1. Field
The present disclosure relates generally to communication systems, and more particularly, to a mechanism to provide Long Term Evolution (LTE) Voice, Internet and evolved Multimedia Broadcast Multicast Service (eMBMS) services over Ethernet for connected home architecture.
2. Background
Wireless communication systems are widely deployed to provide various telecommunication services such as telephony, video, data, messaging, and broadcasts. Typical wireless communication systems may employ multiple-access technologies capable of supporting communication with multiple users by sharing available system resources (e.g., bandwidth, transmit power). Examples of such multiple-access technologies include code division multiple access (CDMA) systems, time division multiple access (TDMA) systems, frequency division multiple access (FDMA) systems, orthogonal frequency division multiple access (OFDMA) systems, single-carrier frequency division multiple access (SC-FDMA) systems, and time division synchronous code division multiple access (TD-SCDMA) systems.
These multiple access technologies have been adopted in various telecommunication standards to provide a common protocol that enables different wireless devices to communicate on a municipal, national, regional, and even global level. An example of an emerging telecommunication standard is Long Term Evolution (LTE). LTE is a set of enhancements to the Universal Mobile Telecommunications System (UMTS) mobile standard promulgated by Third Generation Partnership Project (3GPP). LTE is designed to better support mobile broadband Internet access by improving spectral efficiency, lowering costs, improving services, making use of new spectrum, and better integrating with other open standards using OFDMA on the downlink (DL), SC-FDMA on the uplink (UL), and multiple-input multiple-output (MIMO) antenna technology. However, as the demand for mobile broadband access continues to increase, there exists a need for further improvements in LTE technology. Preferably, these improvements should be applicable to other multi-access technologies and the telecommunication standards that employ these technologies.
In an aspect of the disclosure, a method, a computer program product, and an apparatus are provided. The method includes sending a multicast message to a network device, where the Internet Protocol (IP) address of the network device is unknown, determining whether a first response message is received from the network device in response to the multicast message, determining the IP address of the network device from the first response message when the first response message is received from the network device, and establishing a secure connection with the network device using the determined IP address.
The apparatus sends a multicast message to a network device. The multicast message facilitates discovery of the network device, where the IP address of the network device is unknown. The apparatus determines whether a first response message is received from the network device in response to the multicast message and determines the IP address of the network device from the first response message when the first response message is received from the network device. The apparatus establishes a secure connection with the network device using the determined IP address.
In an aspect of the disclosure, a method, a computer program product, and an apparatus are provided. For example, the method may be performed by a network device. The method includes monitoring a first port for a multicast message from a gateway, sending a first response message to the gateway when the multicast message is received, receiving a signal to initiate establishment of a secure connection on a second port, and establishing the secure connection with the gateway. The apparatus is configured to receive MBMS data, Internet traffic, and/or IMS traffic from a base station.
The apparatus monitors a first port for a multicast message from a gateway and sends a first response message to the gateway when the multicast message is received. The apparatus receives a signal to initiate establishment of a secure connection on a second port and establishes the secure connection with the gateway.
The detailed description set forth below in connection with the appended drawings is intended as a description of various configurations and is not intended to represent the configurations in which the concepts described herein may be practiced. The detailed description includes specific details for the purpose of providing a thorough understanding of various concepts. However, it will be apparent to those skilled in the art that these concepts may be practiced without these specific details. In some instances, well known structures and components are shown in block diagram form in order to avoid obscuring such concepts.
Several aspects of telecommunication systems will now be presented with reference to various apparatus and methods. These apparatus and methods will be described in the following detailed description and illustrated in the accompanying drawings by various blocks, modules, components, circuits, steps, processes, algorithms, etc. (collectively referred to as “elements”). These elements may be implemented using electronic hardware, computer software, or any combination thereof Whether such elements are implemented as hardware or software depends upon the particular application and design constraints imposed on the overall system.
By way of example, an element, or any portion of an element, or any combination of elements may be implemented with a “processing system” that includes one or more processors. Examples of processors include microprocessors, microcontrollers, digital signal processors (DSPs), field programmable gate arrays (FPGAs), programmable logic devices (PLDs), state machines, gated logic, discrete hardware circuits, and other suitable hardware configured to perform the various functionality described throughout this disclosure. One or more processors in the processing system may execute software. Software shall be construed broadly to mean instructions, instruction sets, code, code segments, program code, programs, subprograms, software modules, applications, software applications, software packages, routines, subroutines, objects, executables, threads of execution, procedures, functions, etc., whether referred to as software, firmware, middleware, microcode, hardware description language, or otherwise.
Accordingly, in one or more exemplary embodiments, the functions described may be implemented in hardware, software, firmware, or any combination thereof. If implemented in software, the functions may be stored on or encoded as one or more instructions or code on a computer-readable medium. Computer-readable media includes computer storage media. Storage media may be any available media that can be accessed by a computer. By way of example, and not limitation, such computer-readable media can comprise a random-access memory (RAM), a read-only memory (ROM), an electrically erasable programmable ROM (EEPROM), compact disk ROM (CD-ROM) or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to store desired program code in the form of instructions or data structures and that can be accessed by a computer. Combinations of the above should also be included within the scope of computer-readable media.
