This invention relates generally to the field of wireless communications and, more particularly, to a method and system for managing wireless bandwidth resources.
The management of communication systems has become more difficult as the systems have become increasingly larger and more complex. Modern communication systems include wireless devices that are capable of initiating network sessions through serving nodes that couple the wireless devices to a network. Because of this, serving nodes are capable of monitoring a wireless device's communications in order to provide network sessions in accordance with the user's service level agreement with the network service provider.
Traditional methods for providing the appropriate network sessions require the serving node to process payload data in every packet that is destined for the network from a wireless device, in order to verify proper session activity for the user. For example, if a user attempts to access a particular web-site, the serving node retrieves this information from the packet sent by the wireless device. The serving node then checks the user's agreement with the network service provider to determine whether the user is allowed access to the requested web-site. If the user is allowed access, the serving node transmits the packet to the network for further processing. If the user is not allowed access, the serving node may inform the user that access is denied or may request additional access information from the user.
Additionally, traditional methods call for the traffic parameters, such as bandwidth, to be specified apriori in a service level agreement, and, moreover, there is little or no communication between the different elements of the communication system. Thus, there is little flexibility in allocating the bandwidth of a wireless link between different sessions.
The present invention provides a method and system for managing wireless bandwidth resources that substantially reduce or eliminate disadvantages and problems associated with previously developed systems and methods. Accordingly, in particular embodiments, the present invention provides a method and system capable of dynamically adjusting traffic characteristics for a wireless link by having wireless and wireline systems cooperate and by ensuring that the required radio resources are available before accepting a data service and/or additional data service from a mobile unit.
In some embodiments, a method for managing wireless bandwidth resources includes receiving at a serving node a service request for a mobile unit and communicating with a wireless network node to determine whether sufficient wireless bandwidth is available for the requested service. The method also includes processing the service request based on the availability of wireless bandwidth.
In particular embodiments, a system for managing wireless bandwidth resources includes a plurality of queues at a serving node and a scheduler. The queues store traffic for a session of a mobile unit, the session having at least two services, and the scheduler queues the traffic at the serving node based on a priority of the service.
In certain embodiments, a method for managing wireless bandwidth resources includes determining at a mobile unit that an associated application desires a service and generating a message requesting approval for the service, the message containing traffic characteristics for the service. The method also includes receiving a message regarding approval, determining whether the service is approved, and updating traffic information for a wireless link if the service is approved.
Technical advantages of the present invention include providing dynamic traffic management between the mobile unit and the radio network controller by having the mobile unit cooperate with the radio network controller. This means that there is a closed loop traffic management system, which includes the mobile unit, the base station, and the serving node. As a result, an agent in the serving node may verify session activity, obtain approval from the base station that sufficient radio resources are available to start a data service in a data session or a data session itself, and inform the wireless device, which may then connect to the network as requested. In particular embodiments, the present invention provides mobile assisted traffic link bandwidth optimization.
In certain embodiments, the invention allows queuing of traffic for transport over the wireless link based on available wireless resources and quality of service requirements for the traffic. Accordingly, radio traffic may be prioritized and different services provided on the wireless link.
In particular embodiments, out-of-band messages are communicated between a wireless device and an agent in the serving node when the wireless device is attempting to initiate a network session. Accordingly, the burden on the resources of the serving node with regard to verifying session activity is greatly reduced, freeing those resources to accomplish other tasks. Furthermore, the traffic and the signaling messages do not need to be mixed.
In addition, the wireless device may assist in service request management by tracking previously accepted or rejected services in the wireless device. As a result, the serving node is not required to re-verify a service that has been processed previously. Furthermore, the amount of signaling sent over the air from the wireless device to the serving node with regard to a service request is reduced.
Other technical advantages of the present invention include distributing intelligence about network sessions across the wireless infrastructure and the wireless devices. This reduces processing power required by the wireless infrastructure, which reduces costs for the operator. The intelligence distribution also provides increased flexibility in terms of service management, and allows a user more flexibility in selecting services. As a result, the service provider may obtain increased revenues, while the user may select services in real-time and inform the wireless infrastructure of actions and conditions for the newly selected services.
Additional technical advantages include the ability for the service provider to dynamically set traffic characteristics for the data services in a session. Thus, if a new data service is to be added and insufficient bandwidth exists, the service provider may, consistent with quality of service provisions, degrade the quality of the service or of another data service. Accordingly, this allows a better utilization of resources.
Furthermore, the availability of radio resources may be examined before approving a data service. Thus, advanced information may be used in determining whether to approve a request for a data service.
Other technical advantages will be readily apparent to those skilled in the art from the following figures, description, and claims.
