This disclosure relates in general to wireless communication and, but not by way of limitation, to wireless communication using one or more unlicensed frequency bands among other things.
The availability of spectrum for unlicensed operations has spawned a significant market for unlicensed devices. These devices range from simple consumer devices, such as cordless telephones, remote control toys, personal computers, garage door openers and baby monitors to sophisticated business and commercial applications, such as security systems, inventory control systems, manufacturing controls, and business computing networks.
The growing popularity of computer networking has stimulated a heightened interest in unlicensed technology and one of the fastest growing applications of unlicensed devices is for wireless local area networks (WLANS). Because most businesses and many homes now have multiple computers, users often find it desirable to install local area networks to share resources such as printers, scanners and broadband or dial-up Internet connections. Developing a local area network using wireless unlicensed devices can be cost-attractive when compared with the costs of wired networks and offers the added benefit of instant portability.
The same spread spectrum technology that has been used for cordless telephones and other unlicensed devices has been adapted to meet the surging demand for computer and data networking. Among the more popular of these unlicensed devices are wireless data devices that operate in the 2.4 GHz band in accordance with the 802.11b or “WiFi” standards and protocols developed by the LAN/MAN Standards Committee (LMSC) of the Institute of Electrical and Electronic Engineers. Unlicensed devices operating under the 802.11b/WiFi protocols can be used to link computers or other digital devices at distances up to about 150 feet and with data rates of up to 11 Mbps. Other IEEE protocols have recently been developed, such as 802.11a which operates at 5 GHz and 802.11g which is an extension of 802.11b, that provide even higher data rates. Another unlicensed wireless networking standard is HomeRF developed by the HomeRF Working Group. This technology provides data capabilities similar to WiFi but also includes voice capability.
Unlicensed consumer devices are also being developed to provide very short-range (on the order of 10 meters) wireless “personal area” networks (WPANs). “Bluetooth,” which uses 2.4 GHz spread spectrum frequency hopping technology, is the dominant WPAN technology at this time. Bluetooth devices are beginning to be included in many devices such as mobile radiotelephones, laptop computers, printers and personal digital assistants (PDAs) and some experts believe that it could become a standard feature in many consumer electronic devices. Finally, other unlicensed technologies, such as power line carrier (PLC) systems that use the electric power lines to transmit data and ultra wideband (UWB) devices, are being developed and hold great promise for providing consumers with new data and computer networking capabilities.
While the Federal Communication Commission provides regulatory authority over unlicensed spectrum, often the rules and etiquette established by industry groups shape use within the unlicensed spectrum. These spectrum protocols or etiquettes are the rules or procedures that must be used by unlicensed devices to gain access to the spectrum. For example, a simple spectrum etiquette might require that a device “listen” for a certain period of time to ensure that the spectrum is unoccupied before it begins transmitting and that transmissions be limited to a fixed amount of time so that no one device can occupy the spectrum all of the time. There are currently mandatory protocols in Part 15 of the rules for Unlicensed PCS systems. In addition, industry groups such as IEEE have developed and are developing voluntary protocols for certain types of unlicensed devices. For example, IEEE Task Group 802.15.2 is developing recommended practices for the collaborative use of WiFi and Bluetooth devices in the 2.4 GHz range to ensure that these devices can co-exist and do not interfere with each other.
Moreover, other issues related to the unlicensed spectrum include aggregation of noise across the spectrum. Such noise aggregation may limit their range or raise the cost of infrastructure to serve a given communication market.
A wireless device with multiple antennas is provided according to one embodiment of the invention. The wireless device may be configured to utilize the antennas to communicate with one or more wireless terminals in various ways. According to various embodiments of the invention, these scenarios may include, for example, switching between antennas and therefore potentially switching between networks based on application-specific needs; switching antennas based on range limitations; switching between antennas based on aggregation on one network; utilizing multiple antennas to handle high data throughput; switching between antennas based on security needs; and/or switching between antennas based on cost. Various other embodiments of the invention may provide a wireless device that may switch between antennas and therefore networks based on any combination of these scenarios. Methods for switching between wireless networks based on various parameters are also disclosed. The examples described below are provided to show application of various embodiments of the disclosure and are not used to limit the scope and/or claims of the disclosure.
