The present invention relates generally to wireless networks. More particularly, this invention relates to centralized wireless LAN load balancing.
Wireless communication networks for providing links to mobile stations are well known in the art. In one type of wireless network, a series of access points provide wireless connections to various mobile users. For example, a building can include access points located at strategic locations to serve mobile users as they move throughout the building. The mobile users migrate from access point to access point based upon the strength of beacon signals from the various access points. That is, the mobile stations use the strength of the beacon signals to select the best access point at a given point in time.
With changes in the channel environment and/or number of users in a wireless local area network (WLAN) system, different access points experience different traffic loading. That is, the number of users served by each of the access points varies over time. Those access points that serve a relatively high number of stations (hot spots) can become overloaded and experience reduced performance. For example, an access point can become overloaded during a meeting in a conference room proximate the access point when the attendees attempt to connect their laptops to the corporate intranet.
When a mobile station entering a WLAN (e.g., via association or re-association), the mobile station broadcast a message in the WLAN (e.g., probe request) to some of all of the access points of the WLAN). In response each of the access points (APs) responds to the mobile station. Thereafter, the mobile station selects one of the access points to associate with based on the responses received from each of the access points (e.g., received signal strength indication or RSSI). However, when the mobile station selects an access point, the traffic load of the access point being associated and other access points may not be taken into consideration. As a result, the selected access point may not be the most appropriate one (e.g., having the least traffic load).
A centralized wireless LAN load balancing mechanism is described herein. In one embodiment, in response to a request for entering a wireless network from a wireless station and forwarded from multiple access points (APs) of the wireless network, a network access device coupled to the multiple APs determines a load for each of the APs. The network access device then selects one of the APs based on the determined loads of the APs and instructs the selected AP to associate with the wireless station. The network access device further instructs the remaining APs to reject the request.
Other features of the present invention will be apparent from the accompanying drawings and from the detailed description which follows.
The present invention is illustrated by way of example and not limitation in the figures of the accompanying drawings in which like references indicate similar elements.
A centralized wireless LAN load balancing mechanism is described herein. In the following description, numerous details are set forth to provide a more thorough explanation of the present invention. It will be apparent, however, to one skilled in the art, that the present invention may be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form, rather than in detail, in order to avoid obscuring the present invention.
Reference in the specification to “one embodiment” or “an embodiment” means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the invention. The appearances of the phrase “in one embodiment” in various places in the specification do not necessarily all refer to the same embodiment.
Throughout this application, for the purposes of illustration, a wireless local area network (WLAN) with IEEE 802.11 protocol is used as an example to demonstrate embodiments of the invention. However, embodiments of the invention are not limited to the WLAN and/or IEEE 802.11 protocol, other types of wireless network and/or wireless protocols may also be applied.
According to one embodiment, multiple access points (APs) governed by a network access device (e.g., gateway, switch, router, etc.) can be deployed in substantially the same region with substantially the same SSID (service set identifier) and security settings to provide larger coverage and wireless client station (WS) roaming support. A centralized dynamic load balance control protocol is utilized between the network access device and some or all of these APs to control association of WS to balance the load of each AP. In this way, the quality of service (QoS) of overall network and efficient WS roaming, as well as a good performance improvement feature for distributed WLAN network, can be achieved.
According to one embodiment, factors that affect the QoS of distributed WLAN network may be taken into account to determine each AP's load, which may be represented as weights determined via a predetermined formula, also referred to as a WLAN dynamic load balance algorithm (WLBA). In addition, a WLAN dynamic load balance control protocol (WLBP) between a network access device and each governed AP to exchange data and management packets. As a result, the network access device can collect all QoS data from APs and compute the weight for each AP based on the WLBA to determine which AP is the appropriate one to accept the association from WS. The WLBA and/or WLBP may also be used in disassociation and/or re-association situations.
Once the network access device determines the appropriate AP, according to one embodiment, the network access device then issues one or more management packets to a selected AP to direct WS to join the dedicated AP through WLBP protocol. In this way, the load of AP including number of associated WS, throughput, and frame error rate (FER) can be balanced properly, and the entire network performance can be improved from anticipated WS symmetry associations. Furthermore, the network access device can provision the weight threshold to detect WS roaming and direct WS to join the new AP with less handoff delay.