For a more complete understanding of the present invention and its advantages, reference is now made to the following description taken in conjunction with the accompanying drawings, wherein like numerals represent like parts, in which:
Mobile unit 14 may be a wireless telephone, a wireless interface terminal, or other suitable mobile device operable to provide wireless communication in communications system 10. Servers 18 include an accounting server 18a , a location server 18b , and/or any other suitable server 18c for providing services in the communications system 10. Accounting server 18a allows reconciliation between different systems, and location server 18b facilitates location of the mobile unit 14 and advertising to application based servers. In general, system 10 may have any number and/or type of servers.
Mobile unit 14 and servers 18 are coupled to one another and communicate through a network 22, in addition to a wireless infrastructure and a serving node 24. Network 22 may provide this communication over a plurality of communication links 26. Network 22 may be any interconnection found on any computer network such as a wide area network, the Internet, or any other communications and data exchange systems created by connecting two or more computers.
Communication links 26 may be any type of communication link capable of supporting data transfer. In one embodiment, communication links 26 may be, alone or in combination, Integrated Services Digital Network links, Asymmetric Digital Subscriber Line links, T1 or T3 communication lines, hard-wire lines, telephone lines or wireless communication links. It will be understood that communication links 26 may be other suitable types of data communication links. Communication links 26 may also connect to a plurality of intermediate servers between the network 22 and the mobile unit 14 and the servers 18.
Communications system 10 also includes at least one home agent 30 for mobile unit 14, a packet data serving node 24, and a base station 38. Home agent 30 includes a binding table 40 that stores data relating to the mobile unit 14, as described in more detail below. Serving node 24 is coupled to base station 38 through a plurality of radio packet (RP) data switch node links 42 or other suitable links. Each RP link 42 provides a logical path for a mobile unit packet session between the base station 38 and the serving node 24. Servicing node 24 may be any type of device that can receive packets for mobile unit 14 from a data network such as network 22 and forward them toward mobile unit 14.
Base station 38 is operable to provide communication for mobile unit 14 within any of a plurality of cells 46 for that base station 38. As used herein, “each” means every one of at least a subset of the identified items. The mobile unit 14 is operable to communicate with the base station 38 through a transceiver 50 in each cell 46 over a radio frequency (RF) link 56 or other suitable wireless link.
According to one embodiment, the link 56 is an RF link that is based on established technology, such as IS-95 (CDMA), W-CDMA, or CDMA-2000. In a particular embodiment, the link 56 is a code division multiple access (CDMA) link based on a CDMA standard and in which packets are segmented into frames for wireless transmission from the mobile unit 14 to the base station 38 where the frames are re-assembled to reconstitute the packets.
According to the embodiment illustrated in
The system 10 also includes a core control network 62 that is coupled to the base station 38 and a subscriber database 66 that is coupled to the core 62. The core 62 is operable to perform authentication and to set up and disconnect calls for mobile units in cells 46 of the base station 38. The core 62 is also operable to store service level agreements for each user 54 and to provide the agreements to the serving node 24 for service management, traffic management, or other appropriate operations. The core 62 may include a mobile switching center (MSC) that is operable to provide, in conjunction with the base station 38, switch and soft hand-off functionality for the system 10. In this way, voice, video, data, text and other information is routed to and from the mobile unit 14 and connections are maintained with the mobile unit 14 as it moves between cells 46 and between base stations. It will be recognized that system 10 may have multiple base stations serviced by serving node 24, and, furthermore, multiple serving nodes serving multiple base stations. Thus, mobile unit 14 may travel throughout a wide geographic area. Additionally, system 10 may have multiple mobile units such as mobile unit 10 communicating with various devices in the system. The subscriber database 66 stores information relating to mobile unit 14 and/or users 54, such as name, address, account number, account type, and any other suitable information.
Serving node 24 includes a foreign agent 70 that provides communication, through the network 22, between mobile unit 14 and an endpoint. The endpoint may comprise another mobile unit, a standard telephone, a server, or other suitable device. The foreign agent 70 provides functionality similar to the home agent 30 when the mobile unit 14 is out of range for communicating with the home agent 30. The foreign agent 70 includes a binding table 72 that is operable to store data relating to the mobile unit 14.
The serving node also includes queues 76 and a scheduler 74. Queues 76 may be service queues each dedicated to a service and storing data of a micro flow destined for an application at the mobile unit 14. A congestion controller may manage traffic in each service queue based on its priority, such as quality of service (QOS). In one embodiment, traffic is forwarded from a service queue based on wireless bandwidth allocated to the service. The forwarding rate may be controlled as part of the queuing/congestion control process or by the scheduler. Thus, traffic forwarded by the scheduler 74 may be at a rate based on quality of service and/or wireless bandwidth considerations. Accordingly, the serving node may ensure that data is forwarded toward the mobile unit 14 in accordance with service level agreements and/or available bandwidth in the wireless network. Thus, queuing, congestion control, and delay is minimized in the wireless network. The serving node may be a packet data serving node (PDSN).
