It is becoming more important to be able to provide telecommunication services to subscribers which are relatively inexpensive as compared to cable and other land line technologies. Further, the increased use of mobile applications has resulted in much focus on developing wireless systems capable of delivering large amounts of data at high speed for mobile users.
Development of more efficient and higher bandwidth wireless networks has become increasingly important and addressing issues of how to maximize efficiencies of such networks is an ongoing. One such issue relates to efficient scheduling of transmissions between a base station and multiple user stations in a multiple access wireless network such as a network using orthogonal frequency division multiple access (OFDMA) protocols.
While the following detailed description may describe example embodiments of the present invention in relation to broadband wireless metropolitan area networks (WMANs), the invention is not limited thereto and can be applied to other types of wireless networks where similar advantages may be obtained. Such networks specifically include, if applicable, wireless local area networks (WLANs), wireless personal area networks (WPANs) and/or wireless wide area networks (WWANs) such a cellular networks and the like. Further, while specific embodiments may be described in reference to wireless networks utilizing multi-user Orthogonal Frequency Division Multiplexing (OFDM) otherwise referred to as Orthogonal Frequency Division Multiple Access (OFDMA), the embodiments of present invention are not limited thereto and, for example, can be implemented using other air interfaces where suitably applicable.
The following inventive embodiments may be used in a variety of applications including transmitters and receivers of a radio system, although the present invention is not limited in this respect. Radio systems specifically included within the scope of the present invention include, but are not limited to, network interface cards (NICs), network adaptors, fixed or mobile access points, mesh stations, base stations, hybrid coordinators (HCs), gateways, bridges, hubs, routers or other network peripherals. Further, the radio systems within the scope of the invention may include cellular radiotelephone systems, satellite systems, personal communication systems (PCS), two-way radio systems and two-way pagers as well as computing devices including such radio systems such as personal computers (PCs) and related peripherals, personal digital assistants (PDAs), personal computing accessories, hand-held communication devices and all existing and future arising systems which may be related in nature and to which the principles of the inventive embodiments could be suitably applied.
Networks that may employ embodiments of the present invention may be a high throughput wireless communication network such as those contemplated by various IEEE 802.16 standards for fixed and/or mobile broadband wireless access (BWA), a 3rd Generation Partnership Project (3GPP) Long Term Evolution (LTE) mobile phone network or other type of high bandwidth WMAN, WLAN or WWAN.
In the IEEE 802.16 standards (sometimes referred to as WiMAX, an acronym that stands for Worldwide Interoperability for Microwave Access), two principle communicating wireless network nodes are defined including the Base Station (BS) and the Subscriber Station (SS). However, these terms are used in a generic manner throughout this specification and their denotation in this respect is in no way intended to limit the inventive embodiments to any particular type of network.
In one example configuration, a base station is a managing entity which controls the wireless communications between subscriber stations and a provider network and/or potentially between the subscriber stations themselves. Subscriber stations in turn, may facilitate various service connections of other devices to a network via a private or public local area network (LAN), although the embodiments are not limited in this respect.
In the example configuration of
In one implementation base station 115 may send data to subscriber stations 120-124 in downlink (DL) and receives data from stations 120-124 in uplink (UL) in a sequence of transmission time intervals (TTIs). A TTI in some network configurations such as IEEE 802.16 standards may be referred to as an air frame or a frame. In other network configurations, TTIs may be referred to as a packet. Provider network 110 may be an amalgam of network(s) run by a network service provider (NSP) or other entities to connect a subscriber to Internet Application Service Provider (iASPs) and may consist of multiple different equipment such as access gateways, universal services interface (USI) server(s), authentication and accounting equipment, core services network (CSN) and the like. In the following embodiments, description in made in reference to WiMAX networks although the inventive embodiments may be applicable to various alternative network types and protocols.
Multicast/Broadcast Services (MCBCS) Using Universal Services Interface (USD in a WiMAX network
Two broad categories of MCBCS services are possible over WiMAX: (i) MCBCS for/by the WiMAX operator: service specifically tailored for/by the NSP for a WiMAX end host; and (ii) MCBCS on the Internet: service NOT tailored for a WiMAX end host such as targeting and delivering through the USI.
MCBCS Delivery through USI
Several MCBCS and pay-per-view (PPV) services available on the internet today. Most of these services though multicast in nature, are often delivered as multi-unicasts to the end hosts. This leads to inefficient use of last mile bandwidth and especially does not scale well with wireless last miles configurations. Thus a need exists for an efficient mechanism to bring all of MCBCS services on the internet to a WiMAX end host. Enabling internet based MCBCS through USI can solve this problem of efficiency on the wireless link since the USI system can be the focal point of such MCBCS traffic from the internet and can deliver such traffic through the existing MCBCS data path within the NSP/NAP.
