This invention relates to a technique of changing wireless communication systems at higher speed, and cognitive radio technology for improving the time use efficiency of frequency.
Nowadays, systems such as the third generation mobile phone systems and the wireless LAN systems are individually operated and managed by individual companies. To use the plurality of systems, it is necessary to subscribe to the systems with their respective companies. In such a case, since the systems are independent in the individual companies, the IP addresses of terminals, which are requisite for network connection, are given to the respective systems independently. Therefore, to use a plurality of systems simultaneously, it has been common to use the systems with a plurality of IP addresses.
However, the frequency band below 6 GHz (the VHF, UHF, and low microwave bands) convenient for mobile communication systems is now used densely by the third generation mobile phones, wireless LANs, and others, so conditions of radio waves are seriously tight. In such a circumstance, to secure a frequency band required for highly needed mobile communications while using the radio waves in tight conditions more effectively and efficiently, a technique is required that accomplishes advanced sharing of radio waves among a plurality of radio wave application systems including the mobile communications.
From a political standpoint, the “e-Japan Priority Policy Program—2004” (June, 2004) by the IT Strategic Headquarters at the Ministry of Internal Affairs and Communications of Japan states that “practical use of a wireless communication system capable of establishing an optimum communication environment is aimed to be accomplished by 2011 while accurately determining the availability of radio waves in the periphery and conditions requested by an application program in use to flexibly select a frequency bandwidth, a modulation scheme, a multiplexing scheme, and the like”. Accordingly, a technique for realizing the program has been requested.
To achieve such techniques, an idea of “cognitive radio” was presented in 1999 that recognizes the state of radio and controls the resources of the wireless systems depending on the state (for example, “Cognitive radio for flexible mobile multimedia communications”, by Mitola, 1999 IEEE Int. Workshop on Mobile Multimedia Communications Digest (November 1999) and “Cognitive Radio: Making Software Radios More Personal” by Mitola et al., 1999 IEEE Personal Communication, Vol. 6, No. 4 (1999)). However, there are various approaches to realize the cognitive radio and they are still being studied.
The system comprises a terminal (101) applicable to communications in these plurality of wireless systems, access points in those wireless systems ((102) for EVDO, (103) for the wireless LAN, and (104) for WiMAX), gateways for terminating the wireless systems (corresponding to a PDSN (Packet Data Serving Node) (105) for EVDO, a PDIF (Packet Data Interworking Function) (106) for the wireless LAN, and an ASN-GW (Access Service Network GateWay) (107) for WiMAX), certificate authorities for user authentications in the systems (corresponding to an EVDO-AAA (Authentication Authorization Accounting) (109) for EVDO, a WiFi-AAA (110) for the wireless LAN, and a WiMAX-AAA (111) for WiMAX), and an HA (Home Agent) (108). The gateways, the HA, and the certificate authorities which terminate each system are interconnected by a network (112).
In this system, the access points (102, 103, 104) in the wireless systems each have a function to terminate the wireless zone to the terminal.
The gateways like the PDSN, PDIF, and ASN-GW each have a function of FA (Foreign Agent) to the HA and a function to terminate the wireless system. Although an access point is connected with a gateway in each wireless system in
Conventionally, the systems are independently operated, so the certificate authorities (109, 110, 111) exist independently and user authentications are performed independently in the use of the respective wireless systems.
In this event, the HA (108) manages which wireless system the terminal is currently using in the communication. Specifically, when viewed from the HA, the PDSN (105) behaves as a FA in EVDO, the PDIF (106) behaves as a FA in the wireless LAN, and the ASN-GW (107) behaves as a FA in WiMAX, and the HA has a table containing correspondence relations between the IP address of the gateway in the wireless system used in the current communication and the IP addresses given to the terminal.
When the terminal (101) first connects to EVDO, a terminal authentication called PAP/CHAP is performed between the terminal (101) and the PDSN (105) of the EVDO gateway as shown in the procedure (201). After the PDSN has authenticated the terminal, it sends an Access Request from the terminal (101) to the EVDO-AAA (109). The EVDO-AAA sends information such as an IP address to be given to the terminal (in the example of
If this terminal moves (205) and newly connects to, for example, the wireless LAN system, which is different from EVDO, a terminal authentication called IKEv2 is performed between the terminal and the PDIF (106) of the wireless LAN gateway as shown in the procedure (203). After the PDIF has authenticated the terminal, it sends an Access Request from the terminal (101) to the WiFi-AAA (110). The WiFi-AAA sends information such as an IP address to be given to the terminal (in the example of
As described in the above explanations about the conventional system, to change wireless systems, a user authentication is necessary in each system and the IP addresses given to the terminal because of the change of the systems are different depending on the wireless system. Furthermore, time in the order of seconds is required because a user authentication is performed from the terminal through the gateway at every change.