The E-UTRAN includes the evolved Node B (eNB) 106 and other eNBs 108, and may include a Multicast Coordination Entity (MCE) 128. The eNB 106 provides user and control planes protocol terminations toward the UE 102. The eNB 106 may be connected to the other eNBs 108 via a backhaul (e.g., an X2 interface). The MCE 128 allocates time/frequency radio resources for evolved Multimedia Broadcast Multicast Service (MBMS) (eMBMS), and determines the radio configuration (e.g., a modulation and coding scheme (MCS)) for the eMBMS. In the present disclosure, the term MBMS refers to both MBMS and eMBMS services. The MCE 128 may be a separate entity or part of the eNB 106. The eNB 106 may also be referred to as a base station, a Node B, an access point, a base transceiver station, a radio base station, a radio transceiver, a transceiver function, a basic service set (BSS), an extended service set (ESS), or some other suitable terminology. The eNB 106 provides an access point to the EPC 110 for a UE 102. Examples of UEs 102 include a cellular phone, a smart phone, a session initiation protocol (SIP) phone, a laptop, a personal digital assistant (PDA), a satellite radio, a global positioning system, a multimedia device, a video device, a digital audio player (e.g., MP3 player), a camera, a game console, a tablet, or any other similar functioning device. The UE 102 may also be referred to by those skilled in the art as a mobile station, a subscriber station, a mobile unit, a subscriber unit, a wireless unit, a remote unit, a mobile device, a wireless device, a wireless communications device, a remote device, a mobile subscriber station, an access terminal, a mobile terminal, a wireless terminal, a remote terminal, a handset, a user agent, a mobile client, a client, or some other suitable terminology.
The eNB 106 is connected to the EPC 110. The EPC 110 may include a Mobility Management Entity (MME) 112, a Home Subscriber Server (HSS) 120, other MMEs 114, a Serving Gateway 116, a Multimedia Broadcast Multicast Service (MBMS) Gateway 124, a Broadcast Multicast Service Center (BM-SC) 126, and a Packet Data Network (PDN) Gateway 118. The MME 112 is the control node that processes the signaling between the UE 102 and the EPC 110. Generally, the MME 112 provides bearer and connection management. All user IP packets are transferred through the Serving Gateway 116, which is connected to the PDN Gateway 118. The PDN Gateway 118 provides UE IP address allocation as well as other functions. The PDN Gateway 118 and the BM-SC 126 are connected to the IP Services 122. The IP Services 122 may include the Internet, an intranet, an IP Multimedia Subsystem (IMS), a PS Streaming Service (PSS), and/or other IP services. The BM-SC 126 may provide functions for MBMS user service provisioning and delivery. The BM-SC 126 may serve as an entry point for content provider MBMS transmission, may be used to authorize and initiate MBMS Bearer Services within a PLMN, and may be used to schedule and deliver MBMS transmissions. The MBMS Gateway 124 may be used to distribute MBMS traffic to the eNBs (e.g., 106, 108) belonging to a Multicast Broadcast Single Frequency Network (MBSFN) area broadcasting a particular service, and may be responsible for session management (start/stop) and for collecting eMBMS related charging information.
The modulation and multiple access scheme employed by the access network 200 may vary depending on the particular telecommunications standard being deployed. In LTE applications, OFDM is used on the DL and SC-FDMA is used on the UL to support both frequency division duplex (FDD) and time division duplex (TDD). As those skilled in the art will readily appreciate from the detailed description to follow, the various concepts presented herein are well suited for LTE applications. However, these concepts may be readily extended to other telecommunication standards employing other modulation and multiple access techniques. By way of example, these concepts may be extended to Evolution-Data Optimized (EV-DO) or Ultra Mobile Broadband (UMB). EV-DO and UMB are air interface standards promulgated by the 3rd Generation Partnership Project 2 (3GPP2) as part of the CDMA2000 family of standards and employs CDMA to provide broadband Internet access to mobile stations. These concepts may also be extended to Universal Terrestrial Radio Access (UTRA) employing Wideband-CDMA (W-CDMA) and other variants of CDMA, such as TD-SCDMA; Global System for Mobile Communications (GSM) employing TDMA; and Evolved UTRA (E-UTRA), IEEE 802.11 (Wi-Fi), IEEE 802.16 (WiMAX), IEEE 802.20, and Flash-OFDM employing OFDMA. UTRA, E-UTRA, UMTS, LTE and GSM are described in documents from the 3GPP organization. CDMA2000 and UMB are described in documents from the 3GPP2 organization. The actual wireless communication standard and the multiple access technology employed will depend on the specific application and the overall design constraints imposed on the system.
