPS coordinates and the X axis component could be in feet (or meters) or a more abstract value, such as floors in a building.
In the example in Figure 5, the location tracking generation engine 506 can use location history data to determine changes in location over time. By comparing the location associated with a first timestamp to a location associated with a second timestamp, it is possible to determine the speed as well as the distance.
The speed can be recorded in a vector data structure in the location tracking data store 508. As is true for the data stores described in this document in general, the location data store 504 and the data store of 508 location tracking can be deployed as the same data store. For example, the locations estimated by the location detection mechanism 502 could be stored as nodes, and vectors calculated by the location tracking generation mechanism 506 could be stored as borders between temporarily adjacent nodes, in a single data store. Alternatively, edges could be calculated directly so that only the nodes, with timestamps, would be stored in non-volatile memory. The location tracking reporting engine 510 can generate a report for a server. The report content may vary somewhat based on the deployment, but a minimum report will include at least the current device's location and a date and time stamp. The server may or may not have the ability to generate location tracking, which means in an alternative that at least a portion of the 506 location tracking generation mechanism may be located on a server. The radio 512 can send the location tracking report via the radio interface 514 to a server. In response to receiving the location tracking report, the server can provide a network map. Alternatively, the server does not need to receive location tracking in order to provide the network map; therefore, the network map is not provided in response to receiving location tracking. The network map can be generated using ANCS reports from the device or from other devices. The network map may or may not be customized on the server using device location tracking.
The network map is a multidimensional map of networks to which the device can connect. Dimensions can include two or three spatial dimensions, time, network continuity, station speed, device-specific history, or other parameters. Advantageously, the network map can be combined with specific device characteristics to enable intelligent and reliable switching to or from wireless networks represented on the network map.
In the example in Figure 5, the location tracking application engine 516 can use the network map and location tracking to choose a network to connect from the network map. Specifically, the 516 location tracking application mechanism can use motion tracking to predict movement into or out of network service areas, and select networks that are appropriate for the anticipated movement. The additional processing of location tracking in addition to a speed determination can be useful. For example, high speed followed by a short rest period may be indicative of car travel, followed by a stop at a traffic light. In such a case, it may be desirable to avoid unloading even while the subscriber is stationary. As another example, a connection history could be used to show that through some locations it typically passes very quickly (for example, a subscriber can walk to work in certain areas, making certain networks unusable targets for offloading due to the likelihood that the subscriber will continue through the network relatively soon).
In a specific deployment, the network map can include zones of reliable coverage, which can be continuous or discontinuous. Thus, the 516 location tracking application mechanism can use a network map of trusted networks and the location (or location tracking) of the device to remove networks whose coverage the device enters and exits faster than a reliability threshold. The data storage reliability threshold 518 can store a data structure that can include subscriber or service provider preferences to determine how quickly to download after a pause or slow movement to another network. If the location tracking speed exceeds the reliability threshold, the device will not discharge to certain networks (for example, short-range networks).
As previously mentioned, the 516 location tracking application mechanism can make use of other information, such as connection history for a subscriber, activity that is indicative of being in a car or on a public transport, etc. to use constructive speed in determining. Thus, even if a subscriber's actual speed is zero (for example, when the subscriber is on a stop signal), the constructive speed may have a higher value representative of the expected future speed. Constructive speed can also be "network speed" found by adding vectors over a period of time like moving from side to side (for example, if a subscriber is pacing back and forth). That is, the absolute speed, or speed, of a subscriber in a relatively short period of time may not be as significant as the network speed by way of comparison for the reliability threshold.
When location tracking is applied to the network map to find a higher priority network to which the device can connect, radio 512 can be instructed to authenticate and associate with the chosen network. Thus, offloading from one network to another can be achieved using a device location tracking and a multidimensional network map. Figure 6 depicts a diagram of an example of a 600 system for using knowledge of subscriber network connections to prioritize lists of networks for subscribers. In the example in Figure 6, system 600 includes 602-1 to 602-N subscribers (collectively, 602 subscribers), 604-1 to 604-N wireless networks (collectively, 604 wireless networks), a 606 subscriber interface, a connection tracking mechanism 608, a subscriber connection data store 610, and a priority list provisioning mechanism 612.
In the example in Figure 6, subscribers 602 can include stations that have the ability to connect to wireless networks. Depending on the context, a subscriber may refer to a device or to a person using the device. Occasionally, it is convenient, by way of illustration, to refer to subscriber data, which may include data about the user of the device, and the existence of a subscriber record is not necessarily indicative of the existence of a device. However, the techniques described in this document are generally applicable to a subscriber who can connect to a wireless network. Thus, the subscriber will always include, at least as used in the operation description, a device.
In the example in Figure 6, wireless networks 604 can include a variety of different types of networks. For example, wireless network 604-1 could be a WiFi network and wireless network 604-2 could be a 3G (cellular) network.
In the example in Figure 6, subscriber interface 606 is assumed to be on a server. It should be noted that details regarding how subscribers 602 connect to subscriber interface 606 are omitted. For example, the connection between 602 subscribers can be through intermediary networks including the Internet and / or a PSTN. In order for subscribers 602 to connect to one of the wireless networks 604, subscribers 602 may also have to connect via a WAP or base station. In an alternative, subscriber interface 606 could be on a peer device (for example, a station in an IBSS).
In the example in Figure 6, connection tracking mechanism 608 can receive data from subscribers 602. The data can include ANCS reports and authentication data, but for this example, the data includes enough data to identify networks without wire 604 to which subscribers 602 are connected. For example, subscribers 602-1 and 602-2 may indicate that they are connected to the 604-1 wireless network, a WiFi network in this example. Some of the 602 subscribers may not be connected to any of the 6 04 wireless networks at a given point in time, but are nevertheless known by the server, due to authentication attempts, wireless transmissions, a wired connection, or for other applicable reasons.
In the example in Figure 6, the subscriber connection data store 610 stores the data structure that includes enough data to identify the wireless networks 604 to which subscribers 602 are connected. The connection tracking mechanism 608 can modify the relevant data structure when one of the subscribers 602 disconnects or connects to one of the wireless networks 604. The data structure may or may not also include data associated with networks whose subscribers are within the reach, although this information can also be derived from knowledge of a subscriber location and a network map.
In the example in Figure 6, the prioritized list provisioning mechanism 612 can use data from the subscriber connections data store 610 to determine, for example, how many of the subscribers 602 are connected to a given network, such as the network wireless 6 04-1. When generating a list of prioritized networks, the 612 prioritized network list delivery mechanism can use this information to direct subscribers from wireless networks that have a relatively large number of connections and / or towards wireless networks that have a relatively small number of connections. A similar type of technique is often referred to as network load balancing.
For example, assuming subscribers 602-1 to 602-2 are connected to wireless network 604-1 (a WiFi network in this example) and subscriber 602-N can be downloaded to wireless network 604-1 from the wireless network 604-2 (a cellular network in this example). The priority network list delivery mechanism 612 can use knowledge of the number of devices 602-1 to 602-2 to prioritize the wireless network 604-1 in a list of prioritized networks that is to be provided to the subscriber 602-N . As an example, subscriber 602-N is in the service area of each of the 604 wireless networks; so that the list of prioritized networks can potentially any or all of the 604 wireless networks. If the prioritized network list delivery mechanism 612 determines that the number of devices connected to the 604-1 wireless network exceeds an optimal number of connection threshold, wireless network 604-1 may have a reduced priority in the priority list that is provided to subscriber 602-N (or wireless network 604-1 could be omitted from the priority list). In this way, the server can effectively recommend devices that include a connection to a first network based on the number of devices connected to the first network.
