The present invention relates to telecommunications in general, and, more particularly, to coordinating packet data transmissions from a telecommunications station to a target access point via the distribution system associated with a wireless local area network.
Station 121 is a wireless telecommunications data-processing system, such as a personal computer (PC) with a wireless network interface card, a wireless local area network telephone, and so forth. Station 121 comprises a radio that enables the station to communicate wirelessly via a set of communications rules known as the Institute of Electrical and Electronics Engineers (IEEE) 802.11 wireless local area network (WLAN) set of protocols. Station 121 uses the IEEE 802.11 set of protocols to communicate with one or more nodes (e.g., other stations, access points, servers, etc.) through an access point, such as access point 122-2.
Access point 122-n, wherein n has a value of between 1 and N, inclusive, comprises (i) a radio interface to the wireless network in which station 121 operates, (ii) an interface to the backbone network, and (iii) bridging functionality that supports communications between the wireless network and backbone network. Together, the backbone network and the bridging functionality make up the distribution system. The access point acts as a base station for the wireless network, aggregating access for multiple wireless stations (e.g., station 121, etc.) onto the distribution system. Access point 122-n communicates with stations in the wireless network via the IEEE 802.11 set of protocols and communicates with other nodes through the backbone network via another set of protocols, such as IEEE 802.3 or “Ethernet.”
Bridge 111-m, wherein m has a value of between 1 and M, inclusive, comprises (i) two or more interfaces to other nodes, such as access points, other bridges, stations, and servers, and (ii) bridging software that supports communications between the different interfaces. Bridge 111-m communicatively connects two or more access points 122-1 through 122-N together through hardware ports on the bridge data-processing system. In some operational scenarios, a single bridge might be used to connect two or more access points. In other scenarios, such as one that is depicted in
In telecommunications system 100, station 121 and access points 122-1 through 122-M are each assigned a media access control address, or “MAC” address, to identify the data-processing system. In fact, each of access points 122-1 through 122-M has two MAC addresses: a wireless network MAC address for its wireless network side and a backbone network MAC address for its backbone network side. Note that it is possible for an access point in the prior art to have more than one wireless network MAC address, one for each of the access point's virtual wireless networks on its wireless network side.
To make traffic forwarding decisions, bridge 111-m uses the MAC address information contained in each packet. Each packet that is transmitted from one point to another typically contains a source MAC address that identifies the sender and a destination MAC address that identifies the recipient of the packet. Bridge 111-m learns which of its hardware ports have which nodes attached to the bridge by monitoring and recording the source MAC address of packets that arrive at the bridge. Bridge 111-m examines the destination MAC address and compares it to a list of recorded, or “learned,” addresses to determine on which port to send the packet. If bridge 111-m has not yet learned a destination MAC address of a particular packet, bridge 111-m floods the packet out of every port to ensure that the unknown recipient receives the packet.
When station 121 initially indicates to an access point that it wishes to communicate, station 121 has to authenticate and then associate with the access point of interest. Through authentication, station 121 proves to the access point that the station is what it claims to be. Once authenticated, station 121 may then associate itself with the access point for the purposes of transmitting and receiving packets.
Station 121, which as depicted in
The problem with pre-authentication in the prior art is that in transmitting the pre-authentication packet to the access point with which a station is associated, the station has to specify the wireless network MAC address of the target access point. After all, the station has no knowledge of the target access point's backbone network MAC. At the same time, the bridges in the backbone network have no knowledge of the target access point's wireless network MAC address because the target access point advertises, to the bridges, only its backbone network MAC address as its source address. Consequently, every time a bridge receives a pre-authentication packet, the bridge will flood the packet out on all ports in use, causing all bridges in the backbone network to flood the packet out on their ports, thereby increasing traffic congestion in the backbone network. Furthermore, the congestion may worsen over time as delay-sensitive applications that rely on pre-authentication, such as the streaming of voice traffic packets, occupy an increasing share of resources in the backbone network.
The present invention provides a technique to mitigate congestion in the backbone network by reducing the occurrences of a bridge flooding out pre-authentication packets on multiple ports. In particular, each access point initially advertises its wireless network MAC address—or addresses, if the access point has more than one—to the backbone network, in accordance with the illustrative embodiment, in addition to advertising its backbone network MAC address. Doing so enables each bridge in the backbone network to learn and recognize the one or more wireless network MAC addresses; this results in the bridge directing the pre-authentication packet to a specific port that corresponds to the target access point.