According to one embodiment, for each mobile unit corresponding to the home agent 30, the binding table 40 includes a mobile unit identifier, a care of address (COA) for the current foreign agent, the internet protocol (IP) address or addresses assigned to the mobile unit, other mobile binding information, and/or any other suitable tunneling characteristics. Similarly, for each mobile unit corresponding to the foreign agent 70, the binding table 72 includes a mobile unit identifier, an address for the home agent, the IP address or addresses assigned to the mobile unit, other mobile information, and any other suitable tunneling characteristics.
Mobile unit 14 and serving node 24 may communicate data and associated addressing information by in-band and/or out-of-band messaging. As used herein, “out-of-band” means communication of data that may be retrieved without inspecting the contents of the payload data of in-band messages. Thus, out-of-band communication provides a mechanism for communicating data in order to implement functions that may be undefined at the time the in-band messaging parameters are determined.
As described in more detail below in connection with FIGS. 2A-C, agent discovery messages, such as agent advertisement messages (AAMs) and agent solicitation messages (ASMs), allow out-of-band communication that enables the mobile unit 14 to determine whether the mobile unit 14 is in communication with its home agent 30 or a foreign agent 70, to determine whether the mobile unit 14 has roamed from one foreign agent 70 to another foreign agent 70, to obtain a COA when in communication with a foreign agent 70, to assist the serving node 24 with service management, to manage bandwidth resources of the wireless link 56, or to provide or obtain any other suitable information.
In addition to being operable to provide communication for mobile units having the ability to communicate out-of-band messages, the serving node 24 is also operable to provide communication for mobile units that are incapable of communicating using out-of-band messages. Thus, for example, while establishing a connection for a mobile unit, the serving node 24 may identify the connection as out-of-band incapable or as out-of-band capable. In this way, the system 10 may support network communication for various types of mobile units.
The network 22 connects a number of servers 18 to each other and to the serving node 24. The network 22 also connects the serving node 24, and thus the mobile unit 14, to the public switched telephone network (PSTN) 74 through a gateway 76. Accordingly, the mobile unit 14 may communicate through serving node 24, the network 22 and the PSTN 74 with standard telephones, clients and computers using modems or digital subscriber line (DSL) connections or other telephony devices 78.
In operation of particular embodiments, when a mobile unit desires a data service, which is usually triggered by the starting of an application at an associated user or at the mobile unit itself, a session is initiated between the mobile unit, the base station, and the serving node. Initiating a session may involve allocating radio resources, establishing an RP session between the base station and the serving node, establishing a data link session between the mobile unit and the serving node, and/or allocating an IP address to the mobile unit. Once the data link is established, the mobile unit uses an out-of-band message, such as an ASM, to send information about the desired service to the serving node. The information about the service could include the type of service, class of service, and/or data rate and may be sent in the vendor-specific extension of the ASM.
The agent in the serving node extracts the traffic information and updates the traffic information database for the session. The agent, along with the traffic management system, then checks whether the requested traffic characteristics are within the bounds of the service level agreement for the mobile unit. If the request is valid, the serving node sends a request through the RP interface to the base station to determine whether the RF resources are available to support the requested traffic characteristics. The base station may check the forward power, available logical resources, currently utilized bandwidth, and/or other factors to decide whether to allocate the requested bandwidth. The base station then uses RP interface to send an acknowledgement to the serving node. Based on the result received from the base station, the serving node updates the traffic information and sends the result to the mobile unit through an out-of-band message, such as the vendor-extension in an AAM.
After establishing the session and the initial service, it is possible that the mobile unit will desire additional services. When an application requests an additional service, the mobile unit will send an out-of-band message to the serving node through the data link established for the first service. The serving node determines whether the service request is within the service level agreement and, if so, queries the base station as to whether adequate RF resources are available for the new service. If available, the base station reserves the resources and sends an acknowledgment to the serving node through the RP interface. The serving node updates the traffic information and sends an acknowledgement to the mobile unit using an out-of-band message, such as an AAM.
The message format between the serving node 24 and the base station 38 may be modified to support the messaging between the two. For example, in one embodiment, private extensions are added to the messages between the serving node 24 and the base station 38 such that the base station can decide whether sufficient radio resources are available for the service request. The private extensions added to the RP interface may carry mobile unit requested traffic profile and base station granted characteristics. The base station may also use these to request the serving node to inform the mobile unit to degrade a service in a service request or other services corresponding to the data session originating from the mobile unit.