In the example in Figure 6, the connection threshold 614 10 includes a data structure indicative of the number of connections that are acceptable. The number of connections that are acceptable may or may not vary by network. For example, some networks may be able to support a greater number of connections. Also, some networks can be more impacted in a predictable way by subscriber connections (for example, a network that serves a relatively large number of subscribers can improve the ability to predict for a server that only receives connection information for subscribers and not for other wireless devices on the network), make connection data 0 more useful for the priority network list delivery mechanism 612 by weighing the various factors used to determine priority for networks. Figure 7 depicts a diagram of an example of a 700 system for using performance history to customize a list of prioritized networks. In the example in Figure 7, system 700 includes a priority list data store 702, a performance history evaluation mechanism 704, a performance history mechanism 706, a network connection mechanism 708, a radio 710, a 30 performance monitoring mechanism 712, and a data storage reliability threshold 714.
In the example in Figure 7, the prioritized list data store 702 includes prioritized network data structures. For this example, a priority list data store 702 is treated as data structures with sufficient data to identify networks that have service areas in which a device that has the system 700 at least partially deployed is located and the priority of the networks . Logically, an actual implementation of the 702 prioritized list data store could include additional data. The priority list data store 702 can be filled by a server that sends a list of prioritized networks (not shown), the prioritized list could be generated on the device, or the prioritized list could be obtained in another way.
In the example in Figure 7, the performance history assessment mechanism 704 can customize the prioritized list in the 702 prioritized list data store. Thus, in addition to using a prioritized list that has been prioritized based on reliability, location , time of day, or other factors that are described in this document, the device has the ability to enhance the prioritized list using device data.
In the example in Figure 7, the performance history data store 706 includes a data structure that is instructive regarding past performance for a given network. To the extent that a network data structure exists in the prioritized list data store 702 and the performance history data store 706, the performance history evaluation mechanism 704 can compare the network priority to a performance history real. Other networks in the priority list data store 702 and the performance history data store 706 can be compared in a similar way. Depending on the deployment, the 702 prioritized list data store can be updated with a custom prioritized list that fits networks into the prioritized list based on past performance. It is not necessarily the case that a network that has superior network performance will have the highest priority (for example, higher economic performance could be more important), and depending on the deployment, the subscriber may have the ability to adjust performance preferences on the regarding the prioritization of changing networks.
In the example in Figure 7, the 708 network connection mechanism can use the custom prioritized list (now) to select a network. The rules used to make the selection can be as simple as choosing the highest priority network from the custom prioritized network list. However, the network connection mechanism 708 could also, for example, have a discharge priority threshold that has to be met in order to download to, for example, a WiFi network from a cellular network. In other words, a cellular network could be a standard and other networks would have to have, for example, a sufficient performance advantage to deserve discharge, regardless of prioritization. The 708 network connection mechanism could also be configured to connect to the highest priority network from the list of prioritized networks (prior to customization) and only use the customized priority list after some performance monitoring.
In the example in Figure 7, radio 710 is instructed to connect to a network that is selected by the network connection mechanism. Over time, the radio 710 will receive at least some network data (for example, from packets received wirelessly) that can be used to monitor performance on the selected network. The 710 radio can also be instructed to scan other networks, as described elsewhere in this document, and the data obtained can be used to monitor performance on other networks.
In the example in Figure 7, the performance monitoring mechanism 712 at least monitors performance on the selected network, and may or may not also monitor performance on other networks. The obtained data can be stored in the performance history data store 706 and used in the performance history evaluation mechanism 704 to customize the prioritized list. The performance history assessment mechanism 704 and the performance monitoring mechanism 712 may operate in parallel or in some other way.
In the example in Figure 7, the data storage reliability threshold 714 includes a data structure indicative of when the performance monitoring mechanism 712 will trigger the network connection mechanism 708 to switch networks. When the performance monitoring mechanism 712 determines that a network is, for example, sufficiently reliable, the network connection mechanism 708 can download from, for example, a cellular network, to, for example, a WiFi network reliable enough. "Sufficiently reliable" means that a reliability threshold is established based on user preferences for reliability, network settings, or other factors that, when met, are indicative of sufficient reliability for a discharge target. The reliability threshold is described elsewhere in this document.
Advantageously, the system 700 allows a device to perform a network performance assessment before deciding to connect to a network. The system 7 00 can download from a first network to a second network that is sufficiently reliable. The device can then continue to evaluate performance and decide whether to switch to another network based on performance. Figure 8 depicts a diagram of an example of an 800 system for selecting network connections based on network prioritization. In the example in Figure 8, system 800 includes a subscriber user interface (UI) 802, a preference selection mechanism 804, a performance preference data store 806, an incentive network selection mechanism 808, a prioritized list 810, a network connection mechanism 812, and a radio 814.
The 802 subscriber UI allows a user to view information about networks, preferences, and incentives, and enter data for use by the device. Thus, it is assumed that the UI includes a display device (with triggers, if applicable) and an input device (with triggers, if applicable). For example, but not limiting, the 802 subscriber UI could include touch screen input / output (I / O) devices, a liquid crystal display (LCD) and keyboard, or another combination or collection of devices (I / O) O) known or convenient applicable.
The 804 preference selection mechanism displays options in the subscriber UI. Options may include, for example, rules that dictate when to switch to or from networks or type of networks. For example, the user could define reliability, congestion state, QoS, performance, or another parameter value. The user can also define incentive states. These settings can be in association with a specific network (for example, a subscriber may have a high preference for downloading to home or office WiFi networks, which can be explicitly identified) or in association with a type of network (for example, a subscriber may have different preferences for downloading to an 802.11a network or an 802.llb / g / n network).
The 806 performance preference data store stores data structures indicative of performance and / or incentive settings selected in the 804 preference selection mechanism. In a specific deployment, a user can update preferences at any time by, for example, triggering the preference selection mechanism 804 with a menu selection. Performance preferences can also be dynamic settings that can change with operational changes. For example, preferences may be different when a device has a full battery compared to when the device is running out of battery. Thus, preferences can be used in conjunction with rules or stored as such for device control operation, specifically in this example, network connection selections by the device.
The 808 incentive network selection mechanism uses a list of prioritized networks, which can be stored in the priority list data store 810, and preferences and / or rules in the 806 performance preference data store to select a network and take the network connection mechanism 812 to control the radio 814 to connect to the selected network. In the example in Figure 8, the subscriber can be provided with options that are displayed on the 802 subscriber UI and the subscriber can enter data associated with those options. The amount of information provided to the subscriber may vary with deployment, but may include a list of all available networks, all available trusted networks, one or more aspects of network performance for displayed networks, or similar. Figure 9 depicts the conceptual 900 exhibit associated with the incentive network selection. Display 900 includes a list of prioritized networks 902-1 to 902-N (collectively, list of prioritized networks 902), radio buttons 904, and status indicators 906. The list of prioritized networks 902 may or may not include all networks depending on the specific deployment or configuration parameters. For example, the subscriber may or may not have the ability to limit the list to only networks that meet certain performance and incentive specifications, or a service provider may or may not have a similar ability to trim the list of available networks. In the example in Figure 9, it is assumed that the list of prioritized networks 902 is ordered by priority, but a priority indicator in addition to order could be used instead (for example, priority could be indicated by a number in a column , text or background color, etc.).