As a first example, a user may use an instant message (IM) application on a wireless device that requires very little bandwidth using a first wireless network. After using the IM application the user may then surf the web using a web browser application that may require significantly more bandwidth. Accordingly, the wireless device may search to a second wireless network using a second antenna that may provide the required bandwidth for surfing the web.
As another example, a user may approach the range limits of a first wireless network. The wireless device and/or wireless terminal may measure the signal strength of the signals between the two devices. As the wireless device approaches or passes the range limit, the wireless device may determine if there are other available wireless networks available that the wireless device is within range. The wireless device may then switch to another wireless network that is within range. The wireless device may take bandwidth, latency, cost and/or security into account when determining which of the available networks to switch if any.
As another example, a user may use a wireless device connected with a first wireless network using a first antenna. The wireless network may or may not require a fee to gain access to the first wireless network. The wireless network may slow because of network aggregation and/or congestion. The mobile device may detect this aggregation and/or congestion by measuring a decrease in bandwidth and/or an increase in latency. The mobile device may then search for and find a second wireless network with less aggregation and/or congestion. The wireless device may then switch to the second wireless network using a second antenna.
As yet another example, a wireless device may utilize multiple wireless networks via multiple antennas to provide increased data throughput. For instance, the user may require data throughput greater than an individual wireless network may provide. Accordingly, the wireless device may communicate with a network over multiple wireless networks thus increasing the data throughput. Data may be communicated in data packets in various configurations. Data packets may be communicated over an individual network based on the percentage of bandwidth the individual network may provide. Accordingly, the data may be spread across multiple frequency bands. These frequency bands may be unlicensed frequency bands. Moreover, each frequency band may require a different modulation, multiplexing, and/or coding scheme.
As another example, a wireless device may switch between antennas based on security needs. A user may use a wireless device to access a secure webpage such as a bank's webpage. In doing so the user may require a heightened level of security. As such, if the wireless device used by the user is not connected to the Internet over a wireless network with a high enough level of security, the wireless device may search for other wireless networks with higher levels of security. If the wireless device finds a more secure wireless network, the wireless device may connect to that network in order to provide the necessary level of security to the user. In doing so, for example, the wireless device may sacrifice bandwidth, speed, latency, etc. in order to provide the required security.
As a final example, the wireless device may switch between antennas based on cost. A user may gain access to a first wireless network using a first antenna. Access to the first wireless network may require a fee. While accessing the first wireless network, the wireless device may search for other available networks in the area. If a second, less expensive wireless network is available, the wireless device may switch to the second wireless network. The second wireless network may be accessed using a second antenna. In some cases, the user may be prompted whether they wish to switch to the second wireless network and may be made aware of the speed, bandwidth and/or latency differences between the two networks.
A method for allocating wireless communication over one or more frequency bands of the unlicensed frequency spectrum is disclosed according to one embodiment of the invention. The method may include detecting the signal strength of each of the frequency bands and determining whether the signal strength of each of the frequency bands is greater than a threshold value. The method may also include allocating data packets to the available frequency bands with a signal strength greater than a threshold value, wherein the data packets are assigned in proportion to the available bandwidth at each frequency band, and transmitting data packets within the allocated frequency bands. The frequency bands may include frequency bands in the unlicensed frequency spectrum. The frequency bands may include frequency bands centered around about 450 MHz, 850 MHz, 868 MHz, 900 MHz, 915 MHz, 1.7 GHz, 1.8 GHz, 1.9 GHz, 2.0 GHz 2.1 GHz, 2.3 GHz, 2.4 MHz, 2.5 GHz, 2.7 GHz, 3.5 GHz, 3.7 GHz, 5.3 GHz, 5.4 GHz, 5,7 GHz and 5.8 GHz. Other frequency bands may also be used as shown in the tables below.
A method for wireless communication between a wireless device and wireless terminals is disclosed according to one embodiment of the invention. The wireless device may include a plurality of antennas configured to transmit data within a plurality of frequency bands. The method may include transmitting data over a first wireless communication signal using a first frequency band to a recipient through a first communication wireless terminal and monitoring the signal strength of the first signal. The method may also include determining whether the signal strength of the first signal is below a threshold value. The method may determine the availability of frequency bands other than the first frequency band and transmit data over an available frequency band other than the first frequency band when the signal strength of the first signal is below the threshold value. The wireless device may be a mobile phone and the data is voice data. The method may also include measuring the bandwidth of the available frequency bands other than the first frequency band. The frequency bands may include frequency bands centered around about 450 MHz, 850 MHz, 868 MHz, 900 MHz, 915 MHz, 1.7 GHz, 1.8 GHz, 1.9 GHz, 2.0 GHz 2.1 GHz, 2.3 GHz, 2.4 MHz, 2.5 GHz, 2.7 GHz, 3.5 GHz, 3.7 GHz and 5.8 GHz. Other frequency bands may also be used as shown in the tables below.