When mobile unit 14 is outside the range of its home agent 30 such that communication with the network 22 is provided by foreign agent 70, the serving node 24 recognizes that mobile unit 14 is communicating with a transceiver 50 in one of cells 46 for the base station 38 corresponding to the serving node 24. Based on this recognition, the foreign agent 70 for the serving node 24 transmits an agent advertisement message (AAM) on the RP link 42 for the mobile unit 14. In this way, only the mobile unit 14 associated with the RP link 42 receives the AAM. The AAM includes a header, router advertisement information, a mobile advertisement extension and other extensions, as shown in
After receiving the AAM from the foreign agent 70, the mobile unit 14 transmits a registration request message (RReqM) to the foreign agent 70 as a home link directed broadcast message. The RReqM includes a user identifier, a mobile identifier, a telephone number, or other suitable information from which a home agent 30 may identify the mobile unit 14.
The foreign agent 70 transmits the RReqM throughout the network 22 to identify home agents 30 for the mobile unit 14. Any home agent 30 in the home network for the mobile unit 14 that receives the RReqM from the foreign agent 70 may respond by transmitting a registration reply message (RRepM). The RRepM includes a home agent address and a code field value indicating a rejection of the request. The foreign agent 70 receives an RRepM from each home agent 30, stores relevant information regarding the home agents 30 in the binding table 72, and transmits these messages to the mobile unit 14 over the RP link 42 for the mobile unit 14.
The mobile unit 14 selects one home agent 30 and transmits an RReqM to the foreign agent 70 that indicates which home agent 30 has been selected. The foreign agent 70 updates the binding table 72 and transmits the RReqM to the selected home agent 30 which assigns an IP address for the mobile unit 14. The foreign agent 70 also notifies the selected home agent 30 of the COA of the foreign agent 70 for forwarding packets to the mobile unit 14.
The selected home agent 30 transmits an RRepM including the IP address for the mobile unit 14 to the foreign agent 70. The foreign agent 70 transmits the RRepM to the mobile unit 14 over the RP link 42. The mobile unit 14 retrieves the IP address from the RRepM as its address for communication. At this point, the mobile unit 14 may send messages with the retrieved IP address as a source address and may process messages with the retrieved IP address as a destination address.
The selected home agent 30 notifies the network 22 with a broadcast message that any messages with the IP address of the mobile unit 14 as a destination address are to include a media access control (MAC) address for the home agent 30. The network routers update their routing tables to include the MAC address of the home agent 30 for the IP address of the mobile unit 14. Each message for the mobile unit 14 will then comprise the MAC address of the home agent 30 and the destination IP address of the mobile unit 14. The home agent 30 intercepts each packet destined for the mobile unit 14. Based on the COA of the foreign agent 70, the home agent 30 tunnels the intercepted packets to the foreign agent 70. The foreign agent 70 extracts the original packets and delivers them to the mobile unit 14.
If the mobile unit 14 moves to a cell for a different base station corresponding to a different serving node and foreign agent, the home agent 30 updates the COA in the binding table 40 to correspond to the new foreign agent. In this way, messages for the mobile unit 14 will be tunneled to the appropriate foreign agent, which may then transmit the messages to the mobile unit 14. According to one embodiment, the mobile unit 14 sends an RReqM to the current foreign agent, which relays the message to the home agent 30. The home agent 30 updates entries in the binding table 40 with the new COA and sends an RRepM to the mobile unit 14 through the current foreign agent. The previous foreign agent removes the information from the binding table after the expiration of a timer.
Each data extension 140 includes a data type field 144, indicating what type of data is included in the data extension 140, a data length field 148, indicating the length of the data included in the data extension 140, and a data field 152, containing the actual data for the data extension 140. The data type field 144 may indicate “application identifier,” “user data,” or any other suitable data type known to both a service provider for the network 22 and the mobile vendors. The data length field 148 may indicate the length of the data field 152 in bytes. The format and length of the data field 152 may be determined by the data type 144 and data length 148. Data extensions 140 allow variable amounts of information to be included within each discovery message.
In a particular embodiment, the data extensions 140 are used in pairs. The first data extension 140 conveys an identifier associated with the application requesting service in the data field 152, and the second data extension conveys the data associated with the service in the data field 152. The appropriate indicators for the data fields are placed in type field 144. Thus, when the serving node responds, the mobile unit will know with which application the response is associated. A variety of other combinations and/or arrangements of the data extensions exist.