In the example in Figure 9, radio buttons 904 are intended to illustrate a network selection mechanism. A known or convenient mechanism applicable for selecting one of the networks from the list of prioritized networks 902 could be used instead (for example, the text from the list of prioritized networks 902 could be selectable so that if a user "clicked" on a network, that network would be selected). It should be noted that, in a specific deployment, the choice of network can be made by the device based on a set of rules decided by a subscriber regarding when to connect to a network or switch to a new network.
In the example in Figure 9, status indicators 906 are intended to illustrate information that could be provided in association with a prioritized network list view. In the example in Figure 9, status indicators 906 include a performance column 908-1 to 908-N (collectively, performance states 908), an availability column 910-1 to 910-N (collectively, network 910), and a column of incentives 912-1 to 912-N (collectively, incentive states 912). Status indicators 906 do not need to be displayed in a columnar or tabular way (for example, data could be displayed by floating over a network in the list of prioritized networks 902). The data can also be represented by color coding (for example, networks in the list of prioritized networks 902 could be displayed with red text if a corresponding network congestion state is high and green text if a corresponding network congestion state is low), or using another known or convenient technique applicable to check information about the status of a network.
As mentioned elsewhere in this document, performance can have many different meanings (for example, network performance, economic performance, granting access to performance, etc.). Thus, although there is a 908 performance status column, there could be several columns to indicate status or estimates for different types of performance. Within each type of performance, there may be additional subcategories (for example, network performance can be measured in more than one way, including throughput, QoS, congestion, etc.) Performance can be summarized for a subscriber and displayed such as a single value (for example, a number that is indicative of the relative performance of the network) or more explicit data can be provided (for example, the basic radio bit rate of the network).
The network availability states 910 are performance related, but are represented in a separate column due to some distinctions. Performance can be indicative of what can be expected if a connection is established to a corresponding network. Availability can be indicative of the likelihood that a connection can be established. Reliability (not shown) can also be distinct because it is indicative of the likelihood that performance will be consistent or that a connection can be maintained over time (for example, in consideration of a motion tracking or reliability zone based on the time of the day), which is somewhat different from both performance and availability. Reliability can be obviated as an indicator in a deployment where only trusted networks are in the list of prioritized networks 902.
Incentive states 912 may indicate to a subscriber an "incentive offer" that may prompt the subscriber to choose one network over another, regardless of prioritization. Figure 10 depicts a diagram of an example of a system 1000 for offering incentives to a subscriber to connect to a network. In the example in Figure 10, system 1000 includes a radio interface 1002, a radio 1004, an incentive network selection mechanism 1006, a subscriber UI 1008, and a network connection mechanism 1010.
Radio 1004 receives an incentive offer from or on behalf of a network via the radio interface 1002. The incentive offer can be provided in a number of different ways, such as on signboards, on boards identified as "signboards". incentive "in the body or header of a message, etc. Typically it will be more valuable to send incentives to devices that are in a service area of a network, but depending on the deployment, incentives could be sent based on the predicted movement, probably in the immediate future, based on connection history or a movement tracking . In an alternative, the incentive offer is not received by the radio interface 1002, and is instead generated in system 1000 in the incentive network selection mechanism 1006 (or in an incentive offer generation mechanism, not shown ).
The incentive network selection mechanism 1006 allows a user to select the incentive network through the subscriber UI 1008. The selection could also be made based on rules or preferences that were previously entered by the subscriber or a service provider. The network selection option could be presented as a pop-up window that leads a user to select whether he connects to the applicable network in exchange for the incentive offer. Alternatively, the incentive offer can trigger a display similar to the display depicted by way of example in Figure 9. Regardless of the mechanism used to provide the subscriber with the choice, the 1010 network connection mechanism can connect to the network according to the choice of the subscriber.
Advantageously, a service provider can identify one or more networks (for example, WiFi networks) for which the service provider would like a subscriber to download. In the case of a cellular provider, this may enable the service provider to reduce the load on the cellular network. By encouraging download, the service provider can expect a greater number of subscribers to download if no incentive has been offered. The incentive offer may explain advantages in switching networks to a subscriber, which may include, for example, free or cheaper traffic charges, one or more capabilities or activities are available on, for example, WiFi that are not available or have a low performance on, for example, cell phone, the subscriber gets a discount or credit for commuting, etc. Figure 11 depicts a diagram of an example of an 1100 system to run through performance tests repeatedly. In the example in Figure 11, system 1100 includes a radio interface 1102, a radio 1104, a prioritized network selection mechanism 1106, a network connection mechanism 1108, a selective network monitoring mechanism 1110, and a ANCS report 1112. Radio 1104 receives a prioritized list from a server via radio interface 1102. The prioritized list could alternatively be generated at least in part on a device on which the 1100 system is deployed.
The 1106 prioritized network selection mechanism selects a priority network according to any techniques described earlier in this document. The network connection mechanism 1108 controls the radio 1104 to connect to the applicable network. The network connection mechanism 1108 can perform a scan to determine available networks before or after obtaining the prioritized list.
The selective network monitoring mechanism 1110 can repeatedly go through performance tests for a subset of the available networks. The ANCS 1112 reporting engine can report test results to a server via radio 1104 and radio interface 1102. The server could then run a selection algorithm to select the network that best serves a selection cost function. and prioritizes the network accordingly and provides another prioritized list. Alternatively, the device that deploys the 1100 system can use ANCS to customize the prioritized list. If the prioritized network selection mechanism 1106 selects a new network, the network connection mechanism 1108 can control radio 1104 to connect to the selected network.
The 1110 selective network monitoring mechanism can generate ANCS repeatedly so that the prioritized list is constantly updated. Alternatively, ANCS reports can be uploaded to a service controller role.
The embodiments illustrated in Figures 1 to 11 include components that can be selectively combined with each other. The cost function of the various modalities can include parameters such as signal strength, channel strength, basic radio bit rate, network speed, network transfer rate, speed jitter, transfer rate jitter, network delay, delay jitter, network availability, network reliability in percentage of successful network access grant, delay in granting access, variation in performance as a performance function, to name a few. Figure 12 depicts a diagram of an example of a 1200 system with wireless download capability and the ability to enable carriers to establish wireless download service. In the example in Figure 12, system 1200 includes a network 1202, a server 1204, a smart wireless download client 1206, and a service design center (SDC) 1208. Network 1202 will include a wireless network to which the the smart wireless download client 1206 is connected, but can on the other hand include any applicable known or convenient network suitable for linking system components 1200. The server 1204 can be a server from a CSP or other service provider. The smart wireless download client 1206 may include capabilities of a wireless device and may include an implementation of any subset of the techniques described in this document.
In one embodiment, SDC 1208 acts as the portal to enable service providers to establish service plan parameters for wireless network download functionality. SDC 1208 can enable service providers to set fee rates for each of the different wireless network connections, such as a fee for WiFi networks, a fee for 3G networks, a fee for 4G networks , etc. Each service provider can establish different tariff rates for the same or different network connections. Each service provider can establish different service plans, each with different tariff rates for different wireless connections. For example, a service provider may have a service plan that benefits the highly mobile user, charging less for cellular connections. A service provider may have a service plan that benefits those who anticipate reduced use of cellular connections.
In one embodiment, SDC 1208 acts as the portal to enable service providers to establish notification parameters. For example, each service provider can establish different notifications to motivate users to switch between wireless connections. These notifications and incentives can be temporal, geographically specific, service plan specific, etc.
