1. Field
The present disclosure relates generally to telecommunications, and more specifically to handoff in an ad-hoc mobile broadband network.
2. Background
Wireless telecommunication systems are widely deployed to provide various services to consumers, such as telephony, data, video, audio, messaging, broadcasts, etc. These systems continue to evolve as market forces drive wireless telecommunications to new heights. Today, wireless networks are providing broadband Internet access to mobile subscribers over a regional, a nationwide, or even a global region. Such networks are sometimes referred as Wireless Wide Area Networks (WWANs). WWAN operators generally offer wireless access plans to their subscribers such as subscription plans at a monthly fixed rate.
Accessing WWANs from all mobile devices may not be possible. Some mobile devices may not have a WWAN radio. Other mobile devices with a WWAN radio may not have a subscription plan enabled. Ad-hoc networking allows mobile devices to dynamically connect over wireless interfaces using protocols such as WLAN, Bluetooth, UWB or other protocols. There is a need in the art for a methodology to allow a user of a mobile device without WWAN access to dynamically subscribe to wireless access service provided by a user with a WWAN-capable mobile device using wireless ad-hoc networking between the mobile devices belong to the two users.
In one aspect of the disclosure, an ad-hoc service provider includes a processing system configured to support pre-authentication with a server for the purpose of receiving a handoff of a mobile client from another ad-hoc service provider, the processing system being further configured to enable the mobile client to maintain a session with the server while receiving the handoff from said another ad-hoc service provider.
In another aspect of the disclosure, a method of receiving a handoff at an ad-hoc service provider includes supporting pre-authentication with a server for the purpose of receiving a handoff of a mobile client from another ad-hoc service provider, and enabling the mobile client to maintain a session with the server while receiving the handoff from said another ad-hoc service provider.
In a further aspect of the disclosure, an ad-hoc service provider includes means for supporting pre-authentication with a server for the purpose of receiving a handoff of a mobile client from another ad-hoc service provider, and means for enabling the mobile client to maintain a session with the server while receiving the handoff from said another ad-hoc service provider.
In yet a further aspect of the disclosure, a machine-readable medium includes instructions executable by a processing system in a mobile server provider, the instructions include code for supporting pre-authentication with a server for the purpose of receiving a handoff of a mobile client from another ad-hoc service provider, and code for enabling the mobile client to maintain a session with the server while receiving the handoff from said another ad-hoc service provider.
It is understood that other aspects of the disclosure will become readily apparent to those skilled in the art from the following detailed description, wherein various aspects of an ad-hoc mobile broadband network are shown and described by way of illustration. As will be realized, these aspects of the disclosure are capable of other and different configurations and its several details are capable of modification in various other respects. Accordingly, the drawings and detailed description are to be regarded as illustrative in nature and not as restrictive.
The detailed description set forth below in connection with the appended drawings is intended as a description of various aspects of an ad-hoc mobile broadband network and is not intended to represent the only aspects which are encompassed by the claims. The detailed description includes specific details for the purpose of providing a thorough understanding of these aspects. However, it will be apparent to those skilled in the art that various aspects of an ad-hoc mobile broadband network may be practiced without these specific details. In some instances, well-known structures and components are shown in block diagram form in order to avoid obscuring the various concepts presented throughout this disclosure.
Each WWAN 104 may use one of many different wireless access protocols to support radio communications with mobile subscribers. By way of example, one WWAN 104 may support Evolution-Data Optimized (EV-DO), while the other WWAN 104 may support Ultra Mobile Broadband (UMB). EV-DO and UMB are air interface standards promulgated by the 3rd Generation Partnership Project 2 (3GPP2) as part of the CDMA2000 family of standards and employs multiple access techniques such as Code Division Multiple Access (CDMA) to provide broadband Internet access to mobile subscribers. Alternatively, one of WWAN 104 may support Long Term Evolution (LTE), which is a project within the 3GPP2 to improve the Universal Mobile Telecommunications System (UMTS) mobile phone standard based primarily on a Wideband CDMA (W-CDMA) air interface. One of WWAN 104 may also support the WiMAX standard being developed by the WiMAX forum. The actual wireless access protocol employed by a WWAN for any particular telecommunications system will depend on the specific application and the overall design constraints imposed on the system. The various techniques presented throughout this disclosure are equally applicable to any combination of heterogeneous or homogeneous WWANs regardless of the wireless access protocols utilized.
Each WWAN 104 has a number of mobile subscribers. Each subscriber may have a mobile node 106 capable of accessing the Internet 102 directly through the WWAN 104. In the telecommunications system shown in
One or more of these mobile nodes 106 may be configured to create in its vicinity an ad-hoc network based on the same or different wireless access protocol used to access the WWAN 104. By way of example, a mobile node 106 may support a UMB wireless access protocol with a WWAN, while providing an IEEE 802.11 access point for mobile nodes 108 that cannot directly access a WWAN. IEEE 802.11 denotes a set of Wireless Local Access Network (WLAN) standards developed by the IEEE 802.11 committee for short-range communications (e.g., tens of meters to a few hundred meters). Although IEEE 802.11 is a common WLAN wireless access protocol, other suitable protocols may be used.
A mobile node 106 that may be used to provide an access point for another mobile node 108 will be referred to herein as an “ad-hoc service provider.” A mobile node 108 that may use an access point of an ad-hoc service provider 106 will be referred to herein as a “mobile client.” A mobile node, whether an ad-hoc service provider 106 or a mobile client 108, may be a laptop computer, a mobile telephone, a personal digital assistant (PDA), a mobile digital audio player, a mobile game console, a digital camera, a digital camcorder, a mobile audio device, a mobile video device, a mobile multimedia device, or any other device capable of supporting at least one wireless access protocol.
The ad-hoc service provider 106 may extend its wireless broadband Internet access service to mobile clients 108 that would otherwise not have Internet access. A server 110 may be used as an “exchange” to enable mobile clients 108 to purchase unused bandwidth from ad-hoc service providers 106 to access, for example, the Internet 102 across WWANs 104.
An ad-hoc service provider 106, a server 110, and one or more mobile clients 108 may establish a network that is an ad-hoc heterogeneous wireless network. By way of example, a heterogeneous wireless network may include at least two types of wireless networks (e.g., a WWAN and a WLAN). By way of example, an ad-hoc network may be a network whose specific configuration may change from time to time or from the formation of one network to the next. The network configuration is not pre-planned prior to establishing the network. Examples of configurations for an ad-hoc network may include a configuration as to which members are to be in the network (e.g., which ad-hoc service provider, which server, and/or which mobile client(s) are to be included in a network), a configuration as to the geographic locations of an ad-hoc service provider and mobile client(s), and a configuration as to when and how long a network is to be established.