The protocol stack 200 also includes a transport layer 210, an application layer 212, an access layer 214, and an ICMP layer 216. The transport layer 210 is operable to process in-band communications. The application layer 212 includes one or more applications 222, each of which may be executed in the mobile unit 14 either alone or concurrently with other applications 222. The applications 222 may comprise telephony, video, voice, web browser, or any other suitable applications. The transport layer 210 includes one or more protocols 220 for the applications 222. For example, the transport layer 210 may include a transmission control protocol 220a for packet data applications 222, a user datagram protocol 220b for mobile IP applications 222, or any other suitable protocol 220.
The access layer 214 includes a service access manager (SAM) 224 that is operable to manage out-of-band communications for a plurality of applications 222 in the mobile unit 14 and a traffic manager 226 that is operable to maintain the status of the traffic sizing and characteristics for the mobile unit 14 and to assist the SAM 224 in determining if new service requests are allowable. In particular embodiments, the traffic manager 226, based on the traffic characteristics, also performs traffic queuing when the radio resources are not available.
The ICMP layer 216 includes an ICMP manager 228 that is operable to generate out-of-band messages for the mobile unit 14.
The managers 224, 226 and 228, as well as other components in the system 10, comprise logic encoded in media. The logic includes functional instructions for carrying out program tasks. The media may be computer disks or other computer-readable media, application-specific integrated circuits (ASICs), field-programmable gate arrays (FPGAs), digital signal processors (DSPs), other suitable specific or general purpose processors, transmission media or other suitable media in which logic may be encoded and utilized.
As described below in connection with
Access layer 214 also includes user table 234, which stores information regarding each of users 54, and traffic table 236, which stores information regarding the utilization of wireless link 56. The information regarding users 54 may include the type of service of which the application is capable, such as, for example, ftp, tftp, e-mail, and/or push services, whether the application is running locally on the mobile unit or on a host subtending the mobile unit, the application user name and password, and/or associated identifiers. The information regarding the wireless link may include the requested bandwidth, the approved bandwidth, the drop precedence, the delay budget, and/or the quality of service for each service in a session. Tables 232, 234, 236 and 238 may be any suitable data store.
Because the mobile unit 14 may execute a plurality of applications 222 simultaneously, the vendor-specific extension 112 of the ASM 100 may include a data extension 140 with an application identifier to identify the application 222 providing the data and a data extension 140 with the corresponding data from the application 222. The application identifier may be assigned by the SAM 224. In addition, the vendor-specific extension 134 of the AAM 120 may include a data extension 140 with an application identifier to identify the application 222 to receive the data and a data extension 140 with the corresponding data for the application 222. The ICMP manager 228 may compose the ASM, decompose the AAM, and provide and analyze the data types in the vendor-specific extensions based on the service type table 238. The service access manager 224 is operable to resolve incoming and outgoing messages based on the application identifier for each application 222.
In operation, when an AAM 120 is received, the ICMP manager 228 performs an initial parsing of the vendor-specific extension 134. The ICMP manager 228 compares the data type 144 with the service type table 238. If a match is found, the ICMP manager 228 provides the vendor-specific extension 134 to the service access manager 224. The service access manager 224 identifies the appropriate application 222 based on the application identifier in the vendor-specific extension 134 of the AAM 120 and provides the data to the identified application 222.
In addition, when an application 222 provides data for the foreign agent 70 to the service access manager 224, the service access manager 224 provides the data and the application identifier for the application 222 to the ICMP manager 228. The ICMP manager 228 then generates an ASM 100 including the application identifier and the data in the vendor-specific extension 112.
At step 304, the SAM 224 inspects the service access table 232, which tracks previously accepted and rejected session initiation attempts for each application 222. At decisional step 306, the SAM 224 determines whether the session request was processed previously based on the data in the service access table 232. This determination may include, for example, matching a requested URL to a URL stored in the service access table 232 in association with the requesting application 222. If the session request was processed previously, the method follows the Yes branch from decisional step 306 to step 308.
At step 308, the SAM 224 provides the response indicated in the service access table to the application 222. Thus, if the request was previously accepted by the serving node 24, the SAM 224 provides an “accepted” response to the application 222, while if the request was previously rejected by the serving node 24, the SAM 224 provides a “rejection” response to the application 222. At this point, the method comes to an end. Thus, using the service access table 232, the SAM 224 in the mobile unit 14 may handle previously processed session requests without utilizing communication resources or serving node resources and without accessing external resources. As used herein, therefore, without accessing external resources means without accessing external resources at the time the SAM 224 is processing the previously processed request, as opposed to at the time the SAM 224 initially processes a request and obtains the response for storage in the service access table 232.