In one embodiment, SDC 1208 acts as the portal to enable service providers to establish access parameters. For example, each service provider may allow multiple devices to access only a subset of available network connections, to download to only certain network connections, etc.
The SDC 1208 can additionally provide functionality that may not be provided by the 1204 server or the smart wireless download client 1206. For example, the SDC 1208 can load algorithms for use on the client or server, establish periodicity of scans by the client, establish arrays , establish geographic limits of networks, establish reporting periodicity, etc. Examples of SDC 12 08 can be found in the following related published applications, which are incorporated by reference: Publication No. US 2010/0188975, filed March 2, 2009, entitled "Verifiable Device Assisted Service Policy Implementation", Publication US No. 2010/0192170, filed on March 2, 2009, entitled "Device Assisted Service Profile Management with User Preference, Adaptive Policy, Network Neutrality, and User Privacy", Publication No. US 2010/0191612, filed on March 2 2009, entitled "Verifiable Device Assisted Service Usage Monitoring with Reporting, Synchronization, and Notification", Publication No. US 2010/0191576, filed on March 2, 2009, entitled "Verifiable Device Assisted Service Usage Billing with Integrated Accounting, Mediation Accounting , and Multi-Account ", Publication No. US 2010/0188991, filed on March 2, 2009, entitled" Network Based Service Policy Implementation with Network Neu trality and User Privacy ", Publication No. US 2010/0188990, filed on March 2, 2009, entitled" Network Based Service Profile Management with User Preference, Adaptive Policy, Network Neutrality and User Privacy ", Publication No. US 2010/0192212 , filed on March 2, 2009, entitled "Automated Device Provisioning and Activation", Publication No. US 2010/0191604, filed on March 2, 2009, entitled "Device Assisted Ambient Services", Publication No. US 2010/0191575, filed on March 2, 2009, entitled "Network Based Ambient Services", Publication No. US 2010/0188993, filed on March 2, 2009, entitled "Network Tools for Analysis, Design, Testing, and Production of Services", Publication US No. 2010/0190470, filed on March 2, 2009, entitled "Roaming Services Network and Overlay Networks", Publication No. US 2010/0192120, filed on March 2, 2009, entitled "Open Development System for Access Service Providers ", Publication US No. 2010/0192207, filed on March 2, 2009, entitled "Virtual Service Provider Systems", Publication No. US 2010/0191613, filed on March 2, 2009, entitled "Open Transaction Central Billing System", Publication n ° US 2010/0188995, filed on March 2, 2009, entitled "Verifiable and Accurate Service Usage Monitoring for Intermediate Networking Devices", Publication No. US 2010/0188994, filed on March 2, 2009, entitled "Verifiable Service Billing for Intermediate Networking Devices ", Publication No. US 2010/0191846, filed on March 2, 2009, entitled" Verifiable Service Policy Implementation for Intermediate Networking Devices ", Publication No. US 2010/0188992, filed on March 2, 2009, entitled "Service Profile Management with User Preference, Adaptive Policy, Network Neutrality and User Privacy for Intermediate Networking Devices", Publication No. US 2010/0191847, filed on March 2, 2009, entitled "Simplifie d Service Network Architecture ", Publication No. US 2010/0197266, filed on January 27, 2010, entitled" Device Assisted CDR Creation, Aggregation, Mediation, and Billing ", Publication No. US 2010/0198698, filed on January 27 2010, entitled "Adaptive Ambient Services", Publication No. US 2010/0199325, filed on January 27, 2010, entitled "Security
Techniques for Device Assisted Services ", Publication No. US 2010/0197267, filed on January 27, 2010, entitled" Device Group Partitions and Settlement Platform ", Publication No. US 2010/0198939, filed on January 27, 2010, entitled "Device Assisted Services Install", Publication No. US 2010/0195503, filed on January 27, 2010, entitled "Quality of Service for Device Assisted Services", and Publication No. US 2010/0197268, filed on January 28, 2010 , entitled "Enhanced Roaming Services and Converged Carrier Networks with Device Assisted Services and a Proxy." Figure 13 depicts an example of a 1300 computer system in which the techniques described in this document can be deployed. The 1300 computer system can be a conventional computer system that can be used as a client computer system, such as a wireless client or a workstation, or a server computer system.The 1300 computer system incl a computer 1302, I / O devices 1304, and a display device 1306. Computer 1302 includes a processor 1308, a communications interface 1310, memory 1312, display controller 1314, non-volatile storage 1316, and I / O controller 1318. Computer 1302 can be coupled with I / O devices 1304 and display device 1306 or include them.
Computer 1302 communicates with external systems via communications interface 1310, which may include a modem or network interface. It will be appreciated that the 1310 communications interface can be considered as part of the 1300 computer system or a part of the 1302 computer. The 1310 communications interface can be an analog modem, ISDN modem, cable modem, token ring interface, transmission interface via satellite (for example, "direct PC"), or other interfaces for coupling a computer system to other computer systems.
The processor 1308 can be, for example, a conventional microprocessor such as an Intel 5 Pentium microprocessor or Motorola power PC microprocessor. Memory 1312 is coupled to processor 1308 via a 1370 bus. Memory 1312 can be Dynamic Random Access Memory (DRAM) and can also include Static RAM (SRAM). Bus 1370 couples processor 1308 to memory 1312, 10 also to non-volatile storage 1316, display controller 1314, and I / O controller 1318.
I / O 1304 devices can include a keyboard, disk drives, printers, a scanning device, and other input and output devices, including a mouse or other pointing device. The display controller 1314 can conventionally control a display on the display device 1306, which can be, for example, a cathode ray tube (CRT) or liquid crystal display (LCD). The display controller 1314 and the I / O controller 1318 can be deployed with well-known conventional technology. The non-volatile storage 1316 is often a magnetic hard disk, an optical disk, or other form of storage for large amounts of data. Some 25 of these data are often written, via a direct memory access process, to memory 1312 while running software on computer 1302. A person skilled in the art will immediately recognize that the terms "machine readable" or "medium computer readable "30 include any type of storage device that is accessible by processor 1308 and also encompasses a carrier wave that encodes a data signal.
The 1300 computer system is an example of several possible computer systems that have different architectures. For example, personal computers based on an Intel microprocessor often have multiple buses, one of which can cool an I / O bus for peripherals and one that connects directly to the 1308 processor and 1312 memory (often referred to as the memory). The buses are connected together via bridge components that perform any necessary translation due to different bus protocols.
Network computers are another type of computer system that can be used in conjunction with the teachings provided in this document. Network computers do not normally include a hard disk or other mass storage, and executable programs are loaded from a network connection to memory 1312 for execution by the 1308 processor. A Web TV system, which is known in the art , is also considered to be a computer system, but lacks some features shown in Figure 13, such as certain input and output devices. A typical computer system will include at least one processor, memory, and a bus that couples memory to the processor.
In addition, the 1300 computer system is controlled by a control system software that includes a file management system, such as a disk operation system, which is part of the control system software. An example of control system software with its associated file management system software is the family of operating systems known as Windows® from Microsoft Corporation of Redmond, Washington, and their associated file management systems. Another example of control system software with its associated file management system software is the Linux operating system and its associated file management system. The file management system is typically stored in 1316 non-volatile storage and causes the 1308 processor to perform various actions required by the operating system for input and output data and to store data in memory, including file storage in 1316 non-volatile storage. .