A wireless device is also disclosed according to one embodiment of the invention. The wireless device may include a plurality of antennas and a controller. Each antenna may be configured to communicate with one or more wireless terminals using a different frequency band. The controller may be coupled with the plurality of antennas. The controller may be configured to determine the available bandwidth of each frequency band and configured to allocate the transmission of data packets over each of the frequency bands with available bandwidth. The wireless device may be configured to access portions of the unlicensed frequency spectrum.
A method for communicating wirelessly between a wireless device and a wireless terminal is provided according to another embodiment of the invention. The method may include communicating data between the wireless device and the wireless terminal using a first frequency band, wherein the data comprises a first data type. The method also includes detecting a change in the data from a first data type to a second data type. The method further includes communicating data between the wireless device and the wireless terminal using a second frequency band, wherein the second frequency band provides network efficiencies. The method may further include communicating the data with the second data type between the wireless device and the wireless terminal using the second frequency band. The second frequency is at least as efficient as communicating data in the second type using the first frequency band. The first data type and the second data type may include voice-over IP; TCP/IP, UDP, multimedia data, instant messaging, text messaging, internet protocol packet, voice-over instant messaging, SCTP, and SPX.
A method for wireless communication between a wireless device and communication wireless terminals is provided according to one embodiment of the invention. The wireless device may include a plurality of antennas configured to transmit data using a plurality of wireless networks. The method may include transmitting data with a first wireless network and detecting a change in an application-specific network characteristic at the wireless device. The method may then transmit data with a second wireless network, wherein the second wireless network provides network characteristics that satisfy the application-specific network characteristic. The application-specific network characteristic may include bandwidth, latency, security, and/or cost. Each of the wireless networks may include a frequency band within which data is communicated. The method may further include transmitting data with a third wireless network, wherein the third wireless network provides network characteristics that satisfy the application-specific network characteristic in conjunction with the second wireless network.
Further areas of applicability of the present disclosure will become apparent from the detailed description provided hereinafter. It should be understood that the detailed description and specific examples, while indicating various embodiments, are intended for purposes of illustration only and are not intended to necessarily limit the scope of the disclosure.
In the appended figures, similar components and/or features may have the same reference label. Further, various components of the same type may be distinguished by following the reference label by a dash and a second label that distinguishes among the similar components. If only the first reference label is used in the specification, the description is applicable to any one of the similar components having the same first reference label irrespective of the second reference label.
The ensuing description provides preferred exemplary embodiment(s) only, and is not intended to limit the scope, applicability or configuration of the disclosure. Rather, the ensuing description of the preferred exemplary embodiment(s) will provide those skilled in the art with an enabling description for implementing a preferred exemplary embodiment. It being understood that various changes may be made in the function and arrangement of elements without departing from the spirit and scope as set forth in the appended claims.
As used throughout this disclosure, the term “wireless network” refers to any type of communication network whose interconnections between nodes are implemented without the use of wires. A wireless network uses electromagnetic waves as a carrier wave. In some cases wireless networks operate using any of number of wireless protocols and/or standards. For instance, protocols and/or standards may be implemented by a consumer group such as the IEEE and/or a government agency such as the FCC. A wireless network may also operate at given frequency band. Wireless protocols and/or standards often dictate the means for sharing of a frequency band, the power of transmitters using the band which corresponds to the range and the data bandwidth of the frequency band.
The term “frequency band” refers to a portion of the electromagnetic spectrum that is used as a carrier wave for a data signal. Typically frequency bands are referred to based on their center frequency and are bounded by a lower and upper bounds. Many wireless frequency bands in particular are portions of the unlicensed spectrum. These frequency bands may include, for example, PCS, AWS, cellular, GSM, WiMax, marine frequencies, aviation frequencies and deep space frequency bands. The following table lists, without limitation, exemplary frequency bands and. This listing may not be complete. Various other frequency bands may be used by the embodiments of the invention.