In one example of an exchange, mobile clients 108 register with the server 110. Once registered, a mobile client 108 may search for available ad-hoc service providers 106 when Internet access is desired. When the mobile client 108 detects the presence of one or more ad-hoc service providers 106, it may select a ad-hoc service provider 106 to initiate a session with based on various parameters such as bandwidth, Quality of Service (QoS) and cost. Another parameter that may be used by the mobile client 108 to select a ad-hoc service provider 106 is availability in terms of time. By way of example, a mobile subscriber in an airport may turn on his mobile node (e.g., a laptop computer or a mobile telephone) and use it as an ad-hoc service provider 108 for 30 minutes as he awaits his flight. A mobile client 108 requiring access to the Internet 102 for 45 minutes may choose not to select this ad-hoc service provider 106 even if the ad-hoc service provider 108 can provide adequate bandwidth with good QoS. Another mobile client 108, however, requiring Internet access for 15 minutes, may select this ad-hoc service provider 106 because of its bandwidth and QoS. In any event, once a mobile client 108 selects an ad-hoc service provider 106, a session may be established based on the parameters negotiated be the two (e.g., bandwidth, QoS, duration of the session, etc.). A link encryption key may be established between the mobile client 108 and the ad-hoc service provider 106 during the establishment of the session. A Secured Socket Layer Virtual Private Network (SSL VPN) session may be established between the mobile client 108 and the server 110. The transport layer ports may be kept in the open and not encrypted to provide visibility for the network address translation functionality at the ad-hoc service provider 106. In this example, all Internet traffic is routed through the server 110 via a client-server tunnel 112 to provide security.
In some telecommunication systems, once a mobile client 108 has gained access to the Internet 102, it listens for other ad-hoc service providers 106 and measures the signal strength of the ad-hoc service providers 106 it can hear. The mobile client 108 uses these measurements to create an active list. The active list is a list of ad-hoc service providers 106 that can provide service to the mobile client 108. The mobile client 108 will continue to measure the signal strength of other ad-hoc service providers 106 and may add or remove ad-hoc service providers 106 from the active list as the configuration of the ad-hoc network changes.
One function of the active set is to allow the mobile client 108 to quickly switch between ad-hoc service providers 106 while maintaining the current session with the server 110. The mobile client 108 may consider a handoff to another ad-hoc service provider 106 based on any number of factors. These factors may include, by way of example, the inability of the ad-hoc service provider 106 to provide the bandwidth or QoS negotiated at the beginning of the session. Alternatively, the ad-hoc service provider 106 may not be able to provide Internet access to the mobile client 108 for the entire duration of the session. It would not be uncommon for a mobile subscriber on an ad-hoc service provider 106 that negotiates a 30 minute session with a mobile client 108 to leave the vicinity 15 minutes into the session for whatever reason. In that event, the mobile client 108 would need to select a new ad-hoc service provider from the active list for handoff. The server 110 uses the active list to pre-authenticate other ad-hoc service providers for handoff during the session between the mobile client 108 and the current ad-hoc service provider 106. By pre-authenticating the ad-hoc service provider 106 in the active list before the ad-hoc service provider 106 currently serving the mobile client 108 goes down, the time required to handoff the mobile client 108 can be reduced.
The term “pre-authenticating” as used herein means authenticating a target ad-hoc service 106 provider for handoff prior to receiving a message from the ad-hoc service provider 106 currently serving the mobile client 108 relating to the unavailability of the current ad-hoc service provider 106. The message may provide notification to the server 110 that the current ad-hoc service provider 106 has gone down and a hard handoff must be performed to another ad-hoc service provider 106 if the session between the mobile client 108 and the server 110 is to be maintained. Alternatively, the message may provide notification to the server 110 that the current ad-hoc service provider 106 will be going down shortly, or that it can no longer provide the mobile client 108 with the service agreed upon (e.g., QoS, bandwidth, etc.). This provides the server 110 with the option of enabling a soft handoff of the mobile client 108 to another ad-hoc service provider 106.
Pre-authentication includes provisioning, prior to handoff, a potential new service provider 106 and a mobile client 108 with encryption/decryption keys that may be needed for communication between the potential new service provider 106 and the mobile client 108.
Pre-authentication also includes provisioning, prior to handoff, the current service provider 106 and the new service provider 106 with encryption/decryption keys that may be needed for communication between the current service provider 106 and the new service provider 106.
Pre-authentication also includes authorization of communication between the potential new service provider 106 and the current service provider 106. It also includes authorization of communication between the potential new service provider 106 and the mobile client 108.
The mobile client 108 may have an IPv4, IPv6, or other suitable address that is used by the server 110 to maintain the session. The address may be provided to the mobile client 108 by the server 110 or one of the ad-hoc service providers 106 in the telecommunications network 100 (see
The tunneling anchor is shown in
In step 302, a connection may be initiated by an ad-hoc service provider 1061 with the server 110 when the ad-hoc service provider 1061 is mobile and desires to provide service. Extensible Authentication Protocol-Tunneled Transport Layer Security (EAP-TTLS) may be used for Authentication, Authorization and Accounting (AAA) and secure session establishment for this connection. In step 304, a connection may be initiated by a mobile client 108 with the ad-hoc service provider 1061 (hereinafter referred to as the “current ad-hoc service provider”) when the mobile client 108 requires Internet access. EAP-TTLS may also be used for AAA and secure session establishment. In particular, the ad-hoc service provider 1061 sends the mobile client's credentials to the server 110 for EAP-AAA authentication. The EAP-TTLS authentication response from the server 110 is then used to generate a master shared key. Subsequently, a link encryption key may be established between the current ad-hoc service provider 1061 and the mobile client 108. A SSL VPN session may then be established, in step 306, between the mobile client 108 and the server 110.
It should be noted that information flow may be encrypted using encryption/decryption keys between any pair of nodes (where the nodes comprise the server 110, the current service provider 1061, the target service provider 1062, and the mobile client 108). Such encryption/decryption keys can be set up in the system when nodes in the system connect with the server. Typically symmetric key cryptography such as using AES may be used for such encryption or decryption for message-flow between any pair of nodes in the system.
In step 308, the mobile client 108 provides the active list to the server 110. Alternatively, the mobile client 108 can send a report identifying ad-hoc service providers that it can hear accompanied by data indicating the signal strength measurements for each, and any other service parameters for the service providers that it can infer. The server 110 may use the report to generate the active list at its end.
The server 110 pre-authenticates one or more of the ad-hoc service providers in the active list. During pre-authentication of a target service provider 1062 with a client 108, the server 110 provisions the target-service provider 1062 with an encryption/decryption key for communication with the client 108. The server may additionally provision the target service provider 1062 with an encryption/decryption key for communication with the current service provider 1061. The server 110 also provisions the client 108 with the encryption/decryption key to communicate with the target service provider 1062. The current service provider 1061 can be provisioned by the server 110, either at the time of a handoff or anytime earlier, with the encryption/decryption key to communicate with the target service provider 1062. The exact number of ad-hoc service providers in the active list that are pre-authenticated may depend on the admission control policies implemented by the server 110. By way of example, the server 110 may limit the number of ad-hoc service providers at a given location if it determines that additional ad-hoc service providers will adversely affect performance in the WWAN. Additional constraints may be imposed by the WWAN operators that may not want its mobile subscribers to provide service in a given geographic location depending on various network constraints. In any event, the server 110 pre-authenticates one or more ad-hoc service providers by providing each of them with a key to encrypt the data link between the mobile client 108 and the new ad-hoc service provider 106 following handoff. In
In step 314, the mobile client 108 sends a message to the current ad-hoc service provider 106 requesting a handoff to an alternate service provider. Step 314 is optional and is indicated by a dotted line from the client to the ad-hoc service provider.