The eNBs 204 may have multiple antennas supporting MIMO technology. The use of MIMO technology enables the eNBs 204 to exploit the spatial domain to support spatial multiplexing, beamforming, and transmit diversity. Spatial multiplexing may be used to transmit different streams of data simultaneously on the same frequency. The data streams may be transmitted to a single UE 206 to increase the data rate or to multiple UEs 206 to increase the overall system capacity. This is achieved by spatially precoding each data stream (i.e., applying a scaling of an amplitude and a phase) and then transmitting each spatially precoded stream through multiple transmit antennas on the DL. The spatially precoded data streams arrive at the UE(s) 206 with different spatial signatures, which enables each of the UE(s) 206 to recover the one or more data streams destined for that UE 206. On the UL, each UE 206 transmits a spatially precoded data stream, which enables the eNB 204 to identify the source of each spatially precoded data stream.
Spatial multiplexing is generally used when channel conditions are good. When channel conditions are less favorable, beamforming may be used to focus the transmission energy in one or more directions. This may be achieved by spatially precoding the data for transmission through multiple antennas. To achieve good coverage at the edges of the cell, a single stream beamforming transmission may be used in combination with transmit diversity.
In the detailed description that follows, various aspects of an access network will be described with reference to a MIMO system supporting OFDM on the DL. OFDM is a spread-spectrum technique that modulates data over a number of subcarriers within an OFDM symbol. The subcarriers are spaced apart at precise frequencies. The spacing provides “orthogonality” that enables a receiver to recover the data from the subcarriers. In the time domain, a guard interval (e.g., cyclic prefix) may be added to each OFDM symbol to combat inter-OFDM-symbol interference. The UL may use SC-FDMA in the form of a DFT-spread OFDM signal to compensate for high peak-to-average power ratio (PAPR).
A UE can camp on an LTE cell to discover the availability of eMBMS service access and a corresponding access stratum configuration. Initially, the UE may acquire a system information block (SIB) 13 (SIB13). Subsequently, based on the SIB13, the UE may acquire an MBSFN Area Configuration message on an MCCH. Subsequently, based on the MBSFN Area Configuration message, the UE may acquire an MCH scheduling information (MSI) MAC control element. The SIB13 may include (1) an MBSFN area identifier of each MBSFN area supported by the cell; (2) information for acquiring the MCCH such as an MCCH repetition period (e.g., 32, 64, . . . , 256 frames), an MCCH offset (e.g., 0, 1, . . . , 10 frames), an MCCH modification period (e.g., 512, 1024 frames), a signaling modulation and coding scheme (MCS), subframe allocation information indicating which subframes of the radio frame as indicated by repetition period and offset can transmit MCCH; and (3) an MCCH change notification configuration. There is one MBSFN Area Configuration message for each MBSFN area. The MBSFN Area Configuration message may indicate (1) a temporary mobile group identity (TMGI) and an optional session identifier of each MTCH identified by a logical channel identifier within the PMCH, and (2) allocated resources (i.e., radio frames and subframes) for transmitting each PMCH of the MBSFN area and the allocation period (e.g., 4, 8, . . . , 256 frames) of the allocated resources for all the PMCHs in the area, and (3) an MCH scheduling period (MSP) (e.g., 8, 16, 32, . . . , or 1024 radio frames) over which the MSI MAC control element is transmitted.
An out-door unit (ODU) and a gateway may be deployed to enable eMBMS, voice and Internet control and data plane functionality from a WWAN network to an end node/device connected to the gateway via a local area network, e.g. Ethernet or wireless local area network (WLAN). The ODU may establish a connection with the WWAN and deliver data to the gateway for delivery to the end node. In the present disclosure, the term ODU may refer to a device that may be installed outdoors, such as a dish antenna and associated components (e.g., receiver and transmitter). However, the term ODU may also refer to a device that may be installed indoors, such as an indoor antenna and associated components (e.g., receiver and transmitter). The ODU may be configured to operate in a bridge mode or a router mode. The ODU and gateway may discover the presence of each other, establish a secure connection, monitor the status of the secure connection, detect link failures, and recover from link failures.
As shown in
The UEs 412, 413 may be configured with one or more applications for processing various types of data traffic. For example, the UEs 412, 413 may include an eMBMS application for processing eMBMS data, an Internet application for processing Internet data, and/or an IMS application for processing IMS data. In an aspect, an eMBMS application operating in a UE (e.g., UE 412) in network 400 may send a query to the gateway 408 requesting an eMBMS service (e.g., content). The eMBMS service may be available in an eMBMS broadcast from the BS 402. For example, an eMBMS service module (also referred to as middleware) operating in the gateway 408 may forward the query to the ODU 404 over data path 418 using Ethernet protocols. The query may be received by the interface 406 and provided to the ODU 404 over data path 416 using USB protocols. The ODU 404 may then receive eMBMS data packets carrying the requested eMBMS service from the BS 402 using WAN protocols and may route the data packets to the gateway 408. The gateway 408 may then send the eMBMS data packets to the requesting UE (e.g., UE 412) via the local network module 410 using a WLAN protocol or a wired Ethernet protocol.