Some portions of the detailed description are presented in terms of algorithms and symbolic representations of operations on bits of data within a computer memory. These algorithmic descriptions and representations are the means used by those versed in the data processing technique to best convey the substance of their work to others versed in the technique. An algorithm is in this document, and generally, designed to be a sequence of self-consistent operations that leads to a desired result. The operations are that require physical manipulation of physical quantities. Usually, although not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared or otherwise manipulated. Sometimes it has been proven convenient, mainly for reasons of common use, to refer to these signs as bits, values, elements, symbols, characters, terms, numbers or similar.
A person skilled in the art should recognize that the terms used must be associated with appropriate physical quantities and are merely convenient identifications applied to those quantities. Unless otherwise specified as apparent from the following discussion, it is appreciated that throughout the description, discussions that use terms such as "processing" or "computation" or "calculation" or "determination" or "display" or similar, refer to the action and processes of a computer system, or similar electronic computing device, that manipulates and transforms data represented as 5 physical (electronic) quantities within the computer system's records and memories into other data similarly represented as physical quantities within computer system memories and records or other information storage, transmission or display devices.
The present invention, in some embodiments, also relates to an apparatus for performing the operations in this document. Such apparatus may be specifically built for the required purposes or may comprise a general purpose computer activated or selectively reconfigured by a computer program stored on the computer. Such a computer program can be stored on a computer-readable storage medium, such as, but not limited to, read-only memories (ROMs), random access memories (RAMs), EPROMs, EEPROMs, magnetic or optical cards, any type disk drives including floppy disks, optical disks, CD-ROMs, and optical magnetic disks, or any type of media suitable for storing electronic instructions, and each coupled to a computer system bus.
The algorithms and displays presented in this document are not inherently related to any particular computer or other device. Various general purpose systems can be used with programs according to the teachings in this document, or it may be convenient to build more specialized devices to perform the required steps of the method. Furthermore, the present invention is not described with reference to any particular programming language, and various modalities can thus be implemented using a variety of programming languages. Figure 14 depicts a flow chart 1400 of an example of a method for offloading a prioritized wireless network. The method is organized as a sequence of modules in flowchart 1400. However, it should be understood that these and other modules associated with other methods described in this document can be reordered for parallel execution or in different sequences of modules.
In the example in Figure 14, flowchart 1400 starts at module 14 02 with the acquisition of wireless network data. Wireless network data can be obtained through ANCS on a wireless device. ANCS can be used on the wireless device and / or can be provided to a server in an ANCS report. In a server-based deployment, the server can receive ANCS reports from multiple wireless devices. This can enable the server to generate priority lists for subscribers using network data that is remotely obtained from a subscriber.
In the example in Figure 14, flowchart 1400 continues to module 14 04 with the generation of a list of prioritized networks from wireless data. In a deployment that makes use of a server, the server can run an in-memory algorithm to optimize capacity for a group of subscribers and a service provider associated with the server. The optimization can take into account network load, wireless device location, wireless device connections, performance history (including, for example, a time of day associated with a particular performance for a network), a network map over a geographic area, wireless device movement tracking, subscriber preferences, incentives, and cost function to name a few. The prioritized list can take the form of a network map, which can be treated as a subset of the prioritized list (with a geographic location component).
In the example in Figure 14, flowchart 1400 continues to module 1406 with the connection to a network from the list of prioritized networks. A device may or may not customize a list of prioritized networks that is provided from a server according to specific device parameters.
When customization does not occur, the server can take device-specific parameters (as well as, for example, account-specific parameters) into account when generating the prioritized list. When customization occurs, in a deployment that includes a server, the prioritized list can still be customized on the server. Personalization can be according to monitored network performance within the range of the device, specific subscriber rules, specific service provider rules, location tracking, performance history, environmental conditions, 20 cost function, or incentives, to quote many.
In the example in Figure 14, flowchart 1400 continues to module 1408 with network performance monitoring. Monitoring can be from the network to which the device is connected. The device can also monitor other networks, 25 either passively or actively, according to network monitoring rules. The rules can be provided by a service provider, SDC, or directly by input.
In the example in Figure 14, flowchart 1400 returns to module 1402 and continues as previously described. It is not necessary for the same elements to perform the same tasks described. For example, a server could initially generate a list of prioritized networks (1404), but in a second iteration, a wireless device could generate a list of prioritized (customized) networks without receiving a new prioritized list from the server. Also, there may be fewer actions or determinations or additional actions or determinations in a second iteration. For example, when a device first connects to a network (14 06), it may be unnecessary to compare performance or some other parameter of a network with a threshold value to determine whether or not to switch to another network, but when the device considers the switching from one network to another, it may be desirable to compare current performance with a threshold value to ensure that it is "worthwhile" to switch to a more highly prioritized network (currently). Figure 15 depicts a flow chart 1500 of an example of a method for Assisted Device Usage Services (DAS) to facilitate wireless download. In the example in Figure 15, flowchart 1500 starts at module 1402 with the monitoring of network service usage activities on a device. Network service usage activities can be monitored using verified / verifiable network performance characterization software (deployed in hardware) or hardware agent. The agent can be deployed on the device in question, on a different device, or it can have components that are deployed on more than one device. Monitoring can be achieved using radio and can be selective. An example of an agent that performs selective monitoring is the selective network monitoring mechanism 414 or the selective network monitoring mechanism 1110, respectively described by way of example with reference to Figures 4 and 11, or the performance monitoring mechanism 712 described by way of example with reference to Figure 7.
In the example in Figure 15, flowchart 1500 continues to module 1504 with the determination of a busy network state based on the monitored network service usage activities. Network statistics can be stored in a network statistics store, such as the network statistics data store 304 described by way of example with reference to Figure 3. The network busy state can also be stored in a statistics store or it can be derived from statistics that are stored in the network statistics store. The network busy state can include a measurement of network capacity, availability, and / or performance, and can be derived using techniques described in this document. The network busy state can be determined using network performance characterization software (deployed in hardware) or hardware agent, which can be measured and / or characterize a network busy state experienced by a device. An example of an agent that performs network busy state determination is the network statistics characterization mechanism 306, as described by way of example with reference to Figure 3, or the performance history evaluation mechanism 704, as described in title. example with reference to .Figure 7.
In the example in Figure 15, flow chart 1500 continues to module 1506 with the network busy status report for a network element / function. The network busy state can be included in any of the reports described in this document (for example, a network busy status report, ANCS report, etc.). Depending on the deployment, the network busy state may be used by a network element / function on a wireless device, such as the wireless device that at least partially monitored network service usage activities and / or determined a busy state network, on a server, or some other applicable device. An example of such a network element / function includes the wireless network download mechanism 106, as described by way of example with reference to Figure 1.
In the example in Figure 15, flowchart 1500 continues for module 1508 with the establishment of a network access control policy for one or more controlled services of network capacity using the busy state of the network. The network access control policy can be actuated by the geographic analysis connection mechanism 410, the network connection mechanism 708, the incentive network selection mechanism 808 and / or the network connection mechanism 812, the network connection mechanism incentivized network selection 1006 and / or the network connection mechanism 1010, the prioritized network selection mechanism 1106 and / or the network connection mechanism 1108, as described respectively by way of example with reference to Figures 4, 7 , 8, 10 and 11.