As used throughout this disclosure the term “bandwidth” refers to data rate. That is, bandwidth may refer to the number of bits or bytes that may be transmitted in a period of time. For example, a wireless network with a bandwidth of 100 Kbit/s transmits 100,000 bits per second. The bandwidth of a wireless network may depend on a number of factors. The term “throughput” may be used throughout this disclosure as a synonym for bandwidth.
As used throughout this disclosure the term “wireless device” refers to a device that communicates wirelessly with a network. The wireless device may be mobile or stationary. For example a wireless device may be a personal data assistant, a mobile phone, a telephone, a voice-over IP telephone, a computer, a laptop, a server, a digital music device, smart-hone, etc.
As used throughout this disclosure the term “wireless protocol” refers to a standard for communication over a wireless network. Wireless protocols may be designated by a professional organization (such as IEEE) or a government agency (such as the FCC). These protocols may dictate how frequency bands are shared. A wireless protocol may be part of the data link layer. A wireless protocol may dictate the frequency band, the power, the range, and/or the modulation scheme used for devices that communicate within a specific frequency band. Wireless protocols may include, for example, wireless application protocol, wireless internet protocol, wireless routing protocol, Bluetooth, WiFi 802.11a/b/g/n, EDDO, COMA, wireless USB, wireless LAN, Imax, etc.
The following table lists exemplary wireless protocols, their frequency bands, downlink and uplink rates, wireless operating range and whether the protocol operates within a licensed or unlicensed portion of the spectrum. The table is in no way meant to be definitive or complete. Rather, the table is provided as an example of various wireless protocols. While these protocols are shown, those skilled in the art will recognize that any other protocol, wireless network, frequency band, etc may be used by the embodiments of the invention, without limitation.
The term “wireless protocol” may further extend to refer to a “wireless communication standard”. Various wireless communication standards are currently in use. For example, these standards may include the 0G, 0.5G, 1G, 2G, 2.5G, 2.75G, 3G, 3.5G, 3.75G, 4G and/or any further generation of theses standards. For example, the 0G standard may include PTT, MTS, IMTS, and/or AMTS. For example, the 0.5G standard may include Autotel/PALM, ARP, IG, NMT, AMPS, Hicap, CDPD, Mobitex, and/or DataTac. For example, the 2G standard may include GSM, iDEN, D-AMPS, cdmaOne, PDC, CSD, and/or PHS. For example, the 2.5G standard may include GPRS, HSCSD, and WiDEN. For example, the 2.75G standard may include CDMA2000 1xRTT, and/or EDGE. For example, the 3G standard may include W-CDMA, UMTS, FOMA, TD-CDMA/UMTS-TDD, CDMA2000 1xEV, TD-SCDMA, UMA, and/pr Mobile WiMAX. For example, the 3.5G standard may include HSDPA. For example, the 3.75G standard may include HSUPA and/or HSOPA/LTE. For example, the 4G standard may include UMB.
As used throughout this disclosure the term “wireless terminal” is a device that communicates wirelessly with a wireless device. A wireless terminal may be the link between a wireless device and a network. For example, a wireless terminal may include, without limitation, a wireless router, wireless switch, a cellular antenna, a cell site, a mobile phone mast, a base station, a cell site, a base transceiver station, etc.
As used throughout this disclosure the term “network efficiency” refers generally to use of a wireless network that avoids latency and yet does not use more bandwidth than is needed. For example, an efficient use of a wireless network has no latency and yet transmits data at a rate near the bandwidth limit of the wireless network. As another example, use of a wireless network with either latency or transmitting data at a lower data rate while tying up a higher bandwidth results in a less efficient network.
As used throughout this disclosure the term “range” is the maximum range possible to receive data at 25% of the typical rate.
According to one or more embodiments of the invention, a wireless device with multiple antennas is provided. Each antenna may be configured to communicate with a wireless terminal using a different frequency band. For example, a wireless device may be configured with three antennas. The first antenna can communicate with a router using WiFi at 5.25 MHz, the second antenna can communicate with an EDGE router at 2.75 GHz, and the third antenna can communicate with a CDMA2000 router at 900 MHz.