Typically, the association service is used to make a logical connection between a mobile station and an access point. Each mobile station has to become associated with an access point before it is allowed to send or receive data through the access point over the network. The connection is necessary in order for the network to know where and how to deliver data to the mobile station. The mobile station invokes the association service once and only once, typically when the mobile station enters the network. Each mobile station can associate with one access point though an access point can associate with multiple stations.
The disassociation service is used either to force a mobile station to eliminate an association with an access point or for a mobile station to inform an access point that it no longer requires the services of the network. When a mobile station becomes disassociated, it may begin a new association to communicate with another access point again. An access point may force a mobile station or stations to disassociate because of resource restraints (e.g., the access point is shutting down or being removed from the network for a variety of reasons). When a mobile station is aware that it will no longer require the services of an access point, it may invoke the disassociation service to notify the access point that the logical connection to the services of the access point from this mobile station is no longer required. Mobile stations should disassociate when they leave a network. Disassociation is a notification and can be invoked by either associated party. Neither party can refuse termination of the association.
Re-association enables a mobile station to change its current association with an access point. The re-association service is similar to the association service, with the exception that it includes information about the access point with which a mobile station has been previously associated. A mobile station will use the re-association service repeatedly as it moves throughout the coverage areas of multiple access points of a wireless network, loses contact with the access point with which it is associated, and needs to become associated with a new access point. By using the re-association service, a mobile station provides information to the access point to which it will be associated and information pertaining to the access point which it will be disassociated. This allows the newly associated access point to contact the previously associated access point to obtain frames that may be waiting there for delivery to the mobile station as well as other information that may be relevant to the new association.
The network access device 101 may be a gateway device, a switch or router, a modem (e.g., DSL or cable modem), or a combination of at least two of these functionalities. In one embodiment, the network access device 101 may be coupled to one or more access points (also referred to as repeaters), such as access points 105 to 107. Access points 105 to 107 may be wireless communication devices capable of receiving and transmitting data wirelessly with one or more mobile stations, such as mobile clients 108-113. A mobile station may be able to wirelessly communicate with more than one access point. For example, mobile client 109 may be able to communicate with access points 105 and 106. However, a mobile station typically can only be associated with one access point at a time in order to access the wireless network.
An access point, such as access point 107, may be directly coupled to the network access device 101. Alternatively, an access point, such as access points 105-106, may be coupled to the network access device 101 via a switch, a router, or a hub device 104. Furthermore, an access point may be integrated within a switch (e.g., switch 104), a network access device (e.g., network access device 101), or a combination of both.
A mobile client (e.g., mobile clients 108-113) may be a laptop or desktop computer having a wireless interface, such as, for example, a wireless Ethernet NIC (network interface card), an IEEE 802.11 compatible device, or the like. Alternatively, a mobile client may be a cellular phone, a wireless PDA (personal digital assistant), a pager, a portable gaming device, or a personal communicator (e.g., similar to a Blackberry compatible device), etc.
In addition to the wireless functionality, exemplary network configuration 100 may include one or more wired clients (e.g., wired desktop or laptop computers) communicatively coupled to the network access device 101, either directly or via a switch or a hub device (e.g., switch 104). Furthermore, one or more servers such as, for example, application servers (not shown), may be coupled to the LAN 103 to provide local services to some or all clients 108-117.
According to one embodiment, the network access device 101 includes an association module 120 and a disassociation module 121 to provide association, disassociation, and/or re-association services to any of the clients 108-117 with respect to any of the access points 105-107 with load balancing. For example, according to one embodiment, when a mobile station, such as, for example, mobile client 110 attempts to enter the WLAN (e.g., via association or re-association), the mobile client 110 sends a broadcast message to some or all of the access points 105-107 of the WLAN for requesting entering the WLAN.
In one embodiment, each broadcast message to each access point may include an indication of received signal strength between the mobile client and the respective access point. For example, in an IEEE 802.11 compatible environment, the broadcast message may be an IEEE 802.11 compatible probe request, which includes an RSSI (received signal strength indicator) between the mobile client and an access point. Alternatively, each of the access points that receive the broadcast message may determine the received signal strength. Furthermore, the received signal strength may be determined by both the mobile station and the access point.