In an aspect, the ODU 501 is coupled to the gateway 506 through the interface 510. For example, the interface 510 may be a USB to Ethernet interface. As another example, the interface 510 may be a Peripheral Component Interconnect Express (PCIe) to Ethernet interface. In such example, the ODU 501 may send and receive communications to and from the gateway 506 using USB protocols. The gateway 506 may send and receive communications to and from the ODU 501 using Ethernet protocols. For example, the gateway 506 may send and/or receive ODU control packets along the ODU control flow path 548. For example, the ODU control packets may include one or more control messages indicating an eMBMS service requested by a UE (e.g., UE 512). In an aspect, the control messages may be eMBMS specific messages, such as a query message. For example, the query message may be configured to determine whether a network (e.g., LTE network) is eMBMS capable, to enable eMBMS service, and/or to activate/deactivate a channel (e.g., Temporary Mobile Group Identity (TMGI) activation/deactivation). As another example, the ODU control packets may be link status check messages as described infra.
In the aspect of
The ODU 501 may route the eMBMS IP packets to the gateway 506 along paths 552 and 554 using the IPA 508. For example, the eMBMS IP packets may be IPv4 or IPv6 eMBMS packets. For example, the eMBMS IP packets received from BS 503 may be sent to the filter module 530, which may apply one or more filtering rules (e.g., a layer 3 filtering protocol) configured by the ODU 501. The eMBMS IP packets may then be sent to the header control module 536, which may add headers (or remove headers in some aspects) to the eMBMS IP packets. For example, the header control module 530 may add USB protocol headers to the eMBMS IP packets to enable transmission of the eMBMS IP packets using a USB protocol.
As further shown in
As shown in
In the aspect of
For example, the multicast message 608 may be a message that is generated using the IP version 6 (“IPv6”) communication protocol. For example, eMBMS service module 538 of the gateway 506 may generate the multicast message 608 by generating a UDP packet using the IPv6 local link address between the gateway 506 and ODU 501. For example, the content of the UDP packet may be a character string (e.g., a sequence of characters). The eMBMS service module 538 may send the UDP packet to a known UDP port. The ODU 501 may be configured to monitor the UDP port for UDP packets and may consider UDP packets received at the UDP port to be from the gateway 506.
In the aspect of
The ODU control module 516 waits at 612 for a TCP connect signal to initiate establishment of a secure connection. In an aspect, the TCP connection may be established on a predetermined TCP port. After the gateway 506 receives the unicast response 610, the gateway 506 stops the multicast client 614 and no longer sends the multicast message 608. The gateway 506 subsequently starts the TCP client 616. The gateway sends TCP connect message 618 to the ODU 501 and the ODU 501 sends a TCP accept message 620 in response. After the gateway 506 receives the TCP accept message 620, the gateway 506 initiates a Secure Sockets Layer (SSL) handshake with the ODU 501 by sending SSL client handshake message 622. The ODU 501 sends SSL server handshake message 624 in response, followed by SSL handshake message 626. In an aspect, the SSL handshake message 626 may contain a certificate and a key (e.g., a public key). The gateway 506 sends SSL handshake message 628 containing the key and a change cipher notification to indicate that the gateway 506 will start using the key for hashing and encrypting messages. Accordingly, as shown in
The gateway 506 sends a gateway authentication message 636 over the secure connection, which enables the ODU 501 to authenticate the gateway 506. After the ODU 501 authenticates the gateway 506, the ODU 501 sends a response 638 over the secure connection to the gateway 506. The gateway 506 and ODU 501 may then exchange ODU control packets 640 over the secure connection using TCP/IP protocols, and the ODU control 516 and modem 504 may exchange control messages 642.
In an aspect, the ODU control packets 640 may be sent by the gateway 506 to establish an MBMS session over the secure connection. The ODU 501 may decode the control packets and may initiate a modem service to establish the eMBMS session. For example, the modem service may be initiated by configuring the ODU control module 516 to send control message 642 to the modem 504. In an aspect, the MBMS session may be an eMBMS session.
If a TCP SSL connection is active, then at 714, the ODU sends a link status check message to the gateway. At 716, the ODU determines whether a response to the link status check message is received. If a response is received, the ODU returns to 708 and continues to listen for multicast messages. Otherwise, if no response is received, at 718 the ODU closes the TCP SSL connection. Then, at 720 the ODU sends a UDP response message to the gateway to initiate establishment of a TCP connection.