Although MCBCS architecture is not finalized, it is widely expected to have a MCBCS server in the core services network (CSN). MCBCS services on the internet can be enabled via USI by collocating the MCBCS server in the USI system as shown in
The MCBSC Control on U1 may include: a. Service guide delivery (iASP→USI) or request (USI→iASP) which contains the service/program guide of the iASP; b. Security context delivery (iASP→USI) or request (USI→iASP): example: DRM enabled or not; if yes, DRM related context exchange; and/or c. QoS requirements for the service (iASP→USI) or request (USI→iASP). Eg: Favorable Peak/Avg rates; tolerable latencies.
The MCBCS control flow on U1 is shown in
MCBCS Data on U1
The flow in
USI can be used by the iASPs (like Google® and Yahoo®) to judge the user presence on WiMAX networks and provide value add services based on the presence information. The inventive embodiments provide one such architecture and procedure using USI for the same.
A key advantage of the proposed approach is as follows: When using USI for MCBCS, the MCBCS data from iASPs in the internet is delivered to the MS via the MCBCS data path that achieves better efficiency as opposed to a non-efficient multi-unicast data path that would be used if this MCBCS data came directly from the Internet to the MS. This is a huge efficiency gain for a WiMAX operator on the wireless link which translates to increased spare capacity on the network which can be used for other services.
USI is a novel architecture that may very well change the way that value add services are deployed in broadband wireless networks. Presence is a key component of USI and these embodiments propose a simple and scaleable way for the iASPs to extract user and device presence from WiMAX networks to provide enhanced services.
WiMAX Location Protocol
WiMAX has location capabilities being defined for the WiMAX network in the WiMAX Forum. The architecture for WiMAX location as defined in the WiMAX forum is shown in
Embodiments of the invention describe the WiMAX location protocol (WLP) which is used primarily for the MS to interact with the LS and vice versa. This protocol shall be used for R2 interface. The main purpose of the protocol is to support the following aspects of the WiMAX location: a. location server discovery; and b. providing GPS assistance to the MS in both MS-initiated and network initiated scenarios. GPS assistance is needed to help the MS get the satellite fixes with minimal delay, especially when the MS is indoors where GPS coverage doesn't work well.
The prominent features of WLP include LS discovery, One time and periodic location, and support for GPS assistance such as Ephemeris, Almanac, and/or Broadcast security and privacy.
OMA SUPL [1] is an existing protocol that can be used for this purpose. But, SUPL has the following key issues. The cost of the SLP (SUPL location platform in the NW) can be prohibitive which may impact smaller companies ability to participate. SUPL is just the “cover” protocol which means actual positioning is done underneath by RRLP/RRC/TIA-801 and there is a very high complexity. The SUPL INIT procedure is extremely cellular centric with the three options being: 1. WAP push; 2. MT SMS or 3. (IMS) SIP Push. Push does not work well for PC platforms and security issues such as, how to secure R2 when using SUPL, given that SUPL does not use AAA framework. Further, roaming is suboptimal, home SLP is involved in many of the transactions even though visited SLP can do the job. For WiMAX location based services (LBS), roaming is much simplified as most of the transactions take place with V-LS. Lastly, OMA SUPL has a lot of other features that are irrelevant to WiMAX location effort. These include several documents spanning several 100s of pages and several 10s of messages whereas only 3-4 messages are standardized in WLP.
The key aspects of WLP are (i) LS discovery; (ii) time to first fix enhancement (MS initiated); and (iii) time to first fix enhancement (network initiated).
An exemplary LS discovery method 600 is shown in
A method 700 for the MS initiated Time to first fix enhancement is shown in
A method 800 for Network initiated Time to first fix enhancement is shown in
WLP MESSAGING: The key messages in WLP are EGPS-REQ, EGPS-RSP and EGPS-LOC. Exemplary formats for these messages are described below in reference to Tables. 1-4.
All of the WLP messages have a common WLP header, which is shown in Table 1.
TCP is the main transport for WLP and the encoding used could be TLV or ASN1. To date SUPL is the main protocol available, but that has several limitations for its use in WiMAX as noted above.
The present WLP solution overcomes many or all of the above issues encountered with SUPL. It is very simple, easy to deploy and extremely IP/IETF friendly and hence is tailored much better for Intel platforms as compared to SUPL, which is tailored better for cellular platforms.
Method and System of WiMAX Performance Management
There have been concerns on the mobile Internet performance in the initial WiMAX deployments. Therefore, a 100 KPI (Key Performance Indicator) counters have been proposed to characterize and fine tune WiMAX network performance. The following embodiments relate to a novel method to monitor WiMAX network performance.
System simulation is commonly used during the design phase to evaluate the performance of a wireless communication system. However, most operators are more interested in the performance of the system being deployed, or perceived by end users. Performance management is intended to collect, analyze, and report performance data for the purpose of monitoring and correcting the behavior and effectiveness of the network, and to aid in planning, provisioning, maintenance and the measurement of quality of service.