A wireless device 110 with multiple antennas may be configured to utilize the antennas to communicate with one or more wireless terminals in various ways. According to various embodiments of the invention, these scenarios may include, for example, 1) switching between antennas and therefore potentially switching between networks based on application-specific needs; 2) switching antennas based on range limitations; 3) switching between antennas based on aggregation on one network; 4) utilizing multiple antennas to handle high data throughput; 5) switching between antennas based on security needs; and/or 6) switching between antennas based on cost. Various other embodiments of the invention may provide a wireless device 110 that may switch between antennas and therefore networks based on any combination of these scenarios.
Application-Specific Bandwidth Use
The wireless device may switch between antennas, and therefore potentially switch between wireless networks, based on application-specific bandwidth use according to one embodiment of the invention. For example, a user may be using an instant message (IM) application on the wireless device to communicate with a friend. An IM application may use only a very small portion of the available bandwidth at a first frequency band. Accordingly, a low bandwidth connection, such as a WiFi network, may provide the requisite level of service for the IM application executing on the wireless device. Moreover, some protocols associated with different frequency bands may provide efficiencies specific for IM applications. Thus, the wireless device may communicate IMs using a first antenna over the first network operating with a first frequency band.
For example, the user may stop using the using the IM application and then proceed to view a video on the Internet. The video may be streamed using UDP packets, for example. The video stream requires increased bandwidth over the bandwidth required for the IM application. Accordingly, the wireless device may switch to a second wireless terminal over a second frequency band. The second wireless terminal and the first wireless terminal may be part of the same wireless terminal and provide multiple access to the network. The second frequency band may have more bandwidth to provide the increase in data packets from the IM application to the video application. For example, the second wireless network may be a WiMAX network. The second wireless terminal may also require a second protocol that provides for efficiencies streaming the video.
For example, the user may then stop streaming video and turn to reading and responding to email messages. As such, the wireless device may react to the changed bandwidth needs from streaming video to email reading and sending. Accordingly, if a third wireless network is available that provides efficiencies for email traffic over the first and second wireless networks and if the third wireless network has a significantly strong signal, the wireless device may switch to the third wireless network while the user is emailing. This third wireless network may be either the first or second wireless network. The wireless device may switch to this third wireless network based on heuristic measurements of past use. These heuristic measures may depend on specific users. A wireless device that switches between protocols and/or wireless networks, according to this embodiment of the invention, provides efficiencies in the network and may increase the total bandwidth available for all users.
As another example, a family may have access to a wireless router that provides WiFi and WiMAX network connectivity. Accordingly, if the kids require small bandwidth for IM applications or chatting, the kids may gain access to the Internet using the WiFi network. A parent, on the other hand, may use a virtual private network application to connect to a secure network and require higher bandwidth for work applications. Accordingly, the parent may access the network over the WiMAX network. As the parent and/or children's use changes, the wireless devices in use may switch between networks to provide the proper efficiencies.
As another example, a user may access a network for small bandwidth applications using an EDGE network. The wireless device may switch to a WiMAX network or a WiFi network for higher bandwidth needs.
The wireless device may change to the second frequency band based not only on bandwidth, but may also change to the second frequency based on network efficiency. For example, an IM application transmits and receives small amounts of data. However, some protocols and/or wireless networks communicate IM data using a large amount of bandwidth that may tie up network resources. Accordingly, if the user is surfing the web using a first wireless network and then begins to use an IM application, while the first wireless network should provide the requisite bandwidth for the IM application, it may do so inefficiently and tie up network resources. Therefore, a change to a second more efficient network for an IM application may be more efficient.
If the bandwidth requirement or use has decreased, the wireless device searches for available frequency bands at block 220. A separate routine, system, method, etc. may continuously search for available bandwidths and provide the results in a lookup table or other data structure. In such a case, the method may look at the data corresponding to available networks at block 220. Various other schemes may be employed to determine the available frequency bands. If the search returns a frequency band that provides a smaller bandwidth as determined at block 225, the data, such as packets, are allocated at block 330 among the smaller bandwidth; otherwise the method returns to block 205. Thus, if the application bandwidth requirements have decreased, the method searches for a frequency band that provides a more efficient communication scheme. Accordingly, bandwidth resources are not tied up with an application that requires low bandwidth. Thus, more efficient network use is utilized by the wireless device.