Returning to decisional step 306, if the session request was not processed previously, the method follows the No branch from decisional step 306 to step 310. At step 310, the SAM 224 provides the session request to the ICMP manager (ICMPM) 228. At step 312, the ICMPM 228 generates an ASM 100 with the session request in the vendor-specific extension 112 and transmits the ASM 100 to the foreign agent 70.
At step 314, the foreign agent 70 receives the ASM 100 from the mobile unit 14 and extracts data from the vendor-specific extension 112. At decisional step 316, the foreign agent 70 determines whether the data types 144 for the data extensions 140 in the vendor-specific extension 112 are valid based on a comparison to data types 144 in the service type table 238. If the data types 144 are not valid, the method follows the No branch from decisional step 316 to step 318.
At step 318, the foreign agent 70 discards the data from the vendor-specific extension 112, and the method comes to an end. In this situation, the expiration of a timer at the mobile unit 14 may indicate to the mobile unit 14 that the foreign agent 70 has not responded in a timely manner. The mobile unit 14 may then attempt to re-send the ASM 100.
Returning to decisional step 316, if the data types 144 are valid, the method follows the Yes branch from decisional step 316 to decisional step 320. At decisional step 320, the foreign agent 70 determines whether the requested session is allowable based on the service level agreement for the user 54 provided to the serving node 24 by the core 62. If the requested session is not allowable, the method follows the No branch from decisional step 320 to step 322. At step 322, the foreign agent 70 generates an AAM 120 with a session rejection in the vendor-specific extension 134 and transmits the AAM 120 to the mobile unit 14. The method then continues to step 334.
Returning to decisional step 320, if the requested session is allowable, the method follows the Yes branch from decisional step 320 to decisional step 324. At decisional step 324, the foreign agent 70 determines whether any unmet conditions on the allowability of the session exist, such as user authentication, receipt of billing information, bandwidth availability, and the like. Accordingly, a session request may be allowed, rejected or conditionally allowed. If there are unmet conditions on the allowability of the session, the method follows the Yes branch from decisional step 324 to step 326. At step 326, the foreign agent 70 attempts to meet the conditions without user input, if possible. For example, if a user 54 may be authenticated based on data in the core 62 for that user 54, the foreign agent 70 may meet an authentication condition without user input. The method then continues to step 328.
Returning to decisional step 324, if there are no unmet conditions on the allowability of the session, the method follows the No branch from decisional step 324 to step 328. At step 328, the foreign agent determines whether any additional triggers are indicated by the session request. Additional triggers may comprise informing one of servers 18 of the session request or other suitable triggers. If an additional trigger is indicated, the method follows the Yes branch from decisional step 328 to step 330. At step 330, the foreign agent 70 sends an additional trigger to one or more servers 18 through the network 22 in accordance with the indicated additional triggers. The method then continues to step 332.
Returning to decisional step 328, if an additional trigger is not indicated, the method follows the No branch from decisional step 328 to step 332. At step 332, the foreign agent 70 generates an AAM 120 with a session acceptance in the vendor-specific extension 134 and transmits the AAM 120 to the mobile unit 14. At step 334, the mobile unit 14 receives the AAM 120 generated in either step 322 or step 332 and extracts the data from the vendor-specific extension 134.
At decisional step 336, the ICMPM 228 determines whether the data types 144 for the data extensions 140 in the vendor-specific extension 134 are valid based on a comparison to data types 144 in the service type table 238. If the data types 144 are not valid, the method follows the No branch from decisional step 336 to step 338. At step 338, the ICMPM 22.8 discards the data from the vendor-specific extension 134, and the method comes to an end. In this situation, the expiration of a timer at the foreign agent 70 may indicate to the foreign agent 70 that the mobile unit 14 has not responded in a timely manner. The foreign agent 70 may then attempt to re-send the AAM 120.
Returning to decisional step 336, if the data types 144 are valid, the method follows the Yes branch from decisional step 336 to step 340. At step 340, the ICMPM 228 provides the data from the vendor-specific extension 134 to the SAM 224. At decisional step 344, the SAM 224 determines whether the session request was accepted by the foreign agent 70. If the session request was not accepted, the method follows the No branch from decisional step 344 to step 346. At step 346, the SAM 224 modifies the service access table 232 to indicate that the session request was rejected. At step 348, the SAM 224 notifies the application 222 that the session request was rejected, at which point the method comes to an end.