The data on a wireless network is often encrypted. However, data can also be sent without being encrypted, if desired. With encrypted data, an attacking device will have a hard time discovering any customer information (such as passwords, etc.) before countermeasures are taken to deal with the attacker. The attacker may be able to confuse the customer and perhaps obtain some encrypted data, but the risk is minimal (even less for some wired networks).
The following example illustrates possible benefits of this system. In one embodiment, a subscriber activates a smart phone, the smart phone notices that the subscriber's home network is available. Assuming that the subscriber is connected to the cellular network and is not connected to the home network, the cellular service provider sends the subscriber an incentive offer: a reduction in service charges if the subscriber downloads from the network your home network.
When commuting to work, the smart phone recognizes that the subscriber is no longer in the service area of their home network, but is in the service area of three neighbors' home networks and the cellular network. The smart phone recognizes that its motion tracking (speed) indicates movement that will move the subscriber out of reach of his neighbors' home networks quickly. Thus, the smart phone can be configured to connect to the cellular network. By recognizing that the smart phone is stationary, for example, at a closed traffic signal, the smart phone can be configured to wait a predetermined period of time before considering downloading to a WiFi network (especially if the smart phone knows that subscriber moved). In this way, the smart phone can be configured to remain connected to the cellular network.
Upon reaching a destination, the smart phone recognizes that motion tracking becomes stationary or relatively slow and that the smart phone is close to two local WiFi networks. In one embodiment, the signaling frames of the first WiFi network may have higher indicators of received signal strength (RSSI). However, other subscribers may have provided network data about a first network that indicates that a first network is typically severely congested at that time. Thus, the smart phone can be configured to indicate that the second network has a higher priority than the first network, despite the high RSSI.
In some embodiments, the smart phone receives a list of prioritized networks that indicates the second network as having a higher priority than the first network. In some embodiments, the smart phone is configured to connect to a wireless network according to an incentive offer, to connect based on preferences set by the subscriber, or to wait for the subscriber to select a network from the list of prioritized networks.
To assist in gathering information, the smart phone 10 can be configured to gather information about another local wireless network, for example, about the first wireless network, and pass the information on to the cellular service provider. While the smart phone is within range of another local wireless network, the smart phone 15 can passively or actively scan over another network. In some embodiments, the smart phone is configured to perform active scans only when the smart phone is plugged into a power source.
权利要求:
Claims (14)
[0001]
1. METHOD FOR REDUCING CONGESTION IN A WIRELESS CELL NETWORK, which comprises: - communicating a first set of one or more communications over a cellular wireless network connection (104-1) to or from an end user device (102-1), the first set of one or more data communications associated with one or more of the service activities of the end user's device (102-1) is capable of supporting; - identify an alternative wireless network (104-2) that can be used to communicate a second set of one or more data communications to or from the end user's device (102-1), the second set of one or more data communications data, comprising (i) a subset of data traffic associated with one or more service activities from the end user's device (102-1) is capable of supporting, or (ii) all data traffic associated with one or more activities service of the end user device (102-1) is capable of supporting; characterized by connecting the end user device (102-1) via an available connection via the alternative wireless network (104-2) to a network element (106) on a second network accessible via the alternative wireless network (104 -two); conduct an upload and / or download sequence between the end user's device (102-1) and the network element (106), through the available connection; characterize the performance of the available connection based on the upload and / or download sequence conducted; and - based on electronic processing, a set of instructions for downloading from the wireless cellular network to the alternative wireless network, determining whether the communication of the second set of one or more data communications to or from the end user's device ( 102-1) via the alternative wireless network (104-2) or the wireless cellular connection (104-1), in which the set of instructions for downloading from the wireless cellular network to the alternative wireless network specifies a or more conditions under which to communicate the second set of one or more data communications to or from the end user's device (102-1) over the alternative wireless network (104-2), and in which the instruction set for the downloading from the wireless cellular network to the alternative wireless network comprises at least one rule that takes into account at least one state associated with the wireless cellular connection and the performance of the available connection.
[0002]
2. METHOD according to claim 1, characterized in that it is determined to communicate the second set of one or more data communications to or from the end user's device via the alternative wireless network, and further comprising: communicating the second set of one or more data communications to or from the end user's device over the alternative wireless network; and after communicating the second set of one or more data communications over the alternative wireless network, based on an indication or anticipation that a wireless cellular network's performance is above a first level or a wireless cellular network congestion is below a second level, communicate a third set of one or more data communications to or from the end user's device over the wireless cellular connection, the third set of one or more data communications, comprising part or all of the traffic data to or from the end user’s device.
[0003]
3. METHOD according to claim 1 or claim 2, characterized in that at least one state associated with the wireless cellular connection is that the wireless cellular network is a roaming network.
[0004]
4. METHOD according to any one of claims 1 to 3, characterized in that at least one state associated with the wireless cellular connection comprises: - a current or historical state of congestion of the wireless cellular connection, or - a level historical or current wireless cellular connection performance; or - a current or historical performance of a portion of the wireless cellular network that supports the wireless cellular connection.
[0005]
5. METHOD according to any one of claims 1 to 4, characterized in that at least one state associated with the wireless cellular connection comprises a metric congestion history associated with a period of the day.
[0006]
6. METHOD according to any one of claims 1 to 5, characterized by determining whether to communicate the second set of one or more data communications to or from the end user's device via the alternative wireless network or over the cellular connection wireless is still based on the movement of the end user's device.
[0007]
METHOD according to any one of claims 1 to 6, characterized by determining whether to communicate the second set of one or more data communications to or from the end user's device via the alternative wireless network or over the cellular connection wireless is additionally based on an end user device movement rate, an amount of time the end user device is or will be in the range of one or more access points or one or more wireless base stations alternative, or a combination of these, and in which it is determined to communicate the second set of one or more data communications to or from the end user's device over the cellular connection, wirelessly, when: (a) the speed of movement of the end user's device is above a predetermined speed, (b) the amount of time the end user's device will be within reach of one or more access points or one or more b stations ase of the alternative network is less than a predetermined time, or (c) both (a) and (b).
[0008]
Method according to any one of claims 1 to 7, characterized by determining whether to communicate the second set of one or more data communications to or from the end user's device via the alternative wireless network or over the cellular connection wireless is furthermore based on a boundary condition for preventing back and forth between the wireless cellular connection and the alternative wireless network, the boundary condition comprising a first boundary to assist in deciding when to start using the network alternative wireless instead of cellular wireless connection to communicate the second set of one or more data communications, and a second threshold, which differs in at least one aspect from the first threshold to decide when to stop using the alternative wireless network , rather than the wireless cellular connection to communicate the second set of one or more data communications.
[0009]
Method according to any one of claims 1 to 8, characterized in that at least one state related to the wireless cellular connection comprises an indication of a type of wireless cellular network.
[0010]
10. METHOD according to any one of claims 1 to 9, characterized in that at least one state related to the wireless cellular connection comprises a performance parameter or a metric congestion determined by obtaining a report from a network element, where the report comprises information about wireless cellular connection performance or wireless cellular connection congestion.
[0011]
11. METHOD according to any one of claims 1 to 10, characterized by determining whether to communicate the second set of one or more data communications to or from the end user's device via the alternative wireless network or via the cellular connection wireless comprises: - determining, based on at least one state associated with the wireless cellular network, that it is desirable to communicate the second set of one or more data communications to or from the end user's device over the network wireless alternative; - based on determination, based on at least one state associated with the wireless cellular network, which is desirable to communicate the second set of one or more data communications to or from the end user's device via the wireless network alternative, presenting an end user device with an opportunity to switch to the alternative wireless network; - receive, from the user of the end-user device, a response to the opportunity to switch to the alternative wireless network; - determine whether the response indicates that the user wants to switch to the alternative wireless network; and - if the response indicates a user's desire to switch to the alternative wireless network, communicate the second set of one or more data communications to or from the end user's device via the alternative wireless network.