As opposed to 2G and 2.5G mobile networks that are largely TDM-based where transmission is tuned for voice with data as an add-on, the performance measurement for WiMAX is much more complicated since it is an all-IP mobile network.
It will be a daunting task to capture the mobile WiMAX performance in real-time. Therefore, this invention discloses a novel method to collect peak and mean parameters that are used to characterize WiMAX key performance indicators, including throughput, network entry latency, handover latency, CID, service flow, and subscriber mode statistics.
WiMAX performance management algorithm is described in SDL diagrams of
A KPI Report Tick is generated in each KPI Report Interval. If the KPI Report flag for a corresponding job is enable, then the KPI report will be sent to EMS, and the parameters will be reset.
Secure Payments over Universal Services Interface
Service providers have been looking for a technology that enables convergence of the service layer such that value add services can be easily deployed. To fill this gap, the mobile industry (more specifically 3GPP) has created a comprehensive all-IP network named IP Multimedia Subsystem (IMS). The promise of convergence by IMS is being weighed against its complexity both on the network side and the client device side. This has led the industry to question suitability of IMS as THE convergence technology of choice. However, the IMS complexity and the fact that almost all data services come from the Internet and not the operator, it becomes important to create a value for an operator in the Internet model.
The Universal Service Interface (USI) is an industry-wide initiative in WiMAX Forum that enables the service provider to sell value-add services by simple interfacing to content providers.
Embodiments of the invention relate to a comprehensive method that enables the user on a USI-enabled WiMAX network to send secure electronic payment to any Internet Application Service Provider (iASP). This electronic payment could be posted into the user's monthly access charges of his/her WiMAX service provider. This technology could be used to enable very interesting use cases where a user on a small mobile device (with limited input/output capability) could purchase airline tickets online and have the charges posted on his mobile bill. Another example is exchange of electronic money between friends (e.g. to split the restaurant check). In this process, the service provider (his designated host of the service) could collect a small percentage of the transaction as the service fee.
A Payment Token is sent back to the MS. Payment Token is sent in a secure communication tunnel between the MS and the USI Server. The MS sends the Payment Package. The MS uses the Payment Token along side other parameters to create the E-Payment Package and the encryption key. The USI Payment Key is defined as follows:
payment-tag=USI-User-identity+payment-amount+ASP-domain-name+payment-token
The Payment Package includes the following parameters:
The Payment Package could be appended to a URL as follows: wORLDwideweb.asp-name.com/usi-payment?package=1feea719823rdfwsdwdajjxzsshweiudnak
The text after package demonstrates the encrypted e-payment package. The iASP sends an E-Payment USI Authorization Request towards the USI System of the WiMAX operator. This message includes the following parameter:
Upon receipt of this message, the USI system can look up the payment token validity. If the token number presented does not exist, the e-payment process will be rejected. If the token number is valid, the USI System looks up the USI User Identity associated with the token number and constructs the E-Payment AAA Authorization Request which includes:
Upon receipt of this message, the AAA Server first verifies to see if the user is subscribed to USI Payment service. If negative, a rejection message is sent back to the USI system. Otherwise, the AAA server constructs the UPK and decrypts the payment package. If the user profile allows for such financial amount of transition and the content in the package matches with the payment amount/currency/ASP-Name accompanied in clear text, an accept response is formed. The E-Payment AAA Authorization Response includes:
Upon receipt of this response, the USI System constructs a message towards iASP indicating the result of e-payment authorization and removes the payment token from the system. The response includes:
The rest of the transaction is completed between the iASP and the MS.
Upon success, a success confirmation is propagated from the iASP to the USI System to the AAA Server. This message at least includes the USI User Identity.
In comparison with traditional IMS (IP Multimedia System), the present solution is far more simplified and easier to implement (fewer nodes, simpler protocols). The signaling protocol proposed for secure multimedia session control is XML exchanges over HTTPS. In comparison with traditional Session Initiation Protocol (SIP) used in IMS framework, the present inventive scheme (XML/HTTPS) has the following advantages:
The alternative architecture, i.e., the current IP Multimedia Systems (IMS) developed by 3GPP, is quite sophisticated and expensive to develop both on the network side and the client device side and only allows for walled-garden services (not Internet services). Thus the inventive solution is more secure, reliable, and/or Internet friendly.
Unless contrary to physical possibility, the inventors envision the methods described herein: (i) may be performed in any sequence and/or in any combination; and (ii) the components of respective embodiments may be combined in any manner.
Although there have been described example embodiments of this novel invention, many variations and modifications are possible without departing from the scope of the invention. Accordingly the inventive embodiments are not limited by the specific disclosure above, but rather should be limited only by the scope of the appended claims and their legal equivalents.
The present application claims benefit of priority under 35 U.S.C. §119(e) to U.S. provisional application Ser. No. 61/048,126, filed by the instant inventors on Apr. 25, 2008, the entire content of which is incorporated herein by reference.
Number | Date | Country | |
---|---|---|---|
61048126 | Apr 2008 | US |