Returning back to block 215, if the application bandwidth requirement has increased, the system determines if the current band can support the bandwidth increase at block 240. If so, the mobile device continues to use the current frequency band and returns to block 205. Otherwise, the system again searches for available frequency bands at block 245. This search may be similar to the search performed in block 220. The mobile device then determines whether any of the available frequency bands can handle the increased bandwidth at block 250. If so, the data is transmitted on a new frequency band at block 255. In either case, the mobile device continues to monitor the bandwidth use of the application at block 205. Transmitting data on an available frequency band may occur over more than one frequency band.
Various other application-specific changes may initiate changes in the frequency band under which the wireless device connects with a network. For example, general web browsing, emailing, downloading files, playing network games, making a VOIP phone call, text messaging, instant messaging, streaming audio or video and/or using a virtual private network may initiate changes in network efficiency or necessitate an increase in bandwidth.
Range Limitations
The wireless device may switch between antennas and therefore wireless networks based on the range limitation of the wireless network in use according to one embodiment of the invention. Wireless networks have range limitations. For example, WiFi at 5.25 GHz using the 802.11a standard has a range of approximately 35 meters to 120 meters. As another example, CDMA EVDO has a range of about 18 miles. These range limitations may be dictated by power requirements of the wireless protocol.
According to this embodiment of the invention, the wireless device transmits and receives data on a first wireless network. During operation, the wireless device may monitor the signal strength of the first wireless network. Signal strength is an indicator of whether the wireless device is within the range of the wireless terminal or if the wireless device is approaching the range limit. Accordingly, if the wireless device detects that the signal strength has decreased below a threshold, the wireless device may monitor the available networks. If the wireless device detects that the signal strength at a second wireless network is greater than the first wireless network, then the wireless device may switch to the second wireless network. In another embodiment, the signal strength of the second network may be compared with a second threshold value. If the first signal strength is below the first threshold value and the second signal strength is greater than the second threshold value, then a change from the first to the second wireless network may occur. The wireless device may monitor the signal strength of the first wireless network. If the signal strength of the first wireless network is above the threshold value, then the wireless device may switch back to the first wireless network.
If the device is approaching the range limits as found in block 320, then the wireless device may search for available bands at block 325. This search may be similar to the search performed in block 220 of
Switching Based On Network Aggregation
According to another embodiment of the invention, switching between antennas may be based on network aggregation and/or congestion. Network congestion occurs when a wireless network carries so much data that its quality of service deteriorates. Typical effects, for example, may include queuing delay, packet loss or the blocking of new connections. One consequence of these latter two is that incremental increases in offered load lead either only to small increases in network throughput, or to an actual reduction in network throughput. Often exponential back-off is employed to avoid network congestion. Any type of back-off by a wireless device leads to a decrease in throughput and or bandwidth. Accordingly, the wireless device may monitor the throughput of the data transmitted over a first wireless network. If the wireless device determines that throughput has dropped below a threshold level, the wireless device may search for other available wireless networks. The wireless device may then select an available second wireless network based on the throughput of the second wireless network. In such an embodiment, the multiple antennas on a wireless device potentially provide more than one option for communication over a wireless network and permit a wireless device to find a wireless network that provides the necessary throughput for the needs of the user and/or applications.
Multiple Network Throughput
According to another embodiment of the invention, multiple antennas may be utilized to handle high data throughput. For example, if a first wireless network does not provide the bandwidth required by the wireless device, then the data may be transmitted over more than one wireless network. The data may be transmitted in packets. Packets may be allocated to wireless networks based on the throughput of each wireless network. The packets may be transmitted sequentially or in random order. The order of packet transmission may depend on the type of packets being transmitted.
While the examples shown in
Switching Based On Security
According to another embodiment of the invention switching between antennas may be based on security needs. Some wireless networks and protocols are inherently more secure. For example, WiFi networks may include a wired equivalent polociy (WEP) and/or WiFi Protected Access (WPA) encryption Accordingly, a user or a wireless device may select a wireless network based on their security requirements. For example, a user may be surfing the web on a wireless device on a first wireless network. The first wireless network has little security. The user then wishes to manage their finances and they point their browser to a financial webpage and proceeds to login to their secure account. At this point the wireless device recognizes the need for security. The wireless device monitors the available wireless networks, chooses a more secure network, and connects to the more secure network. The wireless device then communicates with the financial institution webpage through the more secure wireless network. This embodiment of the invention may reject higher bandwidth, throughput, cost, etc. in favor of increased security.