In a handover situation where the terminal has moved and connects with a plurality of gateways within a system, a change of the system is not necessary, so the same IP address is assigned to the terminal.
When the terminal (101) first connects to the wireless LAN system, the WiFi-AAA (110) assigns the terminal IP address IP=e.f.g.h to the terminal after a user authentication in IKEv2 (203) similar to the description with reference to
After the end of the handover situation, when the terminal (101) completely connects with the PDIF (304) only at the destination, the correspondence relation of the terminal's IP address to the FA's becomes the terminal's IP=e.f.g.h to the FA's IP=z.z.z.z. only (302).
As described above, although the HA can have a plurality of FA addresses for a single terminal IP within the same system in the conventional system, data are multicasted to the FAs in such a situation. Furthermore, a change of gateways take time in the order of seconds because a user authentication is performed at every gateway.
In the conventional system, there has been a problem that, when a terminal newly uses another wireless system in a radio environment where a plurality of wireless systems are available for use, connecting to the wireless system on the user terminal's initiative causes the throughput to exceed the maximum value offered by the wireless system; consequently, the communication bandwidth requested by the terminal cannot be used, and further, the throughputs of the users who had used the wireless system until that time are affected so that the throughput in the whole system is reduced.
In addition, there has been another problem that even if the quality of communication in the wireless system used by a user terminal is degraded because of a change in the radio environment caused by, for example, a move of the user terminal, the conventional system continues to use the same wireless system as long as the session is not interrupted; thereby, the reduction in user throughput increases network delay.
To use a plurality of systems efficiently depending on the momentarily varying radio conditions, a representative aspect of this invention calculates, before a terminal newly connects to a wireless system or changes the wireless system into another, an expected throughput in the whole system and expected delay time in the case that the terminal connects to the wireless system, and controls the wireless system to be connected from the terminal depending on the estimation.
In addition, a representative aspect of this invention monitors the throughput and the delay time of each terminal, and if the quality of communication is degraded, for example, if the throughput decreases or the delay time increases, it predicts whether or not the quality of communication will be improved by changing the wireless system, and selects the wireless system to be used by the terminal in accordance with the results of the prediction.
According to this invention, an appropriate wireless system can be assigned to each terminal by considering radio environments for all terminals connecting to the system, so that the throughput in the whole system can improve.
A first embodiment of this invention will be described. In this embodiment, when a terminal changes wireless systems, the wireless system to be connected from the terminal is determined so as to maximize the system throughput.
Further, the monitoring node has information about application programs to be used by users, such as TOS values in an IP header and a communication port number used by an application program.
Such information is statistically processed in the monitoring node, and further, space information such as the terminal's position and the moving direction is taken into account, to determine the wireless system to be assigned to each terminal.
The system further comprises a control node (PSF: Packet Switching Function) (405) between the upstream side of gateways (105, 106, 107) of the respective wireless systems and a network (112) for switching packets in accordance with instructions from the monitoring node (404). Furthermore, the system comprises a certificate authority (403) common to a plurality of wireless systems for assigning the same IP address to a terminal applicable to a plurality of wireless systems across the plurality of systems.
In the wireless system determination process, the monitoring node first initializes the threshold value of received power for determining the availability of communication in each wireless system, the maximum throughput available in each wireless system, and others (501). Next, it counts the terminals currently connecting to the system, except for the terminal (subject terminal) which triggered the process (502). Then, it calculates the throughput currently available in the unused bandwidth by excluding the throughput in the bandwidth actually occupied by the terminals except for the subject terminal from the maximum throughput (503). It compares the received power by the subject terminal with the threshold value determined at the initialization in each wireless system, and, if the received power exceeds the threshold value, it sets a flag (504).