In step 316, the current ad-hoc service provider 1061 sends a message to the server 110 requesting a handoff. Such a message is tagged with an identifier that indicates that the handoff was initiated by the mobile client 108, or that it was initiated by the current ad-hoc service provider 1061. The message may be created at the current ad-hoc service provider 1061 as a consequence of the current ad-hoc service provider's unavailability to continue to provide service to the mobile client. Alternatively, the message could have been created at the mobile client (step 314), which needs to be sent by the current ad-hoc service provider 1061 to the server 110. For a handoff that is initiated directly by the server, step 316 is optional. For a handoff that is initiated by the mobile client 108, or by the ad-hoc service provider 1061, in step 318, the server 110 responds to step 316 by sending a message back to current ad-hoc service provider 1061 authorizing handoff. Alternatively, step 318 could be a message from the server initiating a handoff, in the absence of a message 316 from the current ad-hoc service provider 1061. The message sent to the current ad-hoc service provider 1061 may identify the target ad-hoc service provider 1062 for handoff, or alternatively, allow the mobile client 108 to make the decision. In the latter case, the user on the mobile client 108 selects a target ad-hoc service provider for handoff in accordance with any admission control policy constraints imposed by the server 110. The server 110 may also provide the mobile client 108 with a quality metric for each ad-hoc service provider available to the mobile client. This quality metric may be used to assist the user on a mobile client 108 to select a new ad-hoc service provider for handoff. In the example shown in
In step 320, the server may optionally send a message regarding the handoff to one or more target service providers 1062. In step 322, the handoff message received from the server 110 is sent by the current service provider 1061 to the mobile client 108.
In step 324, the mobile client 108 establishes a connection with the target ad-hoc service provider 1062 by sending a message encrypted with a key. Since the target ad-hoc service provider 1062 received the same key during the pre-authentication process, it can decrypt the message and establish a session with the mobile client 108 to complete the handoff. The target ad-hoc service provider 1062 may also send a message back to the server 110, in step 326, to signify that the handoff has been successfully completed.
Packets that have left the mobile client 108 may be in transit to the current ad-hoc service provider 1061, or could be at the current ad-hoc service provider 1061. These packets need to continue to be supported by the current ad-hoc service provider 1061. Other packets that have left the mobile client 108 may be in transit to the server 110, or may be waiting at server 110 for further processing, or may be in transit to their final destination beyond the tunneling server. Future packets that leave the mobile client 108 are sent to the target ad-hoc service provider 1062 after handoff. Packets that are destined to the mobile client 108 may be waiting at the server. Such packets are sent to the target ad-hoc service provider 1062 after handoff. Other packets destined for the mobile client 108 may be in transit to the current ad-hoc service provider 1061, or may be waiting at the current ad-hoc service provider 1061, or may be in transit from the current service provider to the mobile client 108, and the current ad-hoc service provider 1061 needs to continue to support such packets to be delivered to the mobile client 108. The delivery of such packets can be done over a wireless link or a multi-hop wireless path between the current ad-hoc service provider 1061 and the target ad-hoc service provider 1062. Alternatively, such packets can be delivered by the current ad-hoc service provider 1061 to the server 110, which then sends them through the target ad-hoc service provider 1062. Messages between the current ad-hoc service provider 1061 and the target ad-hoc service provider 1062 may be exchanged either through the server 110, or over a wireless link or multi-hop wireless path between the service providers.
The ad-hoc service provider 106 is shown with a filtered interconnection and session monitoring module 406. The module 406 provides filtered processing of content from mobile clients 108 so that the interconnection between the ad-hoc wireless links to the WWAN interface 402 is provided only to mobile clients 108 authenticated and permitted by the server to use the WWAN network. The module 406 also maintains tunneled connectivity between the server and the authenticated mobile clients 108.
The ad-hoc service provider 106 also includes a service provider application 408 that (1) enables the module 406 to provide ad-hoc services to mobile clients 108, and (2) supports WWAN or Internet access to a mobile subscriber or user of the ad-hoc service provider 106. The latter function is supported by a user interface 412 that communicates with the WWAN interface 402 through the module 406 under control of the service provider application 408.
As discussed above, the service provider application 408 enables the module 406 to provide ad-hoc services to mobile clients 108. The service provider application 408 maintains a session with the server to exchange custom messages with the server. In addition, the service provider application 408 also maintains a separate session with each mobile client 108 for exchanging custom messages between the service provider application 408 and the mobile client 108. The service provider application 408 provides information on authenticated and permitted clients to the filtered interconnection and session monitoring module 406. The filtered interconnection and session monitoring module 408 allows content flow for only authenticated and permitted mobile clients 108. The filtered interconnection and session monitoring module 406 also optionally monitors information regarding content flow related to mobile clients 108 such as the amount of content outbound from the mobile clients and inbound to the mobile clients, and regarding WWAN and WLAN network resource utilization and available bandwidths on the wireless channels. The filtered interconnection and session monitoring module 406 can additionally and optionally provide such information to the service provider application 408. The service provider application 408 can optionally act on such information and take appropriate actions such as determining whether to continue maintaining connectivity with the mobile clients 108 and with the server, or whether to continue to provide service. It should be noted that the functions described in modules 406 and 408 can be implemented in any given platform in one or multiple sets of modules that coordinate to provide such functionality at the ad-hoc service provider 106.
When the ad-hoc service provider 106 decides to provide these services, the service provider application 408 sends a request to the server for approval. The service provider application 408 requests authentication by the server and approval from the server to provide service to one or more mobile clients 108. The server may authenticate the ad-hoc service provider 106 and then determine whether it will grant the ad-hoc service provider's request. As discussed earlier, the request may be denied if the number of ad-hoc service providers in the same geographic location is too great or if the WWAN operator has imposed certain constraints on the ad-hoc service provider 106.
Once the ad-hoc service provider 106 is authenticated, the service provider application 408 may advertise an ad-hoc WLAN Service Set Identifier (SSID). Interested mobile clients 108 may associate with the SSID to access the ad-hoc service provider 106. The service provider application 408 may then authenticate the mobile clients 108 with the server and then configure the filtered interconnection and session monitoring module 406 to connect the mobile clients 108 to the server. During the authentication of a mobile client 108, the service provider application 408 may use an unsecured wireless link.
The service provider application 408 may optionally choose to move a mobile client 108 to a new SSID with a secure link once the mobile client 108 is authenticated. In such situations, the service provider application 408 may distribute the time it spends in each SSID depending on the load that it has to support for existing sessions with mobile clients 108.
The service provider application 408 may also be able to determine whether it can support a mobile client 108 before allowing the mobile client 108 to access a network. Resource intelligence that estimates the drain on the battery power and other processing resources that would occur by accepting a mobile client 108 may assist in determining whether the service provider application 408 should consider supporting a new mobile client 108 or accepting a handoff of that mobile client 108 from another ad-hoc service provider.
The service provider application 408 may admit mobile clients 108 and provide them with a certain QoS guarantee, such as an expected average bandwidth during a session. Average throughputs provided to each mobile client 108 over a time window may be monitored. The service provider application 408 may monitor the throughputs for all flows going through it to ensure that resource utilization by the mobile clients 108 is below a certain threshold, and that it is meeting the QoS requirement that it has agreed to provide to the mobile clients 108 during the establishment of the session.