Returning to decisional step 344, if the session request was accepted, the method follows the Yes branch from decisional step 344 to decisional step 350. At decisional step 350, the SAM 224 determines whether additional information was requested by the foreign agent 70. For example, if an unmet condition on allowability was found to exist in step 324 that could not be met without user input in step 326, additional information may be requested through the vendor-specific extension 134 of the AAM 120. If additional information was requested, the method follows the Yes branch from decisional step 350 to step 352.
At step 352, the additional information received from the user 54 is provided to the foreign agent 70. At decisional step 354, the foreign agent 70 determines whether the additional information is acceptable. If the additional information is unacceptable, the method follows the No branch from decisional step 354 and returns to step 348, where the SAM 224 notifies the application 222 that the session request was rejected.
Returning to decisional step 354, if the additional information is acceptable, the method follows the Yes branch from decisional step 354 to step 356. Also, returning to decisional step 350, if additional information was not requested, the method follows the No branch from decisional step 350 to step 356. At step 356, the SAM 224 modifies the service access table 232 to indicate that the session request was accepted. At step 358, the SAM 224 establishes the requested session for the application 222, at which point the method comes to an end.
In this way, out-of-band communication is provided between the mobile unit 14 and the foreign agent 70 of the serving node 24. In addition, previously accepted or rejected session requests are tracked in the mobile unit 14 through the service access table 232 such that the serving node 24 is not required to re-verify a session request that has been processed previously. Thus, the foreign agent 70 may accept or reject session requests without checking the contents of the payload data for each message sent from the mobile unit 14. Accordingly, the burden on the resources of the serving node 24 is greatly reduced, freeing those resources to accomplish other tasks.
If, however, sufficient bandwidth is available, the mobile unit, based on the service request, updates the user information and the traffic information at function block 520. In this embodiment, the mobile unit keeps track of the traffic characteristics associated with the current services in order to understand if and how to degrade traffic within the session to remain within service level agreements. At function block 524, the mobile unit generates a message requesting network approval for the service, which is sent to the serving node. For example, SAM 224 may provide the service request to the ICMP manager 228, which can generate an ASM 100 with the service request including a requested bandwidth in the vendor-specific extension 112. The ASM may use the same link allocated to a previous data service and will terminate at the agent of the serving node. At function block 528, the mobile unit starts a timer for receipt of a response to the approval message.
At decision block 532, the mobile unit determines whether the approval timer has expired. If the approval timer has not expired, the mobile unit determines whether it has received a message regarding approval at decision block 536. If the mobile unit has not received a message regarding the approval message, the mobile unit returns to decision block 532 to again determine whether the timer has expired. The mobile unit will continue to cycle between decision block 532 and decision block 536 until the expiration of the timer or receipt of the message regarding approval. Alternatively, the mobile unit may remain in a wait response state until receipt of a response or expiration of the timer.
If the approval timer expires before the message is received, the mobile unit increments a variable indicating the number of retrys at function block 540, and determines whether the number of retrys has exceeded the maximum number of retrys allowed at decision block 544. If the number of retrys has not exceeded the number of maximum retrys, the mobile unit generates another message requesting approval at function block 524. If, however, the maximum number of retrys has been exceeded, the mobile unit updates the user and traffic information based on the fact that no response has been received regarding approval and generates a rejection message at function block 516.
If, however, the mobile unit receives a message regarding approval of the service request before the expiration of the approval timer, the mobile unit determines whether the service request has been approved at decision block 552. The message, for example, may arrive in the vendor-specific extension of AAM 120 and be passed from the ICMP manager 228 to the SAM 224 for processing. If the service request has been approved, the mobile unit updates the user information and traffic information to reflect this fact at function block 556 and generates an access message, which is sent to the requesting user, at function block 560. The mobile unit then enters a state in which the data service is active at state block 564.
If, however, the service request has not been approved, the mobile unit determines whether degradation is allowed at decision block 568. The mobile unit may perform this by having traffic manager 226 determine the bandwidth and/or QOS of the current service within the session. In a particular embodiment, the traffic manager 226 also performs the upgrading/downgrading operations. If degradation is not allowed, the mobile unit updates the user and traffic information at function block 548 to reflect the fact that the service request has not been approved. The mobile unit then generates a rejection message for the application at function block 516 and returns to the origination state at state block 504.
But if degradation is allowed, the mobile unit adjusts the traffic characteristics of the data services using the wireless link to allow for this degradation at function block 572 and updates the user and traffic information at function block 576. For example, if an application is running a background data session, such as an ftp, the rate and class of service may be degraded. The mobile unit then resets the retry variable at function block 580 and returns to function block 524 to begin the approval process again. This time, however, the ASM 100 will include the bandwidth and/or other characteristics of the degraded data sessions.
