The applicants hereby claim the priority under 35 USC 119(a) of International Application PCT/US2003/031536, filed Oct. 3, 2003 and was published in accordance with PCT Article 21(2) on May 12, 2005 in English.
This invention relates to a technique for enabling a mobile communications device to transition from a first wireless communications network to a second network.
Wireless telephony technology continues to evolve over time. Most recently, the European Telecommunications Standards Institute (ETSI) has promulgated a new standard for mobile telephony service, known as “Universal Mobile Telecommunications Service” or UMTS which offers broadband, packet-based transmission of voice, text, video and multimedia information at rates as high as 2 Mbs. The proposed UMTS standard describes a wireless network that includes one or more radio access nodes, each typically referred to as a “Node B.” One or more Radio Network Controllers (RNC) exist within the UMTS network to manage the radio access nodes. Each RNC has a broadband connection, typically in the form of an Asynchronous Transport Mode (ATM) Link, to a UMTS core network that provides Authorization, Authentication and Accounting (AAA) Functions.
Advances in the field of wireless LAN technology have resulted in the emergence of publicly accessible wireless LANs (e.g., “hot spots”) at rest stops, cafes, libraries and similar public facilities. Presently, wireless LANs offer mobile communications device users access to a private data network, such as a Corporate Intranet, or a public data network such as the Internet. The relatively low cost to implement and operate a wireless LAN, as well as the available high bandwidth (usually in excess of 10 Megabits/second) makes the wireless LAN an ideal access mechanism through which the mobile communications device user can exchange packets with an external entity.
Given the lower access cost and higher bandwidth afforded by wireless LANs, users of mobile communications devices often find it advantageous to transition from a wireless telephony network, such as the UMTS network, to a wireless LAN. To that end, many present day wireless LAN operators provide coverage areas that overlap the coverage area of a UMTS network. Also, many mobile communication device manufacturers will include a dual protocol stack within the device to enable the device user to transition between networks.
Ideally, transitioning from the wireless telephone network to the wireless LAN (and vice versa) should occur seamlessly, i.e., without any loss of communications. To achieve a seamless transition from a UMTS network to the wireless LAN, the mobile communications device must first detect entry into the coverage area of the wireless LAN before undertaking a handoff from the wireless telephony network to the wireless LAN. Presently, the mobile communications device undertakes detection of a wireless LAN by operating a second receiver tuned to the wireless LAN while a first receiver remains tuned to the wireless telephony network. Continuously operating both the first and second receivers concurrently consumes battery resources in the mobile communications device, often a precious commodity.
Thus, there is a need for a technique for enabling a mobile communications device to seamlessly transition from one wireless network to another while overcoming the aforementioned disadvantage of the prior art.
Briefly, in accordance with the present principles, there is provided a technique for enabling a mobile communications device to transition from a first wireless communications network, such as a wireless telephony network, to a second wireless network, such as a wireless LAN. To enable such a transition, a synchronization signal (hereinafter referred to as the “second network synchronization signal”) is generated in the second wireless network with a synchronization pattern that is unique to that network. In other words, the second network synchronization signal is readily distinguishable from a first network synchronization signal generated by the first network. The second wireless network broadcasts the second network synchronization signal for receipt by a common receiver in the mobile communications device that also receives the first network synchronization signal. Upon receipt of the second network synchronization signal, the mobile communications device can establish a communication session with the second wireless network to enable a transition thereto from the first wireless communications network. Transmitting the second network synchronization signal for receipt at the same receiver in the mobile communications device that receives the first network synchronization signal obviates the need to continuously operate two separate receivers, thus reducing the consumption of battery resources.
The wireless telephony network 12 of
Referring to
Ideally, the transition (hand off) of the mobile communications device 16 from the wireless telephony network 12 of
Traditionally, the mobile communications device 16 has continuously operated two protocol stacks, and two receivers (not shown), one tuned to the wireless telephony network 12, and the other tuned to the wireless LAN 14. In this way, the mobile communications device can detect the presence of the wireless LAN while still in communications with the wireless telephone network. This approach to achieving seamless transitioning between networks, while effective, nonetheless requires the continuous use of two separate receivers, and the attendant consumption of precious battery power.
In accordance with the present principles, seamless transitioning can be effected without the need to operate two separate receivers simultaneously within the mobile communications device 16. To enable the communications device 16 to detect the presence of the wireless LAN 14 by means of a first receiver (not shown) in the device, the wireless LAN 14 includes a basic transmitter 30 that transmits an identifying signal at the same frequency as a synchronizing signal transmitted by the wireless telephony network 12. The identifying signal transmitted by the transmitter 30 of
The identifying signal transmitted by the transmitter 30 of
In practice, the mobile communications device 16 establishes the identity of the wireless LAN 14 by matching the characteristics of the received P-SCH channel to one of a plurality of stored patterns in memory, each pattern corresponds to a particular wireless network technology. Once the mobile communications device 16 establishes the identity of the wireless LAN 14, the device stops the search for a match. Thereafter, the mobile communications device 16 initiates operation of a second receiver dedicated to the associated wireless LAN radio technology to effect the transition from the wireless telephony network 12 of
As an alternative solution, the transmitter 30 could transmit a Secondary Synchronization Channel (S-SCH) as seen in
After finding the scrambling code group, the first receiver within the mobile communications device 16 looks for a primary CPICH (Common Pilot Channel) channel that carries a well-specified bit sequence that is the same for all cells. From knowledge of the scrambling code group, the receiver will attempt a match to the CPICH channel bit sequence to the stored value (1 among 8 possible sequences). In this way, the first receiver will detect the wireless LAN 14. The wireless LAN detection mechanism is based on the reservation of a scrambling code (the combination of a scrambling code group and a scrambling code in that group) allocated for inter-working of the wireless LAN 14 of
In case the operator of the wireless LAN 14 implements more than one wireless LAN technology, the above-described detection mechanism requires enhancement in one of the two ways:
First Solution:
Second Solution:
The foregoing describes a technique for enabling a mobile communications device to seamlessly transition from a wireless telephony network to a wireless LAN without unnecessary consumption of battery resources.
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/US03/31536 | 10/3/2003 | WO | 00 | 3/24/2006 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO2005/043866 | 5/12/2005 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
6597911 | Kransmo | Jul 2003 | B1 |
7194011 | Nassiri-Toussi et al. | Mar 2007 | B1 |
20020085516 | Bridgelall | Jul 2002 | A1 |
20030099223 | Chang et al. | May 2003 | A1 |
20030108007 | Holeman et al. | Jun 2003 | A1 |
20040005817 | Moon et al. | Jan 2004 | A1 |
20040058679 | Dillinger et al. | Mar 2004 | A1 |
20040058717 | McDonnell et al. | Mar 2004 | A1 |
20040081117 | Malek et al. | Apr 2004 | A1 |
20070091845 | Brideglall | Apr 2007 | A1 |
Number | Date | Country |
---|---|---|
1264228 | Aug 2000 | CN |
1073303 | Jan 2001 | EP |
1 613 112 | Jan 2006 | EP |
2000-92541 | Mar 2000 | JP |
2002-535902 | Oct 2002 | JP |
WO 0042808 | Jul 2000 | WO |
WO 2004091244 | Oct 2004 | WO |
Number | Date | Country | |
---|---|---|---|
20080247378 A1 | Oct 2008 | US |