As another example, email, applications and/or files with security features enabled may be atomically transmitted over a secure wireless network rather than an non secure network. Some security features may include emails from corporate email domains, internal emails, applications with security features enabled, HTTPS webpages, VPN tunnels, etc. Moreover, various levels of security may also be used. Individual users may require security for all email traffic because of government or trade secret concerns. Moreover, individuals such as financial service providers, doctors, lawyers, accounts may require heightened security. For example, the 4.9 GHz frequency band is designated for secure purposes and may be used to provide secure wireless network access.
Switching Based On Network Access Costs
According to another embodiment of the invention switching between antennas may be based on network access costs. Some network access requires payment to access the network or even to access high quality of service on the network. Wireless service providers may charge a premium for such services. Often wireless access may be accomplished over low cost or free networks if they are available. Accordingly, the wireless device may monitor the available networks compatible with the antennas associated with the wireless device and connect to a wireless network(s) based on the fees required for access.
According to another embodiment of the invention the wireless device may determine the available wireless networks and then ask a user to determine which wireless network they prefer. The user may be presented with the cost, security and bandwidth of the networks prior to making a choice. For example, the wireless device may detect three wireless networks. The first wireless network has a high bandwidth and high cost to access. The second wireless network has a lower cost and lower bandwidth and the third wireless network is free but has a much lower bandwidth. Accordingly, the user may choose the lowest bandwidth network over the higher bandwidth networks based on cost or may choose any of the three networks based on the users discretion.
Wireless Devices
The security module 1570 may be used to determine the security requirements of the wireless device. The security module may also determine the security level of available bandwidths and whether or not the security of the available bandwidths is sufficient to provide the required level of security. The bandwidth module 1575 may operate to detect the bandwidth of the current wireless network or networks as well as detect the bandwidth of the available wireless networks. The bandwidth module may monitor the bandwidth requirements of the wireless device. The bandwidth module may also operate to determine the bandwidth available over a plurality of bands and how best to allocate data over these bands. The cost module may operate to determine the cost of various frequency bands at block 1580. The band availability module 1585 may detect the availability of wireless networks.
While some portions of the disclosure discuss switching networks by switching antennas, the wireless device may switch networks without switching antennas. For example, a user may access the Internet using a first WiFi network that requires a fee to access. The user may be using the first network and searching for other networks. The wireless device may detect a second WiFi network that does not require an access fee. Accordingly, the wireless device may access the second WiFi network without switching antennas.
The wireless device may also switch between coding, multiplexing and/or modulation schemes as it communicates with a wireless terminal using various wireless networks. These coding, multiplexing and/or modulation schemes may be provided by the protocols associated with the frequency band.
Wireless terminal devices that communicate with wireless devices may also include multiple antennas according to one embodiment of the invention. Accordingly, a single wireless terminal may be coupled with one or more physical network connection such as with a DSL connection, cable connection, Ethernet connection, etc. The wireless terminal may communicate with one or more wireless devices using one or more antennas. As such, the wireless terminals may communicate using one or more wireless networks.
For example, a profile may include: a work hour profile with the user typically uploads large data file during work hours, after hours profile when the user typically only checks email and possibly checks sport scores on the web; teenager after school profile where the user typically instant messages with friends; teenager in school profile where the device typically lies dormant; on the road profile where the user may access the network from any of various locations and require specific bandwidth needs while traveling, commuting profile where the user typically only uses the telephone while commuting, weekend profile with intermittent network requirements, etc.
When a user logs into their wireless access account at block 1625, the network identifies the current parameters such as time of day, day of week, location, account type, etc. at block 1630. The usage profile associated with these parameters may be retrieved from storage at block 1635. The network may then allocate bandwidth, available wireless channels, and/or quality of service based on the usage profile at block 1640.
For example, a businessman may have established a work day profile between the hours of 9:00 AM and 5:00 PM where the business man sends between 200-300 emails a day many with large data uploads. The businessman logs into a wireless account during working hours his profile is loaded. Accordingly, the network provides two channels a WiFi secure channel for email and a WiMax channel for the large data uploads. Accordingly, the WiFi channel is automatically used for normal email communication (small data sizes) and the WiMax channel is used in the event a large data file is sent via email.