In response to the broadcast message, each of the access points 105-107 transmits a first message to the network access device 101. The first message may be transmitted via a proprietary protocol, such as a wireless load balancing protocol (WLBP), which will be described in details further below. The first message may be transmitted via a tunneling protocol (e.g., layer 2 or layer 3 tunneling protocols). In one embodiment, the first message may include load status with respect to each respective access point. In a particular embodiment, the first message includes a number of mobile clients currently associated by the respective access point, the RSSI between the mobile client and the respective access point, and/or an error rate (e.g., frame error rate or FER) of the respective access point, which may represent a throughput of the respective access point.
In response to the first message received from each of the access points 105-107, the network access device 101 calculates the load for each of the access points 105-107 based on the information received via the first message. Thereafter, the network access device 101 selects one of the access points having a load that satisfies one or more predetermined categories to associate with the mobile client, while the remaining access points are instructed to reject the request of the mobile client.
In one embodiment, for each of the access points, the network access device 101 calculates a weight representing the load situation of the respective access point according to a predetermined formula based on the load status of the first message received from the respective access point, which will be described in details further below. Once the network access device 101 selects one access point that satisfies the one or more predetermined categories (e.g., having the highest or lowest weight), the network access device 101 sends a second message to the selected access point to instruct the selected access point to accept the request of the mobile client. The network access device 101 further sends a third message to remaining access points to reject the request of the mobile client.
In response to the second message, the selected access point responds to the mobile client to accept the request and establishes an association with the mobile client. In response to the third message, the remaining access points responds to the mobile client by rejecting the request. As a result, only the selected access point accepts the request from the mobile client and the selected access point is selected by the network access device in consideration the load status of some or all of the access points, which leads to load balancing centralized by the network access device.
In this example, for the illustration purposes, it is assumed that there are two IEEE 802.11 compatible access points 202-203 communicatively coupled to a network access device 204 via an IEEE 802.11 compatible protocol. However, it is not so limited. The exemplary process 200 may be applied to other wireless network configurations with other wireless protocols. In one embodiment, the access points 202-203 may be implemented as any of the access points 105-107 of
Referring to
In response to the probe request, during operations 207-208, which may be substantially concurrently or sequentially, each of the access points 202-203 transmits a first message to the network access device 204. The first message may be transmitted via a proprietary protocol or a tunneling protocol, such as, for example, a WLBP. In one embodiment, the first message from each of the access points 202-203 includes load status regarding the respective access point. In a particular embodiment, the load status includes a number of mobile clients currently associated with the respective access point, an RSSI between the requesting mobile client and the respective access point, and/or an error rate of the respective access point (e.g., a frame error rate or FER).
In response to the first message received from the access points 202-203, during operation 209, the network access device 204 calculates a load for each of the access points 202-203 according to a predetermined formula, also referred to as a WLAN dynamic load balance algorithm (WLBA), based in part on the load status extracted from the first message. In one embodiment, the load of an access point is represented by a weight calculated based on at least one of the number of mobile clients currently associated with the respective access point, an RSSI between the requesting mobile client and the respective access point, and/or an FER of the respective access point, which may be provided via the first message.
According to one embodiment, based on the weight corresponding to each of the access points 202-203, the network access device 204 selects one access point having a weight that satisfies one or more predetermined categories (e.g., highest or lowest weight). In this example, access point 202 is selected based on the weight associated with access point 202. The network access device 204 then sends a second message during the operation 210 to access point 202 to accept the request, while sending a third message during operation 211 to access point 203 (e.g., unselected access point) to reject the request.
In one embodiment, an example of the predetermined formula may be defined as follows:
Wx=Vx*Qx*Fx
Where Wx denotes the weight of APx 202. Vx denotes a variance of mean RSSI with and without WSy 201 taken into account for APx 202. Qx denotes a quota of mean RSSI in maximum RSSI for APx 202. Fx denotes the frame error rate of APx 202.
In one embodiment, Vx may be determined as follows:
Vx=Mx′−Mx
Where Mx denotes the mean RSSI without WSy taken into account, while Mx′ denotes the mean RSSI with WSy taken into account. In one embodiment, Mx may be determined as follows:
and Mx′ may be determined as follows:
Where Nx denotes a number of wireless stations associated with APx 202. Rxi denotes the RSSI value between APx 202 and associated WSi. In one embodiment, Qx=1+Mx′/Rmax, if Vx≧0 and Qx=1−Mx′/Rmax, if Vx<0, where Rmax demotes a maximum RSSI value that the AP can measure from the link. When Vx≧0, it indicates that WSy 201 joining APx 202 will have a positive RSSI contribution to the APx 202. When Vx<0, it indicates that WSy 201 joining APx 202 will have a negative RSSI effect to the APx 202.