[0012]
12. METHOD according to any one of claims 1 to 11, characterized by one or more service activities that the end user's device is capable of supporting are associated with a subset of all applications capable of running the end user's device , and in which the second set of one or more data communications comprises the subset of traffic data associated with one or more service activities that the end user's device is capable of supporting.
[0013]
13. METHOD according to any one of claims 1 to 12, characterized by determining whether to communicate the second set of one or more data communications to or from the end user's device via the alternative wireless network or over the cellular connection wireless is still based on one or more features of an application on the end user’s device.
[0014]
14. METHOD according to any one of claims 1 to 13, characterized by determining whether to communicate the second set of one or more data communications to or from the end user's device via the alternative wireless network or over the cellular connection wireless is still based on user preference.
类似技术:
公开号 | 公开日 | 专利标题
BR112012029719B1|2021-03-16|method to reduce congestion on a wireless cellular network
US10791471B2|2020-09-29|System and method for wireless network offloading
US9532261B2|2016-12-27|System and method for wireless network offloading
US10085270B2|2018-09-25|Selection of a radio access technology resource based on radio access technology resource historical information
US10638352B2|2020-04-28|Femtocell local breakout management services
US9801118B2|2017-10-24|WLAN discovery and notification
US9198049B2|2015-11-24|Real-time load analysis for modification of neighbor relations
US20210337392A1|2021-10-28|Network management method and system for a shared radio access network, ran, infrastructure
US10524164B2|2019-12-31|Dynamic service and policy control based on radio condition notifications
CA3033307C|2021-05-18|System and method for wireless network offloading
US20200015046A1|2020-01-09|Next generation fixed wireless qualification tool for speed-tier based subscription
同族专利:
公开号 | 公开日
WO2011149533A1|2011-12-01|
KR101747993B1|2017-06-15|
CN103038651B|2016-08-31|
BR112012029719A2|2017-09-26|
NZ603634A|2013-11-29|
CN103038651A|2013-04-10|
EP2577333A4|2016-04-06|
EP2577333B1|2017-03-29|
KR20130113344A|2013-10-15|
CA2800184C|2019-03-19|
EP2577333A1|2013-04-10|
AU2011258874B2|2015-04-09|
AU2011258874A1|2012-12-06|
CA2800184A1|2011-12-01|
JP5854482B2|2016-02-09|
JP2013530640A|2013-07-25|
MX2012013658A|2013-05-28|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题

US6985746B2|2001-04-30|2006-01-10|Ipr Licensing, Inc.|Wireless communication system having mobility-based content delivery|
US7158792B1|2001-09-20|2007-01-02|Sprint Communications Company L.P.|Selecting a wireless link in a public wireless communication network|
US20050254435A1|2003-12-23|2005-11-17|Moakley George P|Method and system for selecting network connections in a multi-network environment|
US7447502B2|2005-01-14|2008-11-04|Research In Motion Limited|Scheme for providing regulatory compliance in performing network selection in a foreign country|
US20060199608A1|2005-03-01|2006-09-07|Kyocera Wireless Corp.|Systems and methods for motion sensitive roaming in a mobile communication device|
CN101461271B|2005-10-14|2012-05-30|开利网络有限责任公司|System and method for real-time management of mobile resources|
WO2007126352A1|2006-05-02|2007-11-08|Telefonaktiebolaget Lm Ericsson |A method for generating a congestion flag based on measured system load|
JP2007318354A|2006-05-24|2007-12-06|Fujitsu Ten Ltd|Communication device for mobile and communication method for mobile|
GB0612288D0|2006-06-21|2006-08-02|Nokia Corp|Selection of access interface|
US8064391B2|2006-08-22|2011-11-22|Embarq Holdings Company, Llc|System and method for monitoring and optimizing network performance to a wireless device|
US7885654B2|2006-10-10|2011-02-08|Apple Inc.|Dynamic carrier selection|
JP5000381B2|2007-05-30|2012-08-15|京セラ株式会社|COMMUNICATION SYSTEM, THRESHOLD MANAGEMENT SERVER, RADIO COMMUNICATION DEVICE, AND COMMUNICATION METHOD|
US8331334B2|2007-07-20|2012-12-11|Broadcom Corporation|Method and system for a handheld wireless communication device for configuring connection to and use of local and remote resources|
US20100290448A1|2008-01-15|2010-11-18|Telefonaktiebolaget L M Ericsson |Pre-fetching of input data for access network selection|
JP2009212707A|2008-03-03|2009-09-17|Fujitsu Ltd|Controller, control method and computer program|
JP4942115B2|2008-03-10|2012-05-30|株式会社国際電気通信基礎技術研究所|WIRELESS DEVICE, WIRELESS COMMUNICATION METHOD IN THE SAME, AND WIRELESS NETWORK HAVING THE WIRELESS DEVICE|WO2012142437A1|2011-04-13|2012-10-18|Interdigital Patent Holdings, Inc|Methods, systems and apparatus for managing and/or enforcing policies for managing internet protocoltraffic among multiple accesses of a network|
US8797875B2|2011-09-16|2014-08-05|Telefonaktiebolaget Lm Ericsson |Policy controlled offloading among neighboring networks|
US8897782B2|2012-01-16|2014-11-25|Microsoft Corporation|System and method for offloading traffic from cellular networks using plugins|
WO2013123467A1|2012-02-17|2013-08-22|Vid Scale, Inc.|Hierarchical traffic differentiation to handle congestion and/or manage user quality of experience|
US9629028B2|2012-03-16|2017-04-18|Qualcomm Incorporated|System and method for heterogeneous carrier aggregation|
US10098028B2|2012-03-16|2018-10-09|Qualcomm Incorporated|System and method of offloading traffic to a wireless local area network|
CN103379542B|2012-04-18|2016-09-07|中兴通讯股份有限公司|It is applied to acquisition methods and the system of the shunting business information of wlan network|
CN103379548B|2012-04-28|2016-03-30|华为技术有限公司|The method of network shunt and base station|
CN103428769B|2012-05-16|2016-11-23|华为技术有限公司|A kind of data distribution transmission, Apparatus and system|
US9585054B2|2012-07-19|2017-02-28|Interdigital Patent Holdings, Inc.|Method and apparatus for detecting and managing user plane congestion|
US9247436B2|2012-07-27|2016-01-26|Nokia Solutions And Networks Oy|Insight based orchestration of network optimization in communication networks|
WO2014049997A1|2012-09-25|2014-04-03|日本電気株式会社|Server device capable of analyzing communication behavior, control method for mobile terminal, and computer program|
US8923880B2|2012-09-28|2014-12-30|Intel Corporation|Selective joinder of user equipment with wireless cell|
US8825045B2|2012-10-05|2014-09-02|Smith Micro Software, Inc.|Policy-based roaming updates for mobile devices|