If, at 712, the ODU determines that a TCP SSL connection (also referred to as an SSL connection) is not active, then at 720, the ODU sends a UDP response message to the gateway. At 722, the ODU waits for a TCP connect signal from the gateway. If the TCP connect signal is not from the gateway, the ODU returns to 722 and continues to wait for a TCP connect signal to initiate establishment of a secure connection. Otherwise, if the TCP connection request is from the gateway and the TCP connection is established, the ODU performs an SSL handshake at 726 to establish an SSL connection. For example, in order to establish an SSL connection, the gateway may send an SSL_connect message and the ODU may send an SSL_accept message. Thereafter, a certificate (e.g., X.509 certificate) and one or more keys may be exchanged between the gateway and the ODU. The ODU may determine whether the certificate is present and may validate the keys before establishing the SSL connection. In an aspect, the ODU may set a flag of a state machine to “true” when the SSL connection is successfully established. If the SSL connection fails, the ODU may clear the flag in the state machine by setting the flag to “false”. Accordingly, in an aspect, at 712, the ODU may determine whether the TCP SSL connection is active by determining the state of the flag in the state machine. For example, if the ODU determines that the flag is set to “true”, the ODU may determine that the SSL connection is active.
At 728, the ODU determines whether the SSL connection is active. In an aspect, the ODU may determine whether the SSL connection is active by determining a state of a flag in a state machine as described supra. For example, if the ODU determines that the flag is set to “true”, the ODU may determine that the SSL connection is active. If the SSL connection is active, the ODU returns to 728 and continues to determine whether the SSL connection is active. Otherwise, if, at 728, the ODU determines that the SSL connection is not active, the ODU returns to 706 and starts the multicast server.
If the SSL connection is active, the gateway returns to 818 and determines whether the SSL connection is active. Otherwise, if the gateway determines (818) that the SSL connection is not active, the gateway returns to 804 and determines whether an Ethernet connection is available.
In one scenario, the end-to-end link from gateway 506 to ODU 501 established over a TCP connection (e.g., SSL connection) may fail due to one or more causes. In one example scenario, the end-to-end link may fail due to an error or malfunction of the eMBMS application operating in gateway 506. In such scenario, ODU 501 may unnecessarily consume power by continuing to send eMBMS data packets to gateway 506, where the eMBMS application operating in gateway 506 has failed and can no longer process the eMBMS packets from ODU 501. In another example scenario, the end-to-end link from ODU 501 to gateway 506 established over the TCP connection (e.g., SSL connection) may fail due to one or more causes. For example, the end-to-end link may fail due to an error or malfunction of the control plane of ODU 501. In such scenario, the TCP connection should be terminated and re-established after ODU 501 recovers from the error or malfunction. In the example scenarios discussed above, the TCP connection timeout configured to automatically terminate the TCP connection may be slow. As a result, there may be a large delay before the TCP connection can be re-established. Such delay may prevent reception of an eMBMS service before the TCP connection is re-established and, therefore, may degrade the user experience.
In an aspect, the ODU 501 and/or gateway 506 may determine whether the end-to-end link has failed through the use of link status check messages (also referred to as “heartbeat packets” in some aspects) communicated over the TCP connection (e.g., SSL connection) between the ODU 501 and the gateway 506. For example, the link status check message may be a message that includes one or more items of information, such as the time at which the message is sent. The receiver (e.g., gateway 506) of the link status check message may respond with a message that includes the one or more items of information included in the link status check message. In an aspect, if a response is not received by the sender (e.g., ODU 501) of the link status check message within a threshold period of time, the sender considers the end-to-end link to have failed. In such aspect, the sender of the link status check message may release all eMBMS/IMS/Internet resources and may proceed to terminate and re-establish the TCP connection. In an aspect, when ODU 501 detects a failure in the end-to-end link between ODU 501 and gateway 506, ODU 501 returns to an initialization state and listens for multicast messages on a predetermined UDP port. When ODU 501 receives a new multicast message from gateway 506, ODU 501 may respond to the multicast message with a unicast response message. The unicast response message may cause gateway 506 to initiate a new TCP connection establishment procedure. In an aspect, when gateway 506 detects a failure in the end-to-end link between ODU 501 and gateway 506, gateway 506 returns to an initialization state and attempts to discover ODU 501 by sending multicast messages to a predetermined UDP port.
In an aspect, the gateway 506 may send a gateway authentication message over the secure connection, which enables the ODU 501 to authenticate the gateway 506. After the ODU 501 authenticates the gateway 506, the ODU 501 may send a response over the secure connection to the gateway 506. The gateway 506 and ODU 501 may then exchange ODU control packets over the secure connection using TCP/IP protocols. In such aspect, the ODU control packets may be sent by the gateway 506 to establish an eMBMS session over the secure connection. The ODU 501 may decode the control packets and may send a request to the modem to establish an eMBMS session for the service of interest.
In an aspect, the Kernel module 1120 may perform various functions, such as ALG. The IPA module 1108 includes filter module 1126 and header control module 1130. The gateway 1106 includes eMBMS service module 1132 (also referred to as middleware module 1132), Kernel/NAT module 1134, Ethernet (Eth0) module 1136, and local network module 1138.