Next, the monitoring node counts wireless systems connectable from the subject terminal (505), selects the system to be connected from the subject terminal (506), and determines the wireless system (the determined system) to be used by the subject terminal.
The monitoring node which has determined the wireless system to be used by the subject terminal instructs the control node to communicate with the subject terminal in the determined system, and the control node changes the wireless system used in the communication with the subject terminal in accordance with the instruction from the monitoring node.
Next, the monitoring node checks whether a flag indicating that the received power in the selected wireless system exceeds the threshold value has been set or not (603). If the flag indicating that the received power in the selected wireless system exceeds the threshold value has not been set, connection to the wireless system is not available, so the monitoring node proceeds to the determination on the next wireless system. If the flag has been set, it compares the throughput required by the subject terminal with the throughput available in the unused bandwidth in the system calculated in the step 503 (604). If the throughput available in the unused bandwidth exceeds the throughput required by the terminal, the monitoring node turns ON a flag indicating that the wireless system is connectable (605), and increments the number of connectable systems. The monitoring node performs these steps in all of the wireless systems within the system.
Next, the monitoring node executes a process of selecting the wireless system to be connected from the subject terminal (701 in
If the received power in WiMAX exceeds the threshold value, the monitoring node checks the received power in WiFi (805). If it does not exceed the threshold value, the monitoring node selects WiMAX as the system to be connected (806). If it exceeds the threshold value, the monitoring node checks whether the QoS is necessary for the communication requested by the user or not (807). In this embodiment, the monitoring node refers to the value in the TOS field in an IP packet to determine the necessity of QoS; if the TOS value is 0, the monitoring node determines that the QoS is not necessary. The necessity of QoS may be determined by referring to the port number to be used in the communication and a prepared relation table between port numbers and the necessity of the QoS.
The monitoring node compares the throughput available in the unused bandwidth in WiMAX with that in WiFi (808), and if the throughput available in the unused bandwidth in WiMAX is greater than that in WiMAX, it selects WiMAX as the system to be connected (806). Otherwise, it selects WiFi (804). If QoS is needed, it selects WiMAX (806).
In this embodiment, the selection is made between WiMAX which can guarantee the QoS and WiFi which cannot guarantee the QoS. However, if there are a plurality of wireless systems which can guarantee the QoS, the monitoring node selects the wireless system whose available throughput in the unused bandwidth is great. Alternatively, priority orders may be placed to the wireless systems which can guarantee the QoS depending on the quality of guarantee, and further, depending on the quality of communication required by application programs, and then, the monitoring node may select the wireless system to be connected depending on the association of the priorities. It is the same in the case that there are a plurality of wireless systems that cannot guarantee the QoS.
If the connectable wireless system is WiFi, the monitoring node subsequently checks whether the received power in WiMAX exceeds the threshold value or not (902). If the received power in WiMAX does not exceed the threshold value, it selects WiFi as the wireless system to be connected. If the received power in WiMAX exceeds the threshold value, the operations following to this step is the same as the process explained with reference to
As set forth above, according to the first embodiment, in changing wireless systems used by the terminal, an estimated throughput after the change of the wireless systems is preliminarily calculated. Accordingly, the wireless system to be connected from the terminal can be selected on the basis of the calculated results so that the system throughput will be the maximum.
Hereinafter, a second embodiment in the present invention will be described. In this embodiment, when the terminal changes wireless systems, the system to be connected from the terminal is determined so that the delay time will be the minimum.
Similarly to the first embodiment, this embodiment employs the system configuration shown in
In the wireless system determination process, the monitoring node first initializes the threshold value of received power for determining the availability of communication in each wireless system, the maximum throughput in each wireless system, and others (501). Next, it compares the received power by the subject terminal with the threshold value determined at the initialization in each wireless system, and, if the received power exceeds the threshold value, it sets a flag (504). It counts the terminals currently connecting to the system, except for the terminal (subject terminal) which triggered the process (502).
Next, the monitoring node calculates the sum of the throughputs of the terminals except for the subject terminal (AT0) in each wireless system (1101). For example, if the monitoring node has a table (1201), like the one shown in
Then, the monitoring node performs a selection process of the system to be connected from the subject terminal (1102) to determine the wireless system (the determined system) to be used by the subject terminal. The monitoring node that has determined the wireless system to be used by the subject terminal instructs the control node to communicate with the subject terminal in the determined system, and the control node changes the wireless system to be used in the communication with the subject terminal in accordance with the instruction from the monitoring node.