As another example, a teenager has established a profile that shows that 99.9% of the wireless network traffic from the teenager in after school hours are instant messages to a select group of people. When the teenager logs into a public library and registers with the network, the network allocates a single WiFi connection over a free unsecure connection maintained by the library. Another network may be held in backup, such as an EDGE network.
As yet another example, an attorney is working on a vacation at a park during typical business hours. Her profile requires secure access, uses email with medium file sizes throughout the day, and she has paid for premium service. When the attorney logs into her wireless account, the network locates her profile and provides a secure EVDO network channel as a primary email channel and a WiMax backup for medium to large data transfers. Both channels have dedicated higher quality of service but may be lower quality of service than a high bandwidth user. Another user in the same vicinity may also access the network with either or both the EVDO or the WiMas channels. This second user has a poor payment history or may not have a premium account. As such, as the second user access the network and conflicts with the attorney, the second user's access is prioritized below the attorneys providing the attorney with a higher quality of services over the second user.
Specific details are given in the above description to provide a thorough understanding of the embodiments. However, it is understood that the embodiments may be practiced without these specific details. For example, circuits may be shown in block diagrams in order not to obscure the embodiments in unnecessary detail. In other instances, well-known circuits, processes, algorithms, structures, and techniques may be shown without unnecessary detail in order to avoid obscuring the embodiments.
Implementation of the techniques, blocks, steps and means described above may be done in various ways. For example, these techniques, blocks, steps and means may be implemented in hardware, software, or a combination thereof. For a hardware implementation, the processing units may be implemented within one or more application-specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable gate arrays (FPGAs), processors, controllers, micro-controllers, microprocessors, other electronic units designed to perform the functions described above and/or a combination thereof.
Also, it is noted that the embodiments may be described as a process which is depicted as a flowchart, a flow diagram, a data flow diagram, a structure diagram, or a block diagram. Although a flowchart may describe the operations as a sequential process, many of the operations can be performed in parallel or concurrently. In addition, the order of the operations may be rearranged. A process is terminated when its operations are completed, but could have additional steps not included in the figure. A process may correspond to a method, a function, a procedure, a subroutine, a subprogram, etc. When a process corresponds to a function, its termination corresponds to a return of the function to the calling function or the main function.
Furthermore, embodiments may be implemented by hardware, software, scripting languages, firmware, middleware, microcode, hardware description languages and/or any combination thereof. When implemented in software, firmware, middleware, scripting language and/or microcode, the program code or code segments to perform the necessary tasks may be stored in a machine readable medium, such as a storage medium. A code segment or machine-executable instruction may represent a procedure, a function, a subprogram, a program, a routine, a subroutine, a module, a software package, a script, a class, or any combination of instructions, data structures and/or program statements. A code segment may be coupled to another code segment or a hardware circuit by passing and/or receiving information, data, arguments, parameters and/or memory contents. Information, arguments, parameters, data, etc. may be passed, forwarded, or transmitted via any suitable means including memory sharing, message passing, token passing, network transmission, etc.
For a firmware and/or software implementation, the methodologies may be implemented with modules (e.g., procedures, functions, and so on) that perform the functions described herein. Any machine-readable medium tangibly embodying instructions may be used in implementing the methodologies described herein. For example, software codes may be stored in a memory. Memory may be implemented within the processor or external to the processor. As used herein the term “memory” refers to any type of long term, short term, volatile, nonvolatile, or other storage medium and is not to be limited to any particular type of memory or number of memories, or type of media upon which memory is stored.
Moreover, as disclosed herein, the term “storage medium” may represent one or more devices for storing data, including read only memory (ROM), random access memory (RAM), magnetic RAM, core memory, magnetic disk storage mediums, optical storage mediums, flash memory devices and/or other machine readable mediums for storing information. The term “machine-readable medium” includes, but is not limited to portable or fixed storage devices, optical storage devices, wireless channels and/or various other mediums capable of storing, containing or carrying instruction(s) and/or data.
While the principles of the disclosure have been described above in connection with specific apparatuses and methods, it is to be clearly understood that this description is made only by way of example and not as limitation on the scope of the disclosure.