The present invention is related generally to wireless communication systems and, in particular, to determining network access in such wireless communication systems.
Wireless communication systems have become ubiquitous. As the numbers of users of such systems grow larger, the cost of building networks supporting these systems increases. As a result, wireless network engineering has grown in importance. Network engineering as used herein means the process of designing a network architecture and developing methods of operating a network, including the design of the components used in the network, as well as the methods of interfacing the network with users. One key element of wireless network engineering is access control. Access control in wireless networks involves matching mobile devices and bandwidth requirements with appropriate access technologies and equipment to meet these requirements. Access control engineering has grown more complex with the advent of end-user devices, such as wireless handsets, that are capable of accessing a wireless network via any of multiple well-known access technologies. For example, various devices may be capable of accessing a wireless network via cellular technology, Wi-Fi (802.11) technology, Wi-MAX (802.16) (802.11, 802.16, and other 802.1x series technologies are collectively referred to herein as 802.1x technologies) and other technologies adapted to interface a device with a wireless network, depending on which access technology is available. These technologies are very well known in the art and will not be discussed further herein other than as is necessary for the understanding of the present invention. Since each of these technologies can be used for wireless network access, it is desirable to take such diverse access abilities into account when engineering the design and operational functionality of a network. However, in wireless networks, the mobile nature of an end user while using such a mobile device makes such engineering difficult.
These difficulties are essentially solved in accordance with the principles of the present invention. In particular, in accordance with the principles of the present invention, location based information (LBI), discussed further herein below, is used to make access and routing decisions within a network. Such LBI is sent from mobile devices to the core network when the mobile device registers with the network. In particular, this LBI information may be transmitted as a part of the registration message from the mobile device to the network. Over time, this collected data represents the position of mobile devices over time and periodic patterns of usage in different geographic areas.
In one illustrative embodiment, a network receives an indication that a mobile device requires registration with the network. This indication or another indication contains at least a first element of location based information (LBI). Then, the network determines, illustratively as a function of said LBI, a desired network access technology to use to connect said mobile device with said network. Instructions are then transmitted to said mobile device to establish a connection using said desired network access technology and the device is registered with the network. The location information and bandwidth required per endpoint is also used to determine expected traffic entering the network at different points, which allows the optimization of network design as well as the routes used by the routers in the network.
These and other advantages of the invention will be apparent to those of ordinary skill in the art by reference to the following detailed description and the accompanying drawings.
Landline telephony networks using a packet-based carrier are well known.
With reference to
Designing and engineering a network such as that shown in
As the transition from traditional cellular networks to packet-based networks occurs, it has been recognized as desirable to be able to use a common packet-based network for all types of communication: data, landline telephony, and wireless telephony. Therefore, attempts at converging these types of communication into one network have been made.
When a communication is received from, for example, one of devices 201 or 202, it enters network 211 as discussed above. The Call Session Control Function (CSCF) 214 determines whether the endpoint is registered for service. The CSCF refers to Home Subscriber Server (HSS) 213. HSS 213 provides call session establishment criteria, including identification of the end user, and access authorization functions, as well as other services associated with, for example, mobility management, security, and service provisioning. The HSS 213 performs these functions by referring to the CSCF 214. CSCF 214 has, for example, Interrogating, Home and Proxy Call Session Control Function components (referred to herein as I-CSCF, H-CSCF and P-CSCF functions, respectively). In IMS, every user signaling event, feature activation, call session initiation, resource allocation, or requests for any other application or service-first stops at the P-CSCF, which is the user device's first contact point within the IMS core network. The P-CSCF forwards SIP messages received from the end user via the IRSCP to the I-CSCF or the S-CSCF, depending on the type of message and procedure. The I-CSCF provides a contact point within an operator's network allowing subscribers of that network operator, and roaming subscribers, to register. Once registered, the S-CSCF maintains session state for all IMS services. Such services are provided in the service plane 217 via a service capability interaction manager (SCIM) 218 that performs functions similar to a service broker in a cellular network and coordinates the applications provided by application servers 210, 220 and 221.