In an aspect, the ODU 1101 is coupled to the gateway 1106 through the interface 1110. For example, the interface 1110 may be a USB to Ethernet interface. In such example, the ODU 1101 may send and receive communications to and from the gateway 1106 using USB protocols. The gateway 1106 may send and receive communications to and from the ODU 1101 using Ethernet protocols. For example, the gateway 1106 may send and/or receive ODU control packets along the ODU control flow path 1142. The ODU packets may be received by the modem 1104 via ODU control flow path 1144. For example, the ODU control packets may include information indicating an eMBMS service requested by a UE (e.g., UE 1112). As another example, the ODU control packets may be link status check messages as described supra.
In the aspect of
As further shown in
As shown in
In the aspect of
In an aspect, a gateway (e.g., gateway 506 or gateway 1106) may configure the operation mode (e.g., router mode or bridge mode) of an ODU (e.g., ODU 501 or ODU 1101). For example, the gateway may send a message to the ODU that includes a configuration file instructing the ODU to operate in a router mode or in a bridge mode. The ODU may then reinitialize (also referred to as a reboot operation), read the configuration file, and begin operation in the mode (e.g., router mode or in a bridge mode) indicated in the configuration file.
Therefore, the disclosure includes a discovery mechanism of a network device (e.g., an ODU) by an end node (e.g., a gateway) and includes security for the control plane which is over IP. The disclosure further includes connection (e.g., end-to-end link between the network device and the end node) failure detection using link status check message between network device and the end node. The disclosure further includes a network device that can operate in a bridge or a router mode. eMBMS/IMS/Internet traffic from a WAN network is bridged or routed to the end node over an Ethernet link. The end node is agnostic to the mode (e.g., bridge mode or router mode) of the network device.
At 1204, the gateway sends a multicast message to a network device (e.g., base station 503), where the IP address of the network device is unknown to the gateway. In an aspect, the gateway periodically sends the multicast message by sending the multicast message once every 30 seconds. In an aspect, the multicast message is periodically sent to the network device through the Ethernet interface when the Ethernet interface is determined to be active. For example, with reference to
At 1206, the gateway determines whether a first response message is received from the network device in response to the multicast message. At 1208, the gateway determines the IP address of the network device from the first response message when the first response message is received from the network device. In an aspect, the gateway determines the IP address by identifying the first response message and acquiring the IP address from the header of the response message. At 1210, the gateway establishes a secure connection with the network device using the determined IP address. In an aspect, the gateway establishes the secure connection by establishing a TCP connection with the network device and establishing an SSL connection using the TCP connection. For example, with reference to
At 1212, the gateway sends authentication information to the network device through the secure connection to enable authentication of the gateway by the network device. For example, with reference to
At 1216, the gateway receives the eMBMS data from the network device through the secure connection. At 1218, the gateway sends the eMBMS data to at least one UE through a local network connection. In an aspect, the local network connection is a WLAN or a wired Ethernet connection. At 1220, the gateway receives Internet traffic and/or the IMS traffic from the network device, the Internet traffic and/or the IMS traffic being received on the secure connection through an Ethernet interface.
At 1222, the gateway sends a link status check message to the network device through the secure connection. At 1224, the gateway determines whether a second response message is received from the network device in response to the link status check message within a threshold period of time. At 1226, the gateway terminates the secure connection when the second response message is not received within the threshold period of time. At 1228, the gateway sends the multicast message to the network device when the second response message is not received within the threshold period of time. In an aspect, the link status check message and/or the multicast message may be sent periodically. For example, the link status check message may be periodically sent based on a time interval.
The apparatus further includes a reception module 1412 that receives data 1434. In an aspect, the data 1434 may be Internet traffic, IMS traffic, or eMBMS data sent from the network device. Data 1434 may be received on the secure connection through the local network module 11410 (e.g., Ethernet module).
The apparatus further includes a connection control module 1414 that establishes a secure connection with the network device. The connection control module 1414 may receive messages 1442 (e.g., TCP accept and/or SSL handshake messages) and may send messages 1450 (e.g., TCP connect and/or SSL handshake messages) when establishing a TCP and/or SSL connection with the network device.
The apparatus further includes a determining module 1416 that determines whether an Ethernet module (also referred to as Ethernet interface) coupled to the network device is active. For example, the determining module 1416 may make the determination by checking the status of a flag (e.g., netif_carrier) in the local network module 11410. For example, the flag may be configured to indicate that the local network module 11410 is active when the flag is set to “true” and inactive when the flag is set to “false”. The determining module 1416 further determines whether a response message 1440 is received from the network device in response to the multicast message. The determining module 1416 further determines the IP address of the network device from the response message 1440 when the response message is received from the network device. The determining module 1416 further determines whether a second response message 1441 is received from the network device in response to the link status check message within a threshold period of time. The connection control module 1414 receives a signal 1439 that terminates the secure connection when the second response message is not received within the threshold period of time.