If the received power in WiMAX exceeds the threshold value, the monitoring node checks the received power in WiFi (1303). If it does not exceed its threshold value, the monitoring node selects WiMAX as the system to be connected (806). If it exceeds the threshold value, the monitoring node calculates the transmission delay time in the case that the subject terminal is connected to WiFi (1304) and the transmission delay time in the case that the subject terminal keeps connection to WiMAX (1305). Then, it compares the expected transmission delay time obtained in the step of (1304) and the one obtained in the step (1305) (1306), and selects the wireless system with shorter delay time to determine the wireless system to be connected from the subject terminal.
If the total throughput of the terminals is more than the maximum throughput in WiFi, the monitoring node obtains the delay time from the table of delay time corresponding to throughputs in WiFi (1502) using the throughput of AT0 as a key, and then determines the delay time in WiFi by multiplying the obtained delay time by the number of terminals to be connected to WiFi (where the subject terminal should be included, assuming that the subject terminal is connecting) (1503).
In this embodiment, since the throughput in WiFi is 28.8 Mbps and the throughput of AT0 is 4.8 Mbps, the total throughput in WiFi is 33.6 Mbps. If it is assumed that the maximum throughput in WiFi is 28.8 Mbps, it exceeds the maximum throughput. Therefore, the delay time in WiFi is the value obtained by multiplying the delay time (6.728E-03), which is obtained from the table of delay time corresponding to throughputs in WiFi using 4.8 Mbps of AT0's throughput as a key, by the number of connecting terminals of 2 (existing AT2 connecting to WiFi and AT0).
If the total throughput is more than the maximum throughput in WiMAX, the monitoring node obtains the delay time from the table of delay time corresponding to throughputs in WiMAX (1602) using the throughput of AT0 as a key, and then determines the delay time in WiMAX by multiplying the obtained delay time by the number of terminals to be connected to WiMAX (where the subject terminal should be included, assuming that the subject terminal is connecting) (1603).
In this embodiment, since the throughput in WiMAX is 4.2 Mbps and the throughput of AT0 is 4.8 Mbps, the total throughput in WiMAX is 9.0 Mbps. If it is assumed that the maximum throughput in WiMAX is 6.4 Mbps, it exceeds the maximum throughput. Therefore, the delay time in WiMAX is the value obtained by multiplying the delay time (3.889E-02), which is obtained from the table of delay time corresponding to throughputs in WiMAX using 4.8 Mbps of AT0's throughput as a key, by the number of connecting terminals of 3 (existing AT1 and AT3 connecting to WiMAX and AT0).
Compared the delay time (6.728E-03)×2 in the case that the terminal AT0 connects to WiFi with the calculated delay time (3.889E-02)×3 in the case of that the terminal AT0 connects to WiMAX, the estimated delay time in the case that it connects to WiFi is shorter. Therefore, WiFi is selected as the wireless system to be connected from the terminal AT0. Since the wireless system connected from the AT0 has been WiMAX, a change of the wireless system occurs, from WiMAX to WiFi.
As set forth above, according to the second embodiment, in changing wireless systems used by the terminal, an estimated delay time after the change of wireless systems can be preliminarily calculated. Accordingly, the wireless system to be connected from the terminal can be selected so that the delay time will be the minimum.
The monitoring node according to the first and the second embodiments selects the wireless system to be connected from the terminal with the target values of the maximum throughput in the whole system and the shortest transmission delay time. In addition, the monitoring node may selects the wireless system to be connected from the terminal with the target values of the maximum satisfaction (guarantee) level in the user's QoS in the whole system and the minimum fluctuation in transmission time in the whole system.
A third embodiment of this invention will be described. In this embodiment, the monitoring node periodically monitors the throughput of each terminal, and if it detects a decrease in the throughput, it determines whether to change the wireless system to accomplish efficient use of communication bandwidth in the whole system.
Similarly to the first embodiment, this embodiment employs the system configuration shown in
Next, it selects a wireless system using throughputs (1702) to determine the wireless system to be connected from the subject terminal. After that, it stores the current throughput of the subject terminal obtained in the step (1702) to use it in the following determination (1703).