Although a variety of functions for the mobile unit have been discussed with respect to flowchart 500, in different embodiments, a mobile unit may have fewer, more and/or an alternative ordering of functions. For example, a mobile unit may not determine whether sufficient bandwidth is available on its own, instead relying solely on the determination by the serving node. As another example, the mobile unit may check whether the service request has been previously rejected and make a determination as to whether to proceed with the service request based on this information. As a further example, the mobile unit may not allow for degradation of other data services. As still a further example, the mobile unit may determine that degradation is available and/or required before seeking approval of a data service. The mobile unit may send the degradation information to the serving node through the ASM.
In performing this function, the base station may use forward power estimation, which attempts to optimize the bandwidth depending on the quality of service level (QOS) for each user. To accomplish this, the base station may compute the amount of power required by each data service of a session:
Pm is the fraction of total power required to transmit information to user i in order to maintain a certain QOS; Eb is the energy per bit;
I0 is the interference power density per Hertz;
R is the information bit rate;
W is the transmission bandwidth;
S1i is the power received by mobile unit i from the BTS;
Sji is the power received by mobile unit i from the BTSj;
K is a correction factor to take into account various uncertainties, such as geographic location and terrain condition; and
N0 W/S1i is the thermal noise.
Thus, a mobile unit will encounter interference from its BTS and the surrounding BTS's due to forward power destined for other mobile units. Interference from other mobile units, however, is negligible because they transmit in different frequency bands than the BTS's.
The QOS attributes that dictate quality are bit error rate and data rate, which are proportional to transmit power. Typically, twenty-five percent of the power is reserved for overhead channels, such as pilot and paging, a small fraction is reserved for handoff, and the rest is reserved to maintain a minimum energy to interference ratio, typically around 7 dB. Hence, the packets in the queue at the serving node can be mapped to the excess power and, therefore, QOS may be maintained. In a particular embodiment, the serving node can estimate the excess bandwidth, using, for example, the above equation.
If the affected cell has unallocated power resources to satisfy the computed and/or estimated power of the services or sufficient RF resources are otherwise determined to be available, the serving node generates a message indicating that the session is approved at function block 624 and enters a state in which the data service is active at state block 628.
If, however, the traffic condition is not approved or sufficient RF resources are not available, the serving node determines whether degradation is available at decision block 632. If degradation is not available,.the serving node updates the user and traffic information at function block 636 to reflect this fact and generates a message indicating that the session is not approved at function block 640. The serving mode then returns to the origination state at state block 604.
If, however, degradation is available, the serving node updates the user and traffic information at function block 644 and generates a message indicating that degradation is available and the allowed bandwidth at function block 648. The message may be sent to the mobile unit as part of AAM 100 with the allowed bandwidth in the extension. The serving node then starts a message timer at function block 652.
At decision block 656, the serving node determines whether the message timer has expired. If the message timer has not expired, the serving node determines whether a message regarding degradation has been received at decision block 658. If a message regarding degradation has been received, the serving node proceeds to function block 612 to process the information in the message. If a message has not been received, the serving node again examines the timer.
If the message timer expires before the serving node receives a response to the message, the serving node increments a variable indicating the number of retrys of the degradation message at function block 660 and determines whether the number of retrys has exceeded the maximum number of retrys allowed at decision block 664. If the number of retrys has not exceeded the maximum number of retrys, the serving node returns to function block 648 to resend the message. If, however, the number of retrys exceeds the maximum number, the serving node updates the user and traffic information at function block 668 and returns to state block 604.
Although flowchart 600 illustrates a variety of operations for the serving node, other embodiments may have fewer, more, and/or alternate arrangements of operations. For example, the serving node may itself determine whether sufficient RF resources are available based on information received on the status of the wireless network. As a further example, the serving node may not determine whether degradation is available. As still a further example, the serving node may determine whether the session is in accord with the service level agreement for the user. A variety of other examples exist.
After a service is established and allocated a wireless bandwidth, traffic destined for the application may be controlled and/or throttled at the serving node based on QOS and the bandwidth for the service. Thus, the traffic may be forwarded out of the queue for a service at a rate corresponding to allocated bandwidth in the wireless network. Thus, substantially no priority independent congestion control and/or packet drops need to take place for transmission over the wireless link. Rather, RF transmissions are QOS based due to queuing and/or selectivity in the serving node.
Although the present invention has been described with several embodiments, various changes and modifications may be suggested to one skilled in the art. It is intended that the present invention encompasses such changes and modifications as fall within the scope of the appended claims.
Number | Date | Country | |
---|---|---|---|
Parent | 09908348 | Jul 2001 | US |
Child | 11202341 | Aug 2005 | US |