The network 200 of
The IMS network 200 of
As discussed above, a significant problem in networks such as IMS network 200 of
In traditional wireless networks, an and user device (e.g., cellular telephone) or the user of that device made the decision as to which access technology to use to provide communication service. This decision was typically made based on a characteristic of the signal, such as signal strength, between the end user and the access point of the network. For example, in cellular networks, a cellular telephone could automatically use the base station which provided the highest signal strength. When moving, if a higher signal strength was available to the mobile device, a handoff to the new base station would be initiated. Such a device or user-based access selection was possible due to the seamless and regular layout of cellular base stations. Each base station was essentially interchangeable from the perspective of the network and, therefore, if a channel on a base station having a higher signal strength was available, hand-offs did not require any special considerations by the network. However, since the devices did not have detailed information related to the network, such devices sometimes would make undesirable access decisions from a network standpoint. For example, the device might initiate a handoff to a new base station even though that base station was near maximum operating capacity. From a network perspective, it may be desirable to have the device be handed off to another, lower traffic base station even if the signal strength from that base station was not as strong.
In networks such as the network 200 of
The present invention substantially solves the foregoing problems. In particular, in accordance with the principles of the present invention, location based information (LBI) is used to make access and routing decisions within a network, such as the network 200 of
Therefore, in accordance with one aspect of the present invention, LBI is sent from mobile devices to the core network when the mobile device registers with the network. In particular, this LBI information is transmitted as a part of the registration message via transport network 211 in
Once LBI data is stored for these devices, it is illustratively used for two different purposes, as discussed above. First, LBI is used for engineering purposes in order to ensure that adequate network resources, such as cellular base stations and wireless LAN access points are available to support demand for network access. LBI used for this purpose is referred to herein as LBI-Engineering, or LBI-E. Such network LBI-E information can be used in conjunction with other access requirements (e.g., to support a guaranteed class of service) in order to design the layout of the network as well as the design and robustness of network components such as gateways 208, 210 and 209 or other border elements used to gain access to transport network 211.
LBI information is also used when the mobile device registers with the network to determine the desired network access method to be used by a particular mobile device. Contrary to prior efforts, and according to an advantage of the present invention, the network, not the mobile device or the user of the mobile device, selects the appropriate access method for the mobile device. For example, when a new mobile device, such as mobile phone 201, registers with network 200 via CSCF 214, the H-CSCF component of the CSCF 214 in conjunction with the LBI information identifies the locations of mobile devices in proximity to the mobile phone 201. This information is used in conjunction with the known capabilities and locations of wireless access points, such as wireless access point 206, and base stations, such as BS/BSC 203, in order to select the most optimal access technology to provide network access to mobile phone 201. By monitoring access patterns over time during a call, the H-CSCF in conjunction with the HSS 213 can determine when a handoff from one access technology to another (e.g., from WiFi to cellular and vice versa) is appropriate. Such dynamic handoffs from one access technology to another is referred to herein as Dynamic Over the Air Programming (DOTAP).
The steps of the methods discussed above in association with
The operations of a mobile telephone such as mobile telephone 600 are well known in the art. Therefore, such operations will not be described herein other than as is necessary for the understanding the principles of the present invention. In operations, GPS receiver 607 receives positioning data from, for example, GPS satellites in order to compute the aforementioned LBI. Once again, determining such LBI information is well known and will not be described in detail herein. Such LBI can be determined from one of several positioning techniques, including triangulation as discussed previously. According to another embodiment of the present invention, mobile telephone 600 sends a registration message via radio frequency transceiver 602 and antenna 601 in order to register with a wireless network. Illustratively, the registration message illustratively contains LBI. Thus, when the registration message reaches the network, it is used as described herein above to determine a desired network access technology to assign to the mobile device. Then the network sends a message instructing mobile telephone 600 via antenna 601 and radio transceiver 602 to use a particular access technology, e.g., cellular access technology. As a result, the network-determined access technology is used by mobile telephone 600 to initiate calls within the network.
In another embodiment, mobile telephone 600 is instructed to initiate a hand off from one access technology to another access technology. For example, if mobile telephone 600 is connected to a network via cellular access technology, and the network determines as discussed hereinabove that it is desirable that mobile telephone 600 use 802.1x access technology instead, then a message indicating a handoff is required is sent to mobile telephone 600 where it is received via antenna 601 and radio transceiver 602. Processor 606 then initiates the hand off according to well known procedures for handoffs.
The foregoing Detailed Description is to be understood as being in every respect illustrative and exemplary, but not restrictive, and the scope of the invention disclosed herein is not to be determined from the Detailed Description, but rather from the claims as interpreted according to the full breadth permitted by the patent laws. It is to be understood that the embodiments shown and described herein are only illustrative of the principles of the present invention and that various modifications may be implemented by those skilled in the art without departing from the scope and spirit of the invention. Those skilled in the art could implement various other feature combinations without departing from the scope and spirit of the invention.