In one embodiment, the network access device 204 may maintain a database for purposes of selecting an access point based on the calculated weight representing the load of the access points.
Referring to
Note that the exemplary table 300 is described and shown for the illustration purposes only. Exemplary table 300 may also include other information. For example, exemplary table 300 may further include an RSSI threshold field to indicate that when an RSSI of a mobile client drops below a threshold indicated by a value stored in the RSSI threshold field, the network access device may notify the associated access point to disassociate with that mobile client. The disassociated mobile client may then re-associate with another access point using one of the techniques described above to achieve load balancing purposes. Other configurations may exist.
Referring back to
In this example, the probe response message may be an IEEE 802.11 compatible probe response, similar to the IEEE 802.11 probe response frame as shown in
For an access point in a typical system such as a system having an open system authentication setting, the privacy bit 403 in a probe response frame is normally set to zero. For an access point with privacy-enabled authentication setting such as shared key authentication or WiFi protected access (WPA) authentication, the privacy bit 403 may be set to one. If a wireless station determines that the privacy bit in a probe response does not match the authentication setting of its own, wireless station will stop association process. Therefore in WLBP, only the dedicated AP, which is selected by the network access device, has the matched privacy bit with the wireless station, and all other APs have the inverted privacy bit. As a result, the wireless station will be directed to join the dedicated AP accordingly.
Referring back to
As described above, according to one embodiment, the first messages 207-208, the second message 210, and the third message 211 may be transmitted according to a proprietary protocol WLBP.
In one embodiment, the payload field 503 includes a type field 504, a device field 505, a sequence number field 506, a WLBP frame 507, and a pad field 508. The type field 504 may be used to indicate a frame type and may have a size of 1 octet according to one embodiment. The sequence number field 506 may have a size of 4 octets. The configurations of the WLBP frame 507 and pad field 508 may depend on whether the respective packet is transmitted from an access point to a network access device or from the network access device to an access point.
According to one embodiment, the WLBP frame 507 includes an event field 509, a wireless station ID field 510, an access point ID field 511, and a WLBP payload field 512. The event field 509 may be used to indicate whether the respective packet is being transmitted from an access point to a network access device or vice versa. In one embodiment, the event field 509 has a size of 1 octet. The wireless station ID field 510 and the access point ID field 511 may be used to identify the requesting wireless station and the respective access point respectively. In one embodiment, a MAC address of the wireless station and the access point may be used as an ID stored in fields 510 and 511 respectively. In one embodiment, the wireless station ID field 510 and the access point ID field each has a size of 6 octets.
The WLBP payload field 512 may be used to store the payload of the WLBP packet. The size of the payload field 512 depends on the type of the packet indicated by the event field 509. According to one embodiment, when the event field 509 indicates that the respective packet is being transmitted from an access point to a network access device, the WLBP payload 512 includes an RSSI field 513, an FER field 514, and an NOA (number of associated wireless station) field 515 for respectively storing the RSSI, FER, and a number of wireless station currently associated with the access point. In a particular embodiment, each of the fields 513-515 has a size of 4 octets.
According to an alternative embodiment, when the event field 509 indicates that the packet is being transmitted from the network access device to an access point, the WLBP payload field 512 includes an acknowledgement field 516 to allow the network access device indicating whether the access point receiving the packet should accept or reject the request from wireless station. In a particular embodiment, the acknowledgement field 516 has a size of 1 octet.
According to one embodiment, the size of the pad field 508 depends on the type of the WLBP payload 512 indicated by the event field 509. In a particular embodiment, when the event field 509 indicates that the packet is being transmitted from an access point to a network access device, the pad field 508 has a size of 1 octet. Otherwise, if the packet is being transmitted from the network access device to an access point, the pad field 508 has a size of 4 octets. One of the purposes of the pad field 508 is to pad the packet conforming to certain memory access boundaries (e.g., 4 bytes or 8 bytes boundary).