In accordance with the illustrative embodiment of the present invention, each wireless network MAC address is transmitted as a source address in the backbone network during certain conditions. For example, if the access point powers up or restarts, it advertises its one or more wireless network MAC addresses by transmitting a packet—one for each address—that represents the address as a source address. In some embodiments, during its ongoing operation if the access point does not detect an occasional use in the backbone network of the wireless network MAC address as a destination address, the access point will re-transmit each address as a source address. The re-transmitting deals with the issue of some bridges allowing learned addresses to lapse after a certain interval of not having detected the address.
Before the pre-authentication procedure existed, there was little reason, if any, to advertise a wireless network MAC address in the backbone network, just as there was little reason to advertise a backbone network MAC address in the wireless network. The illustrative embodiment recognizes that in some emerging applications, a MAC address from a first link-layer network is not only meaningful in a second link-layer network, but that utilizing that MAC address in that second network can be beneficial in terms of operating performance.
For pedagogical purposes, the IEEE 802.11 pre-authentication procedure is featured in the illustrative embodiment. As those who are skilled in the art will appreciate, however, the present invention is applicable to other procedures that use an address from one network for addressing a node in another network. For example, the present invention is applicable to the IEEE 802.11r procedure of over-the-distribution-system pre-reservation. Those who are skilled in the art will also appreciate that the present invention is applicable to wireless networks other than IEEE 802.11-based networks and to backbone networks other than Ethernet-based networks. Finally, those who are skilled in the art will appreciate that the present invention is applicable to networks that use addressing other than media access control-based addressing.
The illustrative embodiment of the present invention comprises: a first network interface for transmitting a first media access control address and a second media access control address in a first network; a second network interface for transmitting the second media access control address in a second network, wherein the second network interface refrains from transmitting the first media access control address in the second network; and a processor for bridging the first network and the second network.
Station 121 and bridge 111-m, wherein m has a value of between 1 and M, were described earlier and with respect to
Access point 222-n, wherein n has a value of between 1 and N, inclusive, comprises (i) a radio interface to the wireless network to which station 121 belongs, (ii) an interface to the backbone network, and (iii) bridging functionality that supports communications between wireless network 220 and backbone network 210. The access point, the salient components of which are described below and with respect to
Moreover, access point 222-n is capable of performing the tasks described below and with respect to
For pedagogical purposes, the illustrative embodiment of the present invention is taught with access point 222-n having two MAC addresses: a wireless network MAC address for its wireless network side and a backbone network MAC address for its backbone network side. As those who are skilled in the art will appreciate, the present invention is also applicable to where an access point has more than one wireless network MAC address, one for each of the access point's virtual wireless networks on its wireless network side.
As those who are skilled in the art will recognize, there has been a shift in wireless local area network architectures from autonomous access points to “light weight access points” with centralized control (i.e., the IETF CAPWAP protocol, as is known in the art). One goal has been to move most of the traditional wireless functionality such as access control (including user authentication and authorization), mobility, and radio management, as well as the distribution system functionality, out of the access point into a centralized controller, referred to as an “access controller.” Although the illustrative embodiment of the present invention features an access point, as those who are skilled in the art will appreciate the present invention is equally applicable to telecommunications systems that comprise light weight access points (also known as “wireless termination points”) and access controllers.
Backbone network interface 301 comprises a receiving part and a transmitting part. The receiving part receives packet-related signals from the distribution system medium that is network 210 and forwards the information encoded in the signals to processor 302, in well-known fashion. The transmitting part receives information from processor 302, and outputs packet-related signals that encode this information to the distribution system medium in network 210, in well-known fashion. It will be clear to those skilled in the art, after reading this specification, how to make and use backbone network interface 301.
Processor 302 is a general-purpose processor that is capable of receiving information from backbone network interface 301 and wireless network interface 304; reading data from and writing data into memory 303; executing the tasks described below and with respect to
Memory 303 stores data and executable instructions, in well-known fashion. It will be clear to those skilled in the art how to make and use memory 303.
Wireless network interface 304 comprises a receiving part and a transmitting part. The receiving part receives packet-related signals from the wireless medium in wireless network 220 and forwards the information encoded in the signals to processor 302, in well-known fashion. The transmitting part receives information from processor 302, and outputs packet-related signals that encode this information to the wireless medium in network 220, in well-known fashion. It will be clear to those skilled in the art how to make and use wireless network interface 304.
At task 401, access point 222-n stores a first media access control (MAC) address and a second media access control address in well-known fashion. The first MAC address is used in network 210—and not necessarily in network 220—as a first identifier of access point 222-n. The second MAC address is used by station 121 during the pre-authentication procedure and, as a result, in network 210 as a second identifier of access point 222-n in that network. The second MAC address is also used in network 220 as an identifier of access point 222-n.