The service provider application 408 may also provide a certain level of security to the wireless access point by routing content through the filtered interconnection and session monitoring module 406 without being able to decipher the content. Similarly, the service provider application 408 may be configured to ensure content routed between the user interface 410 and the WWAN 104 via the module 406 cannot be deciphered by mobile clients 108. The service provider application 408 may use any suitable encryption technology to implement this functionality.
The service provider application 408 may also maintain a time period for a mobile client 108 to access a network. The time period may be agreed upon between the service provider application 408 and the mobile client 108 during the initiation of the session. If the service provider application 408 determines that it is unable to provide the mobile client 108 with access to the network for the agreed upon time period, then it may notify both the server and the mobile client 108 regarding its unavailability. This may occur due to energy constraints (e.g., a low battery), or other unforeseen events. The server may then consider a handoff of the mobile client to another ad-hoc service provider, if there is such an ad-hoc service provider in the vicinity of the mobile client 108. The service provider application 408 may support the handoff of the mobile client 108.
The service provider application 408 may also dedicate processing resources to maintain a wireless link or limited session with mobile clients 108 served by other ad-hoc service providers. This may facilitate the handoff of mobile clients 108 to the ad-hoc service provider 106.
The service provider application 408 may manage the mobile client 108 generally, and the session specifically, through the user interface 412. Alternatively, the service provider application 408 may support a seamless operation mode with processing resources being dedicated to servicing mobile clients 108. In this way, the mobile client 108 is managed in a way that is transparent to the mobile subscriber. The seamless operation mode may be desired where the mobile subscriber does not want to be managing mobile clients 108, but would like to continue generating revenue by sharing bandwidth with mobile clients 108.
In at least one configuration of an ad-hoc service provider, a processing system may be used to implement the filtered interconnection and session monitoring module 406, the service provider application 408, and the service provider user interface 412. The WWAN interface 402 and WLAN interface 404 may be separate from the processing system as shown in
The processor 504 is responsible for managing the bus and general processing, including the execution of software stored on the machine-readable media 506. The processor 304 may be implemented with one or more general-purpose and/or special-purpose processors. Examples include microprocessors, microcontrollers, DSP processors, and other circuitry that can execute software. Software shall be construed broadly to mean instructions, data, or any combination thereof, whether referred to as software, firmware, middleware, microcode, hardware description language, or otherwise. Machine-readable media may include, by way of example, RAM (Random Access Memory), flash memory, ROM (Read Only Memory), PROM (Programmable Read-Only Memory), EPROM (Erasable Programmable Read-Only Memory), EEPROM (Electrically Erasable Programmable Read-Only Memory), registers, magnetic disks, optical disks, hard drives, or any other suitable storage medium, or any combination thereof.
In the hardware implementation illustrated in
The processing system 504 may be configured as a general-purpose processing system with one or more microprocessors providing the processor functionality and external memory providing at least a portion of the machine-readable media 306, all linked together with other supporting circuitry through an external bus architecture. Alternatively, the processing system 504 may be implemented with an ASIC (Application Specific Integrated Circuit) with the processor 504, the network interface 508, the service provider user interface 510, supporting circuitry (not shown), and at least a portion of the machine-readable media 506 integrated into a single chip, or with one or more FPGAs (Field Programmable Gate Array), PLDs (Programmable Logic Device), controllers, state machines, gated logic, discrete hardware components, or any other suitable circuitry, or any combination of circuits that can perform the various functionality described throughout this disclosure. Those skilled in the art will recognize how best to implement the described functionality for the processing system 500 depending on the particular application and the overall design constraints imposed on the overall system.
The machine-readable media 506 is shown with a number of software modules. The software modules include instructions that when executed by the processor 504 cause the processing system to perform various functions. Each software module may reside in a single storage device or distributed across multiple memory devices. By way of example, a software module may be loaded into RAM from a hard drive when a triggering event occurs. During execution of the software module, the processor 504 may load some of the instructions into cache to increase access speed. One or more cache lines may then be loaded into a general register file for execution by the processor 504. When referring to the functionality of a software module below, it will be understood that such functionality is implemented by the processor 504 when executing instructions from that software module.
A protocol stack module 511 may be used to implement the protocol architecture, or any portion thereof, for the ad-hoc service provider. In the implementation described thus far, the protocol stack module 511 is responsible for implementing several protocol layers running on top of the data link layers implemented by the WWAN and WLAN network interfaces 402, 404 (see
The machine-readable media 506 is also shown with a filtered interconnection and session monitoring module 512 and service provider application 514. These software modules, when executed by the processor 504, cause the processing system to carry out the process steps as shown and described in
The user interface 510 may include a keypad, display, speaker, microphone, joystick, and/or any other combination user interface devices that enable a mobile subscriber or user to access the WWAN or the Internet 102.
Turning now to the mobile client, a TLS session may be used by the mobile client 108 to register with the server 110. Once registered, the mobile client 108 may search for available ad-hoc service providers 106. When the mobile client 108 detects the presence of one or more ad-hoc service providers 106, it may initiate a session using EAP-TTLS with an ad-hoc service provider 106 based on parameters such as the available bandwidth that the ad-hoc service provider 106 can support, the QoS metric of the ad-hoc service provider 106, and the cost of the service advertised. As described earlier, a link encryption key may be established between the mobile client 108 and the ad-hoc service provider 106 during the establishment of the session. An SSL VPN session may be established between the mobile client 108 and the server 110 so that all traffic between the two is encrypted. The transport layer ports may be kept in the open and not encrypted to provide visibility for the network address translation functionality at the ad-hoc service provider 106.
The handoff of the mobile client 108 may be performed in a variety of ways. In one configuration, the mobile client 108 may maintain a limited session with multiple ad-hoc service providers 106, while using one ad-hoc service provider 106 to access the Internet. As described earlier, this approach may facilitate the handoff process. In an alternative configuration, the mobile client 108 may consider a handoff only when necessary. In this configuration, the mobile client 108 may maintain an active list of ad-hoc service providers 106 in its vicinity for handoff. The mobile client 108 may select an ad-hoc service provider 106 for handoff from the active list when the current ad-hoc service provider 106 needs to discontinue its service. When handoff is not possible, a mobile client 108 may need to reconnect through a different ad-hoc service provider 106 to access the Internet. Persistence of the tunnel between the mobile client and the server can enable a soft handoff of a mobile client from one service provider to another service provider.
If the bandwidth needs of a mobile client 108 are greater than the capabilities of the available ad-hoc service providers 106, then the mobile client 108 may access multiple ad-hoc service providers 106 simultaneously. A mobile client 108 with multiple transceivers could potentially access multiple ad-hoc service providers 106 simultaneously using a different transceiver for each ad-hoc service provider 106. If the same wireless access protocol can be used to access multiple ad-hoc service providers 106, then different channels may be used. If the mobile client 108 has only one transceiver available, then it may distribute the time that it spends accessing each ad-hoc service provider 106.
Those of skill in the art would appreciate that the various illustrative blocks, modules, elements, components, methods, and algorithms described herein may be implemented as electronic hardware, computer software, or combinations of both. To illustrate this interchangeability of hardware and software, various illustrative blocks, modules, elements, components, methods, and algorithms have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application.
It is understood that the specific order or hierarchy of steps in the processes disclosed is an illustration of exemplary approaches. Based upon design preferences, it is understood that the specific order or hierarchy of steps in the processes may be rearranged. The accompanying method claims present elements of the various steps in a sample order, and are not meant to be limited to the specific order or hierarchy presented.