According to one embodiment, the payload 503 may be encrypted to prevent from eavesdropping. In one embodiment, the payload 503 may be encrypted using an initial vector stored in the vector field 502. In a particular embodiment, the payload 503 may be encrypted using a 3DES (triple data encryption standard) compatible algorithm as shown in
Note that the packet configurations as shown in
Referring to
In response to the first message received from each access point, at block 603, the network access device selects one of the access points based on a predetermined formula, using in part the load status extracted from the first message. In one embodiment, the network access device determines a weight for each access point based on the number of mobile devices currently associated with the respective access point, an RSSI between the respective access point and the requesting mobile device, and/or FER of the respective access point. The weight represents the load for each access point, which may be calculated according to one or more formulas described above. In one embodiment, the network access device selects an access point having a weight that satisfies one or more predetermined categories (e.g., highest weight).
At block 604, the network access device transmits a second message to the selected access point to enable the selected access point to associate with the requesting mobile device. At block 605, the network access device transmits a third message to the remaining access points to enable the remaining access points to reject the request of the mobile device. In one embodiment, the second and third messages are transmitted via a WLBP protocol, similar to those shown in
In one embodiment, in response to the second message, the selected access point responds with a normal probe response message (e.g., IEEE 802.11 compatible probe response) to accept the request of the mobile device. In response to the third message, the remaining access points respond with a probe response message having one or more bits inverted (e.g., inverted privacy bit 403 of an IEEE 802.11 probe response 400 of
Note that while
As shown in
Typically, the input/output devices 710 are coupled to the system through input/output controllers 709. The volatile RAM 705 is typically implemented as dynamic RAM (DRAM) which requires power continuously in order to refresh or maintain the data in the memory. The non-volatile memory 706 is typically a magnetic hard drive, a magnetic optical drive, an optical drive, or a DVD RAM or other type of memory system, which maintains data even after power, is removed from the system. Typically the non-volatile memory will also be a random access memory, although this is not required.
While
Thus, a centralized wireless LAN load balancing mechanism has been described herein. Some portions of the preceding detailed descriptions have been presented in terms of algorithms and symbolic representations of operations on data bits within a computer memory. These algorithmic descriptions and representations are the means used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. An algorithm is here, and generally, conceived to be a self-consistent sequence of operations leading to a desired result. The operations are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.
It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise as apparent from the following discussion, it is appreciated that throughout the description, discussions utilizing terms such as “processing” or “computing” or “calculating” or “determining” or “displaying” or the like, refer to the action and processes of a computer system, or similar electronic computing device, that manipulates and transforms data represented as physical (electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage, transmission or display devices.
The present invention also relates to apparatus for performing the operations herein. This apparatus may be specially constructed for the required purposes, or it may comprise a general purpose computer selectively activated or reconfigured by a computer program stored in the computer. Such a computer program may be stored in a computer readable storage medium, such as, but is not limited to, any type of disk including floppy disks, optical disks, CD-ROMs, and magnetic-optical disks, read-only memories (ROMs), random access memories (RAMs), erasable programmable ROMs (EPROMs), electrically erasable programmable ROMs (EEPROMs), magnetic or optical cards, or any type of media suitable for storing electronic instructions, and each coupled to a computer system bus.
The algorithms and displays presented herein are not inherently related to any particular computer or other apparatus. Various general purpose systems may be used with programs in accordance with the teachings herein, or it may prove convenient to construct more specialized apparatus to perform the required method operations. The required structure for a variety of these systems will appear from the description below. In addition, the present invention is not described with reference to any particular programming language. It will be appreciated that a variety of programming languages may be used to implement the teachings of the invention as described herein.
A machine-readable medium includes any mechanism for storing or transmitting information in a form readable by a machine (e.g., a computer). For example, a machine-readable storage medium includes read only memory (“ROM”); random access memory (“RAM”); magnetic disk storage media; optical storage media; flash memory devices; whereas a machine-readable transmission medium includes electrical, optical, acoustical or other form of propagated signals (e.g., carrier waves, infrared signals, digital signals, etc.); etc.
In the foregoing specification, the invention has been described with reference to specific exemplary embodiments thereof. It will be evident that various modifications may be made thereto without departing from the broader spirit and scope of the invention as set forth in the following claims. The specification and drawings are, accordingly, to be regarded in an illustrative sense rather than a restrictive sense.
This is a continuation application of U.S. patent application Ser. No. 11/056,525, now U.S. Pat. No. 7,480,264, filed Feb. 10, 2005, which is hereby incorporated by reference.