The monitoring node that has determined the wireless system to be used by the subject terminal instructs the control node to communicate with the subject terminal in the determined system, and the control node changes the wireless system to be used in the communication with the subject terminal in accordance with the instruction from the monitoring node. If the determined system is the wireless system which has been connected from the subject terminal, the monitoring node does not instruct the change of the wireless system to the control node.
If the received power in WiMAX exceeds the threshold value, the monitoring node checks the received power in WiFi (1803). If it does not exceed its threshold value, the monitoring node selects WiMAX as the system to be connected (806). If it exceeds the threshold value, the monitoring node obtains the throughput of the subject terminal at present (current throughput) and compares it with the throughput of the subject terminal previously stored (previous throughput) (1804). If there is no decrease from the previous throughput to the current throughput, it checks whether the wireless system currently connected from the subject terminal is EVDO or not (1805). If the current wireless system connected from the subject terminal is not EVDO, it keeps the current system and does not change the wireless system (1806). If the current system is EVDO, it selects WiFi as the wireless system to be connected from the subject terminal.
If there is a decrease from the previous throughput to the current throughput, the monitoring node changes systems. To prevent frequent changes of wireless systems because of slight variations in the throughput, the monitoring node does not determine that the throughput has decreased if the decrease is within a predetermined range. Here, the predetermined range is the variation in the throughput within 3%, for example.
Next, the monitoring node checks the current system connected from the subject terminal (1807), and if the current system is WiMAX, it selects WiFi. If the current system is WiFi, it selects WiMAX. If EVDO, it selects WiFi. In this embodiment, the monitoring node selects the wireless system to be connected so as to make communication as fast as possible. However, it may select the wireless system in view of the quality of communication which is required by a user application program, instead of the transmission speed.
As set forth above, according to the third embodiment, the monitoring node periodically monitors the throughput of each terminal, and, if it detects a decrease in the throughput, it determines whether to change the wireless system. Thereby, the communication bandwidth in the whole system can be used efficiently.
A fourth embodiment of this invention will be described. In this embodiment, the monitoring node periodically monitors the transmission delay time of each terminal, and if it has detected an increase in the transmission delay time, it determines whether to change the wireless system to accomplish the minimum transmission delay time in the whole system.
Similarly to the first embodiment, this embodiment employs the system configuration shown in
Next, it selects a wireless system using throughputs (1901) to determine the wireless system to be connected from the subject terminal. After that, it stores the current transmission delay time of the subject terminal obtained in the step (1901) to use it in the following determination (1902).
The monitoring node that has determined the wireless system to be used by the subject terminal instructs the control node to communicate with the subject terminal in the determined system, and the control node changes the wireless system to be used in the communication with the subject terminal in accordance with the instruction from the monitoring node. If the determined system is the wireless system which has been connected from the subject terminal, the monitoring node does not instruct the change of the wireless system to the control node.
As set forth above, according to the fourth embodiment, the monitoring node periodically monitors the delay time of each terminal, and, if it has detected an increase in the delay time, it determines whether to change the wireless system. Thereby, the transmission delay time in the whole system can be minimized.
In the third and the fourth embodiments, throughputs and delay time are employed as indexes to determine whether to change the wireless system. In addition, packet loss rate (if the packet loss rate has become higher, the determination whether to change the wireless systems is performed), the number of terminals connecting to the wireless systems and the number of associations (if the number of terminals connecting to the wireless systems and the number of associations increase, the determination whether to change the wireless systems is performed), and the like may be used as indexes.
In the embodiments described in this invention, the wireless system selection methods have been described in the case that the number of indexes is one in determining whether to change the systems. However, the wireless system to be connected from a terminal may be determined by referring to the combination of two or more indexes. For example, throughputs and delay time may be combined to improve the throughput in the whole system and the wireless system with the shortest transmission delay time may be selected. In this invention, throughputs, transmission delay time, packet loss rate, the number of terminals currently connecting to the wireless systems and the number of associations, and the quality requested by a user application program, and the like may be the indexes to be combined.
This invention is applicable to a system that is operated as a system using a plurality of wireless systems such as mobile phones and wireless LANs simultaneously and aims to improve time use efficiency of frequency and to disperse the loads of wireless systems.
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/JP2008/054244 | 3/4/2008 | WO | 00 | 8/12/2010 |