The apparatus further includes a message sending module 1418 that periodically sends multicast message 1448 to a network device. The message sending module 1418 receives the IP address 1446 from the determining module 1416. The message sending module 1418 periodically sends a link status check message 1449 to the network device through the secure connection. The message sending module 1418 sends the multicast message to the network device when the second response message is not received within the threshold period of time.
The apparatus further includes an eMBMS service module 1420 that sends a control message 1452 to the network device to establish an eMBMS session over the secure connection. The eMBMS service module 1420 receives eMBMS data 1444. The apparatus further includes a local network module 21422 that sends eMBMS data 1454 to at least one UE 1426 through a local network connection 1455. In an aspect, the local network connection 1455 is a WLAN or a wired Ethernet connection. The apparatus further includes a transmission module 1424 that sends authentication information over data path 1436 to the network device through the secure connection to enable authentication of the gateway by the network device.
The apparatus further includes a monitoring module 1514 that monitors a first port for multicast message 1536 from the gateway. The apparatus further includes a reception module 1516 that receives at least one subsequent multicast message via data path 1534 from the gateway, receives authentication information via data path 1534 from the gateway configured to enable authentication of the gateway, and/or receives control messages via data path 1534 from the gateway requesting establishment of an eMBMS session over the secure connection.
The apparatus further includes a determining module 1518 that determines whether the secure connection is active. The determining module 1518 may make the determination by inspecting activity on the communication module 1512 via data path 1541. The apparatus further includes a message sending module 1520 that sends a first response message 1547 to the gateway when the multicast message 1536 is received and/or sends a link status check message 1548 to the gateway when the multicast message 1536 is received and the secure connection is active. The message sending module 1520 may receive the determination (e.g., signal 1546) from the determining module 1518.
The apparatus further includes a connection control module 1522 that receives a signal to initiate establishment of a secure connection on a second port, establishes the secure connection with the gateway, and/or terminates the secure connection if a response to the link status check message is not received within a threshold period of time. For example, the connection control module 1522 may receive messages 1542 (e.g., TCP connect and/or SSL handshake messages) and may send messages 1550 (e.g., TCP accept and/or SSL handshake messages) when establishing a TCP and/or SSL connection with the gateway. The connection control module 1522 may receive the determination (e.g., signal 1542) from the determining module 1518.
The apparatus further includes a modem module 1524 that communicates with a BS 1504 using WAN protocols over WAN link 1554 (e.g., LTE). The modem 1524 may receive control information 1544 and may send IP packets 1552 (e.g., eMBMS data) to the gateway 1508. The apparatus further includes a transmission module 1526 that sends a second response message 1549 to the gateway 1508 in response to the at least one subsequent multicast message, sends the eMBMS data to the gateway 1508 through the secure connection, and/or sends Internet traffic and/or IMS traffic to the gateway 1508 on the secure connection through the interface 1510. The transmission module provides transmissions to the communication module 1512 through data path 1538.
The processing system 1614 may be coupled to a transceiver 1610. The transceiver 1610 is coupled to one or more antennas 1620. The transceiver 1610 provides a means for communicating with various other apparatus over a transmission medium. The transceiver 1610 receives a signal from the one or more antennas 1620, extracts information from the received signal, and provides the extracted information to the processing system 1614, specifically the reception module 1412. In addition, the transceiver 1610 receives information from the processing system 1614, specifically the transmission module 1424, and based on the received information, generates a signal to be applied to the one or more antennas 1620. The processing system 1614 includes a processor 1604 coupled to a computer-readable medium/memory 1606. The processor 1604 is responsible for general processing, including the execution of software stored on the computer-readable medium/memory 1606. The software, when executed by the processor 1604, causes the processing system 1614 to perform the various functions described supra for any particular apparatus. The computer-readable medium/memory 1606 may also be used for storing data that is manipulated by the processor 1604 when executing software. The processing system further includes at least one of the modules 1410, 1412, 1414, 1416, 1418, 1420, 1422, and 1424. The modules may be software modules running in the processor 1604, resident/stored in the computer readable medium/memory 1606, one or more hardware modules coupled to the processor 1604, or some combination thereof.