The previous description is provided to enable any person skilled in the art to practice the various aspects described herein. Various modifications to these aspects will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other aspects. Thus, the claims are not intended to be limited to the aspects shown herein, but is to be accorded the full scope consistent with the language claims, wherein reference to an element in the singular is not intended to mean “one and only one” unless specifically so stated, but rather “one or more.” Unless specifically stated otherwise, the term “some” refers to one or more. Pronouns in the masculine (e.g., his) include the feminine and neuter gender (e.g., her and its) and vice versa. All structural and functional equivalents to the elements of the various aspects described throughout this disclosure that are known or later come to be known to those of ordinary skill in the art are expressly incorporated herein by reference and are intended to be encompassed by the claims. Moreover, nothing disclosed herein is intended to be dedicated to the public regardless of whether such disclosure is explicitly recited in the claims. No claim element is to be construed under the provisions of 35 U.S.C. §112, sixth paragraph, unless the element is expressly recited using the phrase “means for” or, in the case of a method claim, the element is recited using the phrase “step for.”
The present application for patent claims priority under 35 U.S.C. §119 to Provisional Application No. 60/956,658 entitled, “Method for a Heterogeneous Wireless Ad Hoc Mobile Service Provider,” filed Aug. 17, 2007 and Provisional Application No. 60/980,557 entitled, “Handoff In Ad-Hoc Mobile Broadband Networks,” filed Oct. 17, 2007.
Number | Name | Date | Kind |
---|---|---|---|
5263121 | Melsa et al. | Nov 1993 | A |
5301359 | Van Den Heuvel et al. | Apr 1994 | A |
5999813 | Lu et al. | Dec 1999 | A |
6125185 | Boesch | Sep 2000 | A |
6240073 | Reichman et al. | May 2001 | B1 |
6275712 | Gray et al. | Aug 2001 | B1 |
6295453 | Desgagne et al. | Sep 2001 | B1 |
6377805 | Anvekar et al. | Apr 2002 | B1 |
6650900 | Chavez, Jr. et al. | Nov 2003 | B1 |
6735417 | Fonseca, Jr. et al. | May 2004 | B2 |
6788656 | Smolentzov et al. | Sep 2004 | B1 |
6871071 | Takao et al. | Mar 2005 | B2 |
6879574 | Naghian et al. | Apr 2005 | B2 |
6961575 | Stanforth | Nov 2005 | B2 |
6970422 | Ho et al. | Nov 2005 | B1 |
7003117 | Kacker et al. | Feb 2006 | B2 |
7046647 | Oba et al. | May 2006 | B2 |
7089417 | Wack et al. | Aug 2006 | B2 |
7110372 | Kovacs et al. | Sep 2006 | B2 |
7123908 | Chandler | Oct 2006 | B2 |
7155518 | Forslow | Dec 2006 | B2 |
7161914 | Shoaib et al. | Jan 2007 | B2 |
7170878 | Fukuda | Jan 2007 | B2 |
7254119 | Jiang et al. | Aug 2007 | B2 |
7266374 | Kim | Sep 2007 | B2 |
7266383 | Anderson | Sep 2007 | B2 |
7295532 | Haller et al. | Nov 2007 | B2 |
7313363 | Davis et al. | Dec 2007 | B2 |
7339915 | Jakkahalli et al. | Mar 2008 | B2 |
7340253 | LaPorta | Mar 2008 | B2 |
7346167 | Billhartz et al. | Mar 2008 | B2 |
7349370 | Lee et al. | Mar 2008 | B2 |
7362731 | Vinayakray-Jani | Apr 2008 | B2 |
7363050 | Nakano | Apr 2008 | B2 |
7394826 | Cain et al. | Jul 2008 | B2 |
7408929 | Adachi et al. | Aug 2008 | B2 |
7420952 | Da Costa et al. | Sep 2008 | B2 |
7444152 | Wu et al. | Oct 2008 | B2 |
7486651 | Hagiwara et al. | Feb 2009 | B2 |
7496363 | Salkintzis | Feb 2009 | B2 |
7519071 | Thubert et al. | Apr 2009 | B2 |
7551576 | Ahmavaara | Jun 2009 | B2 |
7552234 | Thubert et al. | Jun 2009 | B2 |
7573904 | Pichna et al. | Aug 2009 | B2 |
7577108 | Zhang et al. | Aug 2009 | B2 |
7593378 | Murali et al. | Sep 2009 | B1 |
7624267 | Huang et al. | Nov 2009 | B2 |
7649872 | Naghian et al. | Jan 2010 | B2 |
7664049 | Arrakoski et al. | Feb 2010 | B1 |
7680079 | Jeong et al. | Mar 2010 | B2 |
7756082 | Dhamdhere | Jul 2010 | B1 |
7757076 | Stewart et al. | Jul 2010 | B2 |
7881474 | Sun | Feb 2011 | B2 |
7903817 | Cam-Winget et al. | Mar 2011 | B2 |
7929460 | Chen et al. | Apr 2011 | B2 |
7933247 | Gidwani | Apr 2011 | B2 |
8014368 | Kim et al. | Sep 2011 | B2 |
8295225 | Ji et al. | Oct 2012 | B2 |
8406399 | Loveland | Mar 2013 | B2 |
8717931 | Kenichi et al. | May 2014 | B2 |
20010012757 | Boyle | Aug 2001 | A1 |
20010024443 | Alriksson et al. | Sep 2001 | A1 |
20020039367 | Seppala et al. | Apr 2002 | A1 |
20020061750 | Mohebbi | May 2002 | A1 |
20020080738 | Kim et al. | Jun 2002 | A1 |
20020138635 | Redlich et al. | Sep 2002 | A1 |
20020181447 | Hashizume et al. | Dec 2002 | A1 |
20020198019 | Naim et al. | Dec 2002 | A1 |
20030054796 | Tamaki et al. | Mar 2003 | A1 |
20030068975 | Qiao et al. | Apr 2003 | A1 |
20030087646 | Funato et al. | May 2003 | A1 |
20030092444 | Sengodan et al. | May 2003 | A1 |
20030095504 | Ogier | May 2003 | A1 |
20030101263 | Bouillet et al. | May 2003 | A1 |
20030103496 | Lakshmi et al. | Jun 2003 | A1 |
20030103521 | Raphaeli et al. | Jun 2003 | A1 |
20030123404 | Kasapi et al. | Jul 2003 | A1 |
20030157951 | Hasty, Jr. | Aug 2003 | A1 |
20030169697 | Suzuki et al. | Sep 2003 | A1 |
20030198346 | Meifu et al. | Oct 2003 | A1 |
20030202476 | Billhartz et al. | Oct 2003 | A1 |
20030203741 | Matsuo et al. | Oct 2003 | A1 |
20030212802 | Rector et al. | Nov 2003 | A1 |
20030235174 | Pichna et al. | Dec 2003 | A1 |
20040001442 | Rayment et al. | Jan 2004 | A1 |
20040008663 | Srikrishna et al. | Jan 2004 | A1 |