CN104885514B|2012-11-01|2019-05-21|英特尔公司|The signal of qos requirement and UE power preference is sent in LTE-A network|
US10051536B2|2012-11-23|2018-08-14|Telefonaktiebolaget L M Ericsson |Network offloading|
JP5783995B2|2012-12-27|2015-09-24|株式会社日立製作所|Wireless terminal, management server, and wireless communication system using them|
CN103404196B|2013-01-07|2017-05-10|华为技术有限公司|Shunt processing method, control unit and system|
WO2014110410A1|2013-01-11|2014-07-17|Interdigital Patent Holdings, Inc.|User-plane congestion management|
JP5893177B2|2013-01-18|2016-03-23|京セラ株式会社|Communication control method, cellular base station, user terminal, and processor|
EP3349512B1|2013-01-18|2019-08-07|Kyocera Corporation|Communication control method and user terminal for performing an offload in a wireless mobile telecommunications system|
CN103974331B|2013-02-06|2018-04-17|电信科学技术研究院|A kind of load-balancing method of heterogeneous network, equipment and system|
WO2014133589A1|2013-03-01|2014-09-04|Intel Corporation|Wireless local area networktraffic offloading|
US10091718B2|2013-03-26|2018-10-02|Futurewei Technologies, Inc.|System and method for wireless network selection|
CN104105154A|2013-04-01|2014-10-15|电信科学技术研究院|Network switching judgment method and device|
KR20140136365A|2013-05-20|2014-11-28|삼성전자주식회사|Method and apparatus for selecting wlan efficiently|
US9497682B2|2013-06-07|2016-11-15|Intel Corporation|Central processing unit and methods for supporting coordinated multipoint transmission in an LTE network|
US10212625B2|2013-06-17|2019-02-19|Advanced Network Technology Laboratories Pte Ltd|Intelligent mobile data offloading|
WO2014205817A1|2013-06-28|2014-12-31|华为技术有限公司|Data scheduling method, apparatus and system|
WO2015012900A1|2013-07-26|2015-01-29|Intel IP Corporation|Signaling interference information for user equipment assistance|
US9384508B2|2013-08-04|2016-07-05|Chit Yes, Llc|Systems, methods, and apparatus for wireless thermal printing for order fulfillment|
EP2836019B1|2013-08-09|2016-04-13|Alcatel Lucent|Load balancing of data flows|
US9585177B2|2013-12-11|2017-02-28|At&T Intellectual Property I, L.P.|Cellular connection sharing|
EP3086603A1|2013-12-20|2016-10-26|Kyocera Corporation|Communication control method|
US9763159B2|2014-04-23|2017-09-12|Mediatek Singapore Pte. Ltd.|Dynamic algorithms for WLAN-cellular performance estimation, access selection, and traffic offload|
US9788236B2|2014-05-30|2017-10-10|Qualcomm Incorporated|Interaction between WAN-WLAN interworking and WAN-WLAN aggregation|
US9706469B2|2014-06-03|2017-07-11|Intel Corporation|Radio resource controlprotocol for cell selection and traffic steering for integrated WLAN/3GPP radio access technologies|
WO2015184602A1|2014-06-04|2015-12-10|华为技术有限公司|Private low power node, wireless access point, user equipment and connection establishing method|
KR101920295B1|2014-08-21|2018-11-20|후아웨이 테크놀러지 컴퍼니 리미티드|Resource allocation and service transmission method and apparatus|
CN106797584A|2014-09-19|2017-05-31|索尼公司|For progressively adjusting system, method and computer program product that unloading is set|
CN104243596B|2014-09-24|2017-11-28|厦门美图移动科技有限公司|Method of managing software, equipment and mobile terminal|
WO2016047273A1|2014-09-25|2016-03-31|ソニー株式会社|Device and system|
WO2016095974A1|2014-12-16|2016-06-23|Telefonaktiebolaget Lm Ericsson |Methods and devices for access network selection|
KR102315585B1|2015-01-09|2021-10-21|주식회사 케이티|System, server and method for controlling compression rate according to web sites|
US9549360B2|2015-01-28|2017-01-17|Alcatel Lucent|User equipment assisted handover in licensed and unlicensed frequency bands|
KR101667211B1|2015-03-31|2016-10-18|한림대학교 산학협력단|Method and mobile device for localizing indoor using virtual access point and access point|
US9713036B2|2015-04-28|2017-07-18|Nokia Solutions And Networks Oy|Method and apparatus for implementing a distributed interworking based on user equipment throughput|
CN104980958B|2015-06-30|2019-05-31|北京奇虎科技有限公司|A kind of method and mobile terminal carrying out network login|
CN105101144B|2015-06-30|2019-05-31|北京奇虎科技有限公司|A kind of acquisition data method and mobile terminal for mobile terminal|
US9264944B1|2015-07-06|2016-02-16|Peerless Network, Inc.|SBC-localized handoff|
CN106557942B|2015-09-30|2020-07-10|百度在线网络技术(北京)有限公司|User relationship identification method and device|
TWI595795B|2015-12-02|2017-08-11|財團法人工業技術研究院|Offload determination system for multiple wireless network, server and method thereof|
WO2017127722A1|2016-01-20|2017-07-27|Lucent Medical Systems, Inc.|Low-frequency electromagnetic tracking|
CN105578529B|2016-03-09|2019-06-18|清华大学|A kind of selection system and method for access point|
US9497606B1|2016-03-24|2016-11-15|Peerless Network, Inc.|Native dialer fall-back|
US9992817B2|2016-04-18|2018-06-05|Honda Motor Co., Ltd.|Wireless data processing in a connected vehicle|
US9706351B1|2016-04-29|2017-07-11|Peerless Network, Inc.|Emergency call over a data network|
WO2018118755A1|2016-12-19|2018-06-28|Bandwidthx Inc.|Optimized offloading of wireless devices to alternative wireless networks|
WO2018125704A1|2016-12-27|2018-07-05|Bandwidthx Inc.|Radio management based on user intervention|
US10171967B2|2017-04-26|2019-01-01|Veniam, Inc.|Fast discovery, service-driven, and context-based connectivity for networks of autonomous vehicles|
CN113934472B|2021-12-16|2022-03-01|江西师范大学|Task unloading method, device, equipment and storage medium|
法律状态:
2017-10-03| B15I| Others concerning applications: loss of priority|
2017-11-28| B152| Others concerning applications: decision cancelled|
2017-12-05| B15I| Others concerning applications: loss of priority|
2018-01-02| B25A| Requested transfer of rights approved|Owner name: HEADWATER MANAGEMENT LLC (US) |
2018-01-16| B25D| Requested change of name of applicant approved|Owner name: HEADWATER RESEARCH LLC (US) |
2018-02-27| B12F| Appeal: other appeals|
2019-09-10| B06U| Preliminary requirement: requests with searches performed by other patent offices: suspension of the patent application procedure|
2021-01-12| B09A| Decision: intention to grant|
2021-03-16| B16A| Patent or certificate of addition of invention granted|Free format text: PRAZO DE VALIDADE: 20 (VINTE) ANOS CONTADOS A PARTIR DE 25/05/2011, OBSERVADAS AS CONDICOES LEGAIS. |
优先权:
申请号 | 申请日 | 专利标题
US34802210P| true| 2010-05-25|2010-05-25|
US61/348,022|2010-05-25|
US38115910P| true| 2010-09-09|2010-09-09|
US61/381,159|2010-09-09|
US201161435564P| true| 2011-01-24|2011-01-24|
US61/435,564|2011-01-24|
PCT/US2011/000938|WO2011149533A1|2010-05-25|2011-05-25|System and method for wireless network offloading|
[返回顶部]