Number | Name | Date | Kind |
---|---|---|---|
5293641 | Kallin et al. | Mar 1994 | A |
5732077 | Whitehead | Mar 1998 | A |
5754959 | Ueno et al. | May 1998 | A |
5796722 | Kotzin et al. | Aug 1998 | A |
5852778 | Labedz | Dec 1998 | A |
5870412 | Schuster et al. | Feb 1999 | A |
5898681 | Dutta | Apr 1999 | A |
5978359 | Caldara et al. | Nov 1999 | A |
6052587 | Moraes et al. | Apr 2000 | A |
6073025 | Chheda et al. | Jun 2000 | A |
6167031 | Olofsson et al. | Dec 2000 | A |
6208644 | Pannell et al. | Mar 2001 | B1 |
6385449 | Eriksson et al. | May 2002 | B2 |
6522881 | Feder et al. | Feb 2003 | B1 |
6574474 | Nielsen | Jun 2003 | B1 |
6574477 | Rathunde | Jun 2003 | B1 |
6581104 | Bereiter | Jun 2003 | B1 |
6590861 | Vepa et al. | Jul 2003 | B1 |
6650621 | Maki-Kullas | Nov 2003 | B1 |
6667975 | DeJager et al. | Dec 2003 | B1 |
6701150 | Huang et al. | Mar 2004 | B1 |
6711159 | Grabelsky et al. | Mar 2004 | B1 |
6717950 | Lui et al. | Apr 2004 | B2 |
6728961 | Velasco | Apr 2004 | B1 |
6788692 | Boudreau et al. | Sep 2004 | B1 |
6789125 | Aviani et al. | Sep 2004 | B1 |
6799210 | Gentry et al. | Sep 2004 | B1 |
6810018 | Paranchych et al. | Oct 2004 | B2 |
7197025 | Chuah | Mar 2007 | B2 |
7215661 | Backes et al. | May 2007 | B2 |
7403780 | VanLaningham et al. | Jul 2008 | B2 |
7480264 | Duo et al. | Jan 2009 | B1 |
20010015963 | Tuomainen et al. | Aug 2001 | A1 |
20020082012 | Wang et al. | Jun 2002 | A1 |
20020102941 | Kuiri et al. | Aug 2002 | A1 |
20020110105 | Awater et al. | Aug 2002 | A1 |
20020141375 | Choi | Oct 2002 | A1 |
20030050068 | Woxberg et al. | Mar 2003 | A1 |
20030134642 | Kostic et al. | Jul 2003 | A1 |
20030139197 | Kostic et al. | Jul 2003 | A1 |
20030214928 | Chuah | Nov 2003 | A1 |
20040053624 | Frank et al. | Mar 2004 | A1 |
20040063455 | Eran et al. | Apr 2004 | A1 |
20040098586 | Rebo et al. | May 2004 | A1 |
20040105416 | Rue | Jun 2004 | A1 |
20040121749 | Cui et al. | Jun 2004 | A1 |
20040141522 | Texerman et al. | Jul 2004 | A1 |
20040142691 | Jollota et al. | Jul 2004 | A1 |
20040203904 | Gwon et al. | Oct 2004 | A1 |
20040246922 | Ruan et al. | Dec 2004 | A1 |
20050113030 | Gaikwad et al. | May 2005 | A1 |
20050197136 | Friday et al. | Sep 2005 | A1 |
20060030270 | Cheng | Feb 2006 | A1 |
20060089122 | Zavalkovsky et al. | Apr 2006 | A1 |
20070171872 | Jollota et al. | Jul 2007 | A1 |
20090175207 | Stephenson et al. | Jul 2009 | A1 |
20140086215 | Duo et al. | Mar 2014 | A1 |
Entry |
---|
Shue et al. (Dynamic Load Balance Algorithm for IEEE 802.11 Wireless LAN). |
Sheu, et al., “Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN”, Tamkang Journal of Science and Engineering, vol. 2, No. 1, pp. 45-52. |
Papanikos, et al., “A Study on Dynamic Load Balance for IEEE 802.11b Wireless LAN”, Jun. 2001, 7 pgs. |
U.S. Appl. No. 11/056,525; Office Action mailed Jul. 24, 2008. |
U.S. Appl. No. 11/056,525; Final Office Action mailed May 28, 2008. |
U.S. Appl. No. 11/056,525; Office Action mailed Nov. 28, 2007. |
Number | Date | Country | |
---|---|---|---|
Parent | 11056525 | Feb 2005 | US |
Child | 12333132 | US |