20040029528 | Chandler | Feb 2004 | A1 |
20040068668 | Lor et al. | Apr 2004 | A1 |
20040087268 | Hatano | May 2004 | A1 |
20040171386 | Mitjana | Sep 2004 | A1 |
20040174822 | Bui | Sep 2004 | A1 |
20040202120 | Hanson | Oct 2004 | A1 |
20040203787 | Naghian | Oct 2004 | A1 |
20040235452 | Fischer et al. | Nov 2004 | A1 |
20040235481 | Shimizu | Nov 2004 | A1 |
20040266439 | Lynch, Jr. et al. | Dec 2004 | A1 |
20050053005 | Cain et al. | Mar 2005 | A1 |
20050058109 | Ekberg | Mar 2005 | A1 |
20050063359 | Jagadeesan et al. | Mar 2005 | A1 |
20050088980 | Olkkonen et al. | Apr 2005 | A1 |
20050094588 | Wentink | May 2005 | A1 |
20050108527 | Ginzburg et al. | May 2005 | A1 |
20050136834 | Bonta et al. | Jun 2005 | A1 |
20050138671 | Love et al. | Jun 2005 | A1 |
20050197098 | Trossen | Sep 2005 | A1 |
20050228853 | Yamamura et al. | Oct 2005 | A1 |
20050243719 | Haverinen et al. | Nov 2005 | A1 |
20050254472 | Roh et al. | Nov 2005 | A1 |
20050286476 | Crosswy et al. | Dec 2005 | A1 |
20060005008 | Kao | Jan 2006 | A1 |
20060007863 | Naghian | Jan 2006 | A1 |
20060009248 | Sakamoto et al. | Jan 2006 | A1 |
20060056368 | Ratiu et al. | Mar 2006 | A1 |
20060064589 | Taniguchi et al. | Mar 2006 | A1 |
20060092939 | Duggi et al. | May 2006 | A1 |
20060098598 | Gallagher | May 2006 | A1 |
20060101400 | Capek et al. | May 2006 | A1 |
20060114825 | McAuley et al. | Jun 2006 | A1 |
20060114850 | Avinash et al. | Jun 2006 | A1 |
20060143026 | Jagannathan et al. | Jun 2006 | A1 |
20060176852 | Wu et al. | Aug 2006 | A1 |
20060178149 | Kamat et al. | Aug 2006 | A1 |
20060215576 | Yu et al. | Sep 2006 | A1 |
20060217062 | Saffre et al. | Sep 2006 | A1 |
20060221858 | Switzer et al. | Oct 2006 | A1 |
20060227724 | Thubert et al. | Oct 2006 | A1 |
20060229080 | Khan et al. | Oct 2006 | A1 |
20060236105 | Brok et al. | Oct 2006 | A1 |
20060240828 | Jain et al. | Oct 2006 | A1 |
20060258391 | Lee | Nov 2006 | A1 |
20060268767 | Sato et al. | Nov 2006 | A1 |
20070008902 | Yaramada et al. | Jan 2007 | A1 |
20070016262 | Gross et al. | Jan 2007 | A1 |
20070038743 | Hellhake et al. | Feb 2007 | A1 |
20070042769 | Thommana et al. | Feb 2007 | A1 |
20070076875 | Kaechi | Apr 2007 | A1 |
20070097906 | Kato | May 2007 | A1 |
20070110009 | Bachmann et al. | May 2007 | A1 |
20070111705 | Zhang et al. | May 2007 | A1 |
20070149139 | Gauvreau | Jun 2007 | A1 |
20070172040 | Cesarini et al. | Jul 2007 | A1 |
20070198656 | Mazzaferri | Aug 2007 | A1 |
20070206527 | Lo et al. | Sep 2007 | A1 |
20070217433 | Doppler et al. | Sep 2007 | A1 |
20070220219 | Bansal et al. | Sep 2007 | A1 |
20070223408 | Thielke et al. | Sep 2007 | A1 |
20070234061 | Teo | Oct 2007 | A1 |
20070253376 | Bonta et al. | Nov 2007 | A1 |
20070254614 | Muralidharan et al. | Nov 2007 | A1 |
20070291722 | Lee | Dec 2007 | A1 |
20080040481 | Joshi et al. | Feb 2008 | A1 |
20080046542 | Sano | Feb 2008 | A1 |
20080049689 | Nakfour et al. | Feb 2008 | A1 |
20080069105 | Costa et al. | Mar 2008 | A1 |
20080080387 | Wang et al. | Apr 2008 | A1 |
20080081606 | Cole | Apr 2008 | A1 |
20080081623 | Burgan et al. | Apr 2008 | A1 |
20080089288 | Anschutz et al. | Apr 2008 | A1 |
20080095114 | Dutta et al. | Apr 2008 | A1 |
20080095134 | Chen et al. | Apr 2008 | A1 |
20080112355 | Krishnakumar et al. | May 2008 | A1 |
20080112362 | Korus | May 2008 | A1 |
20080139239 | O'Connor | Jun 2008 | A1 |
20080146232 | Knisely | Jun 2008 | A1 |
20080165735 | Chen et al. | Jul 2008 | A1 |
20080165786 | Ahuja et al. | Jul 2008 | A1 |
20080192666 | Koskan et al. | Aug 2008 | A1 |
20080254800 | Chun et al. | Oct 2008 | A1 |
20080298284 | Dawson et al. | Dec 2008 | A1 |
20090046591 | Krishnaswamy et al. | Feb 2009 | A1 |
20090046598 | Krishnaswamy et al. | Feb 2009 | A1 |
20090046644 | Krishnaswamy et al. | Feb 2009 | A1 |
20090046676 | Krishnaswamy et al. | Feb 2009 | A1 |
20090046861 | Krishnaswamy | Feb 2009 | A1 |
20090047930 | Krishnaswamy et al. | Feb 2009 | A1 |
20090047964 | Krishnaswamy | Feb 2009 | A1 |
20090047966 | Krishnaswamy et al. | Feb 2009 | A1 |
20090049158 | Krishnaswamy et al. | Feb 2009 | A1 |
20090073943 | Krishnaswamy et al. | Mar 2009 | A1 |
20090125429 | Takayama | May 2009 | A1 |
20090172391 | Kasapidis | Jul 2009 | A1 |
20100034131 | Kasapi et al. | Feb 2010 | A1 |
20100173631 | Kim et al. | Jul 2010 | A1 |
20100202428 | Thompson et al. | Aug 2010 | A1 |
20110019627 | Krishnaswamy et al. | Jan 2011 | A1 |
20110026477 | Sinivaara et al. | Feb 2011 | A1 |
20110039566 | Zee et al. | Feb 2011 | A1 |
20110183685 | Burton et al. | Jul 2011 | A1 |
20120027001 | Krishnaswamy et al. | Feb 2012 | A1 |
20140241296 | Shattil | Aug 2014 | A1 |
Number | Date | Country |
---|---|---|
1342377 | Mar 2002 | CN |
1360795 | Jul 2002 | CN |
1435027 | Aug 2003 | CN |
1602109 | Mar 2005 | CN |
1736041 | Feb 2006 | CN |
1741485 | Mar 2006 | CN |
1747449 | Mar 2006 | CN |
1921418 | Feb 2007 | CN |
1929384 | Mar 2007 | CN |
1961531 | May 2007 | CN |
10208689 | Sep 2003 | DE |
10208689 | Sep 2003 | DE |
1005021315 | Dec 2005 | DE |
102005021315 | Dec 2005 | DE |
1289200 | Mar 2003 | EP |
1289200 | Mar 2003 | EP |
1445893 | Aug 2004 | EP |
1458151 | Sep 2004 | EP |
1458151 | Sep 2004 | EP |
1178644 | Jul 2006 | EP |
1677462 | Jul 2006 | EP |
1701486 | Sep 2006 | EP |
1701486 | Sep 2006 | EP |
1761082 | Mar 2007 | EP |
1775972 | Apr 2007 | EP |
2398462 | Aug 2001 | GB |
2388276 | Nov 2003 | GB |
2398462 | Aug 2004 | GB |