This application is a continuation of and claims priority to U.S. patent application Ser. No. 13/948,205, filed Jul. 23, 2013, now U.S. Pat. No. 8,792,914, which is a continuation of U.S. patent application Ser. No. 11/322,751, filed Dec. 30, 2005, now U.S. Pat. No. 8,494,559.
Number | Name | Date | Kind |
---|---|---|---|
6011973 | Valentine et al. | Jan 2000 | A |
6208857 | Agre et al. | Mar 2001 | B1 |
6466796 | Jacobson et al. | Oct 2002 | B1 |
6978023 | Dacosta | Dec 2005 | B2 |
7046998 | Verma et al. | May 2006 | B2 |
7089005 | Reddy | Aug 2006 | B2 |
7092722 | Oh et al. | Aug 2006 | B1 |
7155238 | Katz | Dec 2006 | B2 |
7228135 | Gromakov et al. | Jun 2007 | B2 |
7260399 | Oh | Aug 2007 | B1 |
7310511 | Barnea et al. | Dec 2007 | B2 |
9723520 | Sylvain | Aug 2017 | B1 |
20010039623 | Ishikawa | Nov 2001 | A1 |
20030091030 | Yegin et al. | May 2003 | A1 |
20030133421 | Sundar et al. | Jul 2003 | A1 |
20030182095 | Saito et al. | Sep 2003 | A1 |
20030223395 | Chitrapu | Dec 2003 | A1 |
20040023669 | Reddy | Feb 2004 | A1 |
20040203732 | Brusilovsky et al. | Oct 2004 | A1 |
20040203789 | Hammond et al. | Oct 2004 | A1 |
20040203824 | Mock et al. | Oct 2004 | A1 |
20040259546 | Balachandran et al. | Dec 2004 | A1 |
20050003818 | Kanto et al. | Jan 2005 | A1 |
20050180368 | Hansen et al. | Aug 2005 | A1 |
20050232189 | Loushine | Oct 2005 | A1 |
20050288036 | Brewer et al. | Dec 2005 | A1 |
20060121914 | Kim et al. | Jun 2006 | A1 |
20060217147 | Olvera-Hernandez et al. | Sep 2006 | A1 |
20060258371 | Krishnamurthi et al. | Nov 2006 | A1 |
20070025287 | Goren et al. | Feb 2007 | A1 |
20070082645 | Malomosoky et al. | Apr 2007 | A1 |
20070110009 | Bachmann et al. | May 2007 | A1 |
20070149211 | Dunn et al. | Jun 2007 | A1 |
20090149157 | Gallagher et al. | Jun 2009 | A9 |
Entry |
---|
U.S. Office Action dated Sep. 23, 2013 in U.S. Appl. No. 13/948,205. |
U.S. Notice of Allowance dated Mar. 27, 2014 in U.S. Appl. No. 13/948,205. |
U.S. Notice of Allowance dated Jun. 3, 2014 in U.S. Appl. No. 13/948,205. |
U.S. Office Action dated Oct. 8, 2008 in U.S. Appl. No. 11/322,751. |
U.S. Office Action dated May 20, 2009 in U.S. Appl. No. 11/322,751. |
U.S. Office Action dated Oct. 23, 2009 in U.S. Appl. No. 11/322,751. |
U.S. Office Action dated Apr. 13, 2010 in U.S. Appl. No. 11/322,751. |
U.S. Office Action dated Oct. 18, 2010 in U.S. Appl. No. 11/322,751. |
U.S. Office Action dated Mar. 28, 2011 in U.S. Appl. No. 11/322,751. |
U.S. Office Action dated Dec. 5, 2011 in U.S. Appl. No. 11/322,751. |
U.S. Office Action dated Sep. 7, 2012 in U.S. Appl. No. 11/322,751. |
U.S. Office Action dated Mar. 15, 2013 in U.S. Appl. No. 11/322,751. |
Number | Date | Country | |
---|---|---|---|
20140334443 A1 | Nov 2014 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 13948205 | Jul 2013 | US |
Child | 14337326 | US | |
Parent | 11322751 | Dec 2005 | US |
Child | 13948205 | US |