In one configuration, the apparatus 1402/1402′ for wireless communication includes means for sending a multicast message to a network device configured to receive eMBMS data, Internet traffic, and/or IMS traffic from a base station, where the IP address of the network device is unknown, means for determining whether a first response message is received from the network device in response to the multicast message, means for determining the IP address of the network device from the first response message when the first response message is received from the network device, means for establishing a secure connection with the network device using the determined IP address, means for sending a link status check message to the network device through the secure connection, means for determining whether a second response message is received from the network device in response to the link status check message within a threshold period of time, means for terminating the secure connection when the second response message is not received within the threshold period of time, means for sending the multicast message to the network device when the second response message is not received within the threshold period of time, means for sending authentication information to the network device through the secure connection to enable authentication of the gateway by the network device, means for sending a control message to the network device to establish an eMBMS session over the secure connection, means for receiving the eMBMS data from the network device through the secure connection, means for sending the eMBMS data to at least one UE through a local network connection, means for receiving the Internet traffic and/or the IMS traffic from the network device on the secure connection through an Ethernet interface, and means for determining whether an Ethernet interface coupled to the network device is active. The aforementioned means may be one or more of the aforementioned modules of the apparatus 1402 and/or the processing system 1614 of the apparatus 1402′ configured to perform the functions recited by the aforementioned means.
The processing system 1714 may be coupled to a transceiver 1710. The transceiver 1710 is coupled to one or more antennas 1720. The transceiver 1710 provides a means for communicating with various other apparatus over a transmission medium. The transceiver 1710 receives a signal from the one or more antennas 1720, extracts information from the received signal, and provides the extracted information to the processing system 1714, specifically the reception module 1516. In addition, the transceiver 1710 receives information from the processing system 1714, specifically the transmission module 1526, and based on the received information, generates a signal to be applied to the one or more antennas 1720. The processing system 1714 includes a processor 1704 coupled to a computer-readable medium/memory 1706. The processor 1704 is responsible for general processing, including the execution of software stored on the computer-readable medium/memory 1706. The software, when executed by the processor 1704, causes the processing system 1714 to perform the various functions described supra for any particular apparatus. The computer-readable medium/memory 1706 may also be used for storing data that is manipulated by the processor 1704 when executing software. The processing system further includes at least one of the modules 1512, 1514, 1516, 1518, 1520, 1522, 1524, and 1526. The modules may be software modules running in the processor 1704, resident/stored in the computer readable medium/memory 1706, one or more hardware modules coupled to the processor 1704, or some combination thereof.
In one configuration, the apparatus 1502/1502′ for wireless communication includes means for monitoring a first port for the multicast message from a gateway, means for sending a response message to the gateway when the multicast message is received, means for receiving a signal to initiate establishment of a secure connection on a second port, means for establishing the secure connection with the gateway, means for receiving at least one subsequent multicast message from the gateway, means for determining whether the secure connection is active, means for sending a link status check message to the gateway when the multicast message is received and the secure connection is active, means for terminating the secure connection if a response to the link status check message is not received within a threshold period of time, means for sending a second response message to the gateway in response to the at least one subsequent multicast message, means for receiving authentication information from the gateway configured to enable authentication of the gateway, means for receiving a control message from the gateway requesting establishment of an eMBMS session over the secure connection, means for sending the eMBMS data to the gateway through the secure connection, means for sending at least one of the Internet traffic or the IMS traffic to the gateway, the at least one of the Internet traffic or the IMS traffic being sent on the secure connection through a USB to Ethernet interface. The aforementioned means may be one or more of the aforementioned modules of the apparatus 1502 and/or the processing system 1714 of the apparatus 1502′ configured to perform the functions recited by the aforementioned means.
It is understood that the specific order or hierarchy of blocks in the processes/flow charts disclosed is an illustration of exemplary approaches. Based upon design preferences, it is understood that the specific order or hierarchy of blocks in the processes/flow charts may be rearranged. Further, some blocks may be combined or omitted. The accompanying method claims present elements of the various blocks in a sample order, and are not meant to be limited to the specific order or hierarchy presented.
The previous description is provided to enable any person skilled in the art to practice the various aspects described herein. Various modifications to these aspects will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other aspects. Thus, the claims are not intended to be limited to the aspects shown herein, but is to be accorded the full scope consistent with the language claims, wherein reference to an element in the singular is not intended to mean “one and only one” unless specifically so stated, but rather “one or more.” The word “exemplary” is used herein to mean “serving as an example, instance, or illustration.” Any aspect described herein as “exemplary” is not necessarily to be construed as preferred or advantageous over other aspects. Unless specifically stated otherwise, the term “some” refers to one or more. Combinations such as “at least one of A, B, or C,” “at least one of A, B, and C,” and “A, B, C, or any combination thereof” include any combination of A, B, and/or C, and may include multiples of A, multiples of B, or multiples of C. Specifically, combinations such as “at least one of A, B, or C,” “at least one of A, B, and C,” and “A, B, C, or any combination thereof” may be A only, B only, C only, A and B, A and C, B and C, or A and B and C, where any such combinations may contain one or more member or members of A, B, or C. All structural and functional equivalents to the elements of the various aspects described throughout this disclosure that are known or later come to be known to those of ordinary skill in the art are expressly incorporated herein by reference and are intended to be encompassed by the claims. Moreover, nothing disclosed herein is intended to be dedicated to the public regardless of whether such disclosure is explicitly recited in the claims. No claim element is to be construed as a means plus function unless the element is expressly recited using the phrase “means for.”