2408173 | May 2005 | GB |
2000115171 | Apr 2000 | JP |
2001275145 | Oct 2001 | JP |
2002510447 | Apr 2002 | JP |
2002544727 | Dec 2002 | JP |
2003070068 | Mar 2003 | JP |
2003101553 | Apr 2003 | JP |
2003143644 | May 2003 | JP |
2003230167 | Aug 2003 | JP |
2004153529 | May 2004 | JP |
2004519911 | Jul 2004 | JP |
2004253885 | Sep 2004 | JP |
2004264976 | Sep 2004 | JP |
2004320775 | Nov 2004 | JP |
2005500766 | Jan 2005 | JP |
2005502273 | Jan 2005 | JP |
2005033808 | Feb 2005 | JP |
2005117656 | Apr 2005 | JP |
2005123781 | May 2005 | JP |
2005176021 | Jun 2005 | JP |
2005204213 | Jul 2005 | JP |
2005523666 | Aug 2005 | JP |
2005295310 | Oct 2005 | JP |
2005531958 | Oct 2005 | JP |
2005536131 | Nov 2005 | JP |
2005341290 | Dec 2005 | JP |
2005348397 | Dec 2005 | JP |
2005536913 | Dec 2005 | JP |
2006013811 | Jan 2006 | JP |
2006502670 | Jan 2006 | JP |
2006041633 | Feb 2006 | JP |
2006050224 | Feb 2006 | JP |
2006505987 | Feb 2006 | JP |
2006074621 | Mar 2006 | JP |
2006163793 | Jun 2006 | JP |
2006197462 | Jul 2006 | JP |
2006287426 | Oct 2006 | JP |
2006304005 | Nov 2006 | JP |
2007036828 | Feb 2007 | JP |
2007037111 | Feb 2007 | JP |
2007074382 | Mar 2007 | JP |
2007505553 | Mar 2007 | JP |
2007508781 | Apr 2007 | JP |
2007116710 | May 2007 | JP |
2007129380 | May 2007 | JP |
2007143066 | Jun 2007 | JP |
2007522725 | Aug 2007 | JP |
2007528162 | Oct 2007 | JP |
2009500958 | Jan 2009 | JP |
2009500984 | Jan 2009 | JP |
2009526418 | Jul 2009 | JP |
4504934 | Jul 2010 | JP |
2010537575 | Dec 2010 | JP |
5335793 | Nov 2013 | JP |
1020070034060 | Mar 2007 | KR |
2192049 | Oct 2002 | RU |
2206177 | Jun 2003 | RU |
2273050 | Mar 2006 | RU |
2301444 | Jun 2007 | RU |
I242937 | Nov 2005 | TW |
I243620 | Nov 2005 | TW |
I246005 | Dec 2005 | TW |
I246344 | Dec 2005 | TW |
9013211 | Nov 1990 | WO |
9013211 | Nov 1990 | WO |
0069186 | Nov 2000 | WO |
0069186 | Nov 2000 | WO |
WO0199053 | Dec 2001 | WO |
02063900 | Aug 2002 | WO |
02063900 | Aug 2002 | WO |
WO02063990 | Aug 2002 | WO |
WO02071084 | Sep 2002 | WO |
WO02096132 | Nov 2002 | WO |
WO03017705 | Feb 2003 | WO |
WO03090847 | Nov 2003 | WO |
2004002208 | Jan 2004 | WO |
WO2004004226 | Jan 2004 | WO |
WO2004017549 | Feb 2004 | WO |
WO2004017568 | Feb 2004 | WO |
WO2004034219 | Apr 2004 | WO |
2004043008 | May 2004 | WO |
WO2004107656 | Dec 2004 | WO |
WO2005036348 | Apr 2005 | WO |
WO2005072183 | Aug 2005 | WO |
2005086468 | Sep 2005 | WO |
WO2005088874 | Sep 2005 | WO |
WO2005109693 | Nov 2005 | WO |
WO2005116841 | Dec 2005 | WO |
WO2006000239 | Jan 2006 | WO |
WO2006024343 | Mar 2006 | WO |
2006043902 | Apr 2006 | WO |
2006043902 | Apr 2006 | WO |
WO2006043901 | Apr 2006 | WO |
2006068878 | Jun 2006 | WO |
WO2006061682 | Jun 2006 | WO |
WO2006117738 | Nov 2006 | WO |
2007004051 | Jan 2007 | WO |
2007004051 | Jan 2007 | WO |
2007008751 | Jan 2007 | WO |
WO2007008574 | Jan 2007 | WO |
WO2007024932 | Mar 2007 | WO |
WO2007047118 | Apr 2007 | WO |
2007052249 | May 2007 | WO |
2007052249 | May 2007 | WO |
2007064249 | Jun 2007 | WO |
2007064249 | Jun 2007 | WO |
WO2007090176 | Aug 2007 | WO |
WO2007091699 | Aug 2007 | WO |
2008063728 | May 2008 | WO |
2008063728 | May 2008 | WO |
2009026109 | Feb 2009 | WO |
WO2009026192 | Feb 2009 | WO |
WO2010000870 | Jan 2010 | WO |
Entry |
---|
Dilip Krishnaswamy: “AWiMA: An Architecture for Adhoc Wireless Mobile Internet Access” Global Telecommunications Conference, 2008. IEEE Globecom 2008., Nov. 30, 2008, pp. 1-5, XP031370766 IEEE, Piscataway, NJ, USA ISBN: 978-1-4244-2324-8 abstract; figure 1 p. 2, col. 1, paragraph 3-p. 3, col. 2, paragraph 3.3.2; figure 2. |
European Search Report—EP08006299, European Search Authority—Berlin—Mar. 11, 2009. |
European Search Report—EP08006403, European Search Authority—The Hague—Jan. 27, 2009. |
European Search Report—EP08006428, European Search Authority—The Hague—Jan. 15, 2009. |
European Search Report—EP08006429, European Search Authority—The Hague—Nov. 26, 2008. |
International Search Report—PCT/US08/072464, International Search Authority—European Patent Office—Mar. 3, 2009. |
International Search Report—PCT/US08/072515, International Search Authority—European Patent Office—Feb. 4, 2009. |
International Search Report—PCT/US08/072863, International Search Authority—European Patent Office—Dec. 4, 2008. |
International Search Report—PCT/US08/072866, International Search Authority—European Patent Office—Jan. 29, 2009. |
International Search Report—PCT/US08/072872, International Search Authority—European Patent Office—Dec. 29, 2008. |
International Search Report—PCT/US08/073017, International Search Authority—European Patent Office—Feb. 27, 2009. |
International Search Report—PCT/US08/073031, International Search Authority—European Patent Office—Feb. 4, 2009. |
International Search Report—PCT/US08/073217, International Search Authority—European Patent Office—Dec. 16, 2008. |
International Search Report—PCT/US08/073321, International Search Authority—European Patent Office—Feb. 10, 2009. |
International Search Report—PCT/US08/073409, International Search Authority—European Patent Office—Mar. 18, 2009. |
Partial International Search Report—PCT/US08/072464, International Search Authority—European Patent Office—Nov. 18, 2008. |
Partial International Search Report—PCT/US08/073409, International Search Authority—European Patent Office—Jan. 8, 2009. |