At task 402, access point 222-n determines, in well-known fashion, if it has been booted, by having been powered up or restarted. If it has, task execution proceeds to task 403. If not, task execution proceeds to task 404.
At task 403, access point 222-n transmits, into the backbone network, the first MAC address and the second MAC address as its source addresses, in accordance with the illustrative embodiment of the present invention.
At task 404, access point 222-n determines if there is a packet to be transmitted in network 220. For example, the access point might need to transmit a data frame to station 121 or to broadcast a management frame to multiple stations. If so, task execution proceeds to task 405. If not, task execution proceeds to task 406.
At task 405, access point 222-n transmits the packet in network 220. Note that in some embodiments, the access point always refrains from transmitting any packets in network 220 with the first MAC address specified.
At task 406, access point 222-n monitors the distribution system medium in network 210 in well-known fashion for a packet that uses the second MAC address as a destination address.
At task 407, access point 222-n determines if a pre-determined time interval has elapsed since the latest detection of the second MAC address having been used as a destination address in network 210. In some embodiments, the value of the time interval is based on the behavior of one or more of bridges 111-1 through 111-M. For example, if a bridge is designed to clear an address from its MAC address table if it does not detect the address being used within a time limit, the value of access point 222-n's time interval can be based on the bridge's time limit. If the interval has elapsed, task execution proceeds to task 408. If not, task execution proceeds to task 402.
At task 408, access point 222-n transmits, in network 210, the second MAC address as its source address in accordance with the illustrative embodiment of the present invention. Task execution then proceeds to task 402.
Via message 501, upon powering up, access point 222-3 transmits its second MAC address (i.e., its wireless network identifier) in backbone network 210.
Bridge 111-4 receives the transmission from access point 222-3 and floods the received packet, as a broadcast message (i.e., messages 502 and 503), through all of its ports to the other connected bridges, namely bridges 111-3 and 111-5.
Bridge 111-3 receives the transmission from bridge 111-4. Via message 504, bridge 111-3 forwards the received address to the other connected bridges, including bridge 111-2.
During this process, bridges 111-1 through 111-M in backbone network 210 learn whatever source MAC addresses they receive, in well-known fashion. In accordance with the illustrative embodiment, access point 222-3 has transmitted its wireless network MAC address as a source address and, as a result, bridges 111-1 through 111-M are made aware of and learn access point 222-3's wireless network MAC address, an address that the bridges were unable to learn in the prior art.
During the ongoing operation of telecommunications system 200, when station 121, which is presently associated with access point 222-2, wishes to preauthenticate to access point 222-3, the station transmits a pre-authentication-related packet to access point 222-2 via message 505 in well-known fashion. In the packet, station 121 specifies the only MAC address of access point 222-2 that station 121 is aware of, namely the wireless network MAC address.
Via message 506, access point 222-2 constructs and transmits a pre-authentication-related packet to bridge 111-3, which comprises the wireless network MAC address.
Bridge 111-3, having previously learned and now recognizing the wireless network MAC address of access point 222-3, forwards the packet only to bridge 111-4 via message 507.
Bridge 111-4, also having previously learned and now recognizing the wireless network MAC address of access point 222-3, forwards the packet only to access point 222-3 via message 508.
It is to be understood that the above-described embodiments are merely illustrative of the present invention and that many variations of the above-described embodiments can be devised by those skilled in the art without departing from the scope of the invention. For example, in this Specification, numerous specific details are provided in order to provide a thorough description and understanding of the illustrative embodiments of the present invention. Those skilled in the art will recognize, however, that the invention can be practiced without one or more of those details, or with other methods, materials, components, etc.
Furthermore, in some instances, well-known structures, materials, or operations are not shown or described in detail to avoid obscuring aspects of the illustrative embodiments. It is understood that the various embodiments shown in the Figures are illustrative, and are not necessarily drawn to scale. Reference throughout the specification to “one embodiment” or “an embodiment” or “some embodiments” means that a particular feature, structure, material, or characteristic described in connection with the embodiment(s) is included in at least one embodiment of the present invention, but not necessarily all embodiments. Consequently, the appearances of the phrase “in one embodiment,” “in an embodiment,” or “in some embodiments” in various places throughout the Specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures, materials, or characteristics can be combined in any suitable manner in one or more embodiments. It is therefore intended that such variations be included within the scope of the following claims and their equivalents.