Sengupta S et al: “Dynamic pricing for service provisioning and network selection in heterogeneous networks” Physical Communication, vol. 2, No. 1-2, 39-43 Mar. 1, 2009, pp. 138-150, XP026110196 ISSN: 1874-4907 [retrieved on Mar. 9, 2009] abstract. |
Written Opinion—PCT/US08/072464, International Search Authority—European Patent Office—Mar. 3, 2009. |
Written Opinion—PCT/US08/072515, International Search Authority—European Patent Office—Feb. 4, 2009. |
Written Opinion—PCT/US08/072863, International Search Authority—European Patent Office—Dec. 4, 2008. |
Written Opinion—PCT/US08/072866, International Search Authority—European Patent Office—Jan. 29, 2009. |
Written Opinion—PCT/US08/072872, International Search Authority—European Patent Office—Dec. 29, 2008. |
Written Opinion—PCT/US08/073017, International Search Authority—European Patent Office—Feb. 27, 2009. |
Written Opinion—PCT/US08/073031, International Search Authority—European Patent Office—Feb. 4, 2009. |
Written Opinion—PCT/US08/073217, International Search Authority—European Patent Office—Dec. 16, 2008. |
Written Opinion—PCT/US08/073321, International Search Authority—European Patent Office—Feb. 10, 2009. |
Written Opinon—PCT/US08/073409, International Search Authority—European Patent Office—Mar. 18, 2009. |
Ying Qiu, Peter Marbach: “Bandwidth Allocation in Ad Hoc Networks: a Price-Based Approach” IEEE INFOCOM 2003, [Online] Jul. 3, 2003, pp. 1-11, XP002603370 infocom 2003 Retrieved from the Internet: URL:http://www.i eee-infocom.org/2003/paper s/20—01.PDF> [retrieved on Oct. 4, 2010] p. 1, col. 1, line 9, paragraph 1—p. 4, col. 1, line 20, paragraph II. E p. 9, col. 2, line 5, paragraph VIII—p. 11, col. 1, line 18, paragraph IX. |
Sethom et al: “Secure and seamless mobility support in heterogeneous wireless networks” Global Telecommunications Conference 2005. Globecom '05, IEEE St. Loius, MO, USA, Nov.28-Dec. 2, 2005, Psicataway, NJ, USA, IEEE. vol. 6, Nov. 28, 2005, pp. 34. |
Ashutosh,H et al.: “Seamless proactive handover across heterogeneous access networks” Wirless Personal Communciations, Kluwer Academic Publishers, DO, vol. 43, No. 3, Jun. 28, 2007, pp. 837-855, XP019557974. |
Ming et al.: “Ad hoc assisted handoff for real-time voice in IEEE 802.11 infrastructure WLANs” Wireless Communications and Networks Conference, 2004. WCNC. 2004 IEEE Atlanta, GA, USA Mar. 21-25, 2004, Piscaraway, NJ, USA, IEEE, vol. 1, Mar. 21, 2004, pp. 202-206. |
Bharat et al.: “Integrating Heterogeneous Wireless Technologies: A Cellular Aided Mobiie Ad Hoc Network (CAMA)” Mobile Networks and Applications, Kluwer Academic Publishers, BO, vol. 9, No. 4, Aug. 1, 2004, pp. 393-408, XP019213788. |
Cradlepoint Technology, “CTR350 Mobile Broadband Travel Router: Ethernet, USB Modern Support”, Dec. 2008. |
FON Wiki Beta, “Allen, Linus and Bill”, http://wiki.fon.com/wiki/allen2%—linus—and—Bill, Feb. 27, 2009. |
FON Wiki Beta, “FON Spot”, http://wiki.fon.com/wiki/FON—Spot, Apr. 6, 2009. |
Taiwan Search Report—TW097131375—TIPO—Dec. 22, 2011. |
Park, Mirang et al., “A Study of a Seamless User Authentication Protocol on Wireless LAN Systems,” Journal of the Information Processing Society of Japan, The Information Processing Society of Japan, Jul. 15, 2006, 47(7), pp. 2058-2070. |
Sethom, et al: “Secure and seamless mobility support in heterogeneous wireless networks” Global Telecommunications Conference 2005. GLOBECOM'05. IEEE St. Loius, MO, USA, Nov. 28,-Dec. 2, 2005, Psicataway, NJ, USA, IEEE. vol. 6, Nov. 28, 2005, p. 34. |
Dimitriadis et al: “Seamless continuity of real-time video across umts and wlan networks: challenges and performance evaluation” IEEE Personal Communications, IEEE Communications Society, US, vol. 12, No. 3, Jun. 1, 2005, pp. 8-18, XP011134871. |
Ashutosh, et al., “Seamless proactive handover across heterogeneous access networks” Wirless Personal Communciations, Kluwer Academic Publishers, DO, vol. 43, No. 3, Jun. 28, 2007, pp. 837-855, XP019557974. |
Ming, et al., “Ad hoc assisted handoff for real-time voice in IEEE 802.11 infrastructure WLANs” Wireless Communications and Networks Conference, 2004. WCNC. 2004 IEEE Atlanta, GA, USA Mar. 21-25, 2004, Piscaraway, NJ, USA, IEEE, vol. 1, Mar. 21, 2004, pp. 202-206. |
Bharat Bhargava, et al., “Integrating Heterogeneous Wireless Technologies: A Cellular Aided Mobile Ad Hoc Network (CAMA)” Mobile Networks and Applications, Kluwer Academic Publishers, BO, vol. 9, No. 4, Aug. 1, 2004, pp. 393-408, XP019213788. |
International Search Report—PCT/US08/073218, International Search Authority—European Patent Office—Jan. 5, 2009. |
Written Opinion—PCT/US08/073218, International Search Authority—European Patent Office—Jan. 5, 2009. |
Cradlepoint Technology, “CTR350 Mobile Broadband Travel Router: Ethernet, USB Modem Support”, Dec. 2008. |
Cradlepoint Technology, “CTR500 Mobile Broadband Router: Ethernet, USB, and ExpressCard Modem Support” Dec. 2008. |
FON Wiki Beta, “Alien, Linus and Bill”, http://wiki.fon.com/wiki/alien2%—linus—and—Bill, Feb. 27, 2009. |
FON Wiki Beta, “Fon Spot” pp. 1-3, year 2009, http://wiki.fon.comlwiki/FON—Spot. |
Kyocera, “KR1 Mobile Router: Technical Specifications” 2006 Kyocera Wireless Corp. |
Steiner, et al., “Kerberos: An Authentication Service for Open Network Systems”, Jan. 12, 1988. |
Number | Date | Country | |
---|---|---|---|
20090046658 A1 | Feb 2009 | US |
Number | Date | Country | |
---|---|---|---|
60956658 | Aug 2007 | US | |
60980557 | Oct 2007 | US |