The present invention relates to redirecting of data traffic.
Second generation (2G) and third generation (3G or 3.5G) wide area networks are widely spread all over the world and provide varying capabilities for mobile applications in terms of bandwidth, coverage and latency. Typically these mobile networks provide data rates that are generally adequate for services employing a low to medium bandwidth applications such as voice communications, text messaging, instant messaging, e-mail with no or relatively small attachments. The data access rates tend to be marginal for services, which demand or would otherwise benefit from a higher bandwidth such as multimedia streaming, rich content web browsing, or large file downloads. The greatest advantage of these networks is the wide area coverage except indoors. On the contrary wireless local area networks, WLANs based on IEEE 802.11 standard, offer far better data rates and are today extensively deployed especially in metropolitan areas. These networks also offer indoor coverage.
The capabilities of mobile devices are growing fast and more advanced devices are consuming more bandwidth in the networks they operate. These devices are equipped with both cellular connectivity and local area connectivity and applications such as web browsers and multimedia streaming applications. This requirement of bandwidth sets new challenges to cellular networks thus mechanisms to balance the load to local area networks with much greater bandwidth capacity would be desired. The local area networks provide high data rates needed to fulfill application and user needs but the knowledge of the congestion status of the wide area mobile networks is only available to the wide area network operator. The mobile station operating in the wide area network may be able to produce short-term knowledge of the data throughput of its own network interface but is not conscious about the network status. This means that the operator has the key position in making its mobile subscribers aware of the network congestion while the mobile clients could do any intelligent decisions based on that information independently.
Therefore there is a need for transferring information originated from either cellular networks or local area networks and reacting to that information to gain better network connectivity.
According to the first aspect of the invention, a method comprising exchanging user data over a wireless connection with a destination identified by an Internet Protocol address using a wide area bearer, receiving, over the wide area bearer, an off-loading indication message comprising address information of at least one local access server, exchanging signaling messages comprising information regarding one or more available local access networks with said at least one local access server specified in said off-loading indication message, selecting a local access network based at least part on information exchanged with said at least one local access server and on information regarding wireless signal coverage activating a supplementary wireless local area bearer based at least part on information regarding one or more available local access networks received from said at least one local access server, and routing new connection opening requests to said supplementary wireless local area bearer is provided. According to an embodiment of the first aspect of the invention, the method may further comprise routing an existing data exchange session via said supplementary wireless local area bearer.
According to an embodiment of the first aspect of the invention, the method may further comprise routing an existing data exchange session via said supplementary wireless local area bearer. Furthermore, the method according to the first aspect of the invention may further comprise detecting an event indicating closing of a connection using said supplementary wireless local area bearer; and rerouting an active data exchange session via the wide area bearer.
The preferred embodiments of the invention include at least a method, computer program, device and system for opening at least one Internet Protocol based wireless connection to a destination identified by a specified Internet Protocol address using a wide area bearer and receiving, over wide area bearer, an off-loading indication message containing address information of a local access server. A communication with this local access server may be later established using additional address information that may be provided with this indication message. In addition the address information may be constructed as a combination of the provided address information and locally stored static information, such as a security key.
The established communication session with the local access server may, in accordance with various configurations of the preferred embodiments of the invention, later include exchanging of messages providing further information about the identities of the available wireless local area networks within the vicinity of the receiver of the off-load indication message. On the other hand the available local area networks may not be known by the local access server but instead may be received as a part of the messages exchanged in this communication session. Further, the message exchange may include authentication information, security scheme, keys needed to establish connection to the available local area networks, or a specific expiry time for the network access.
In at least one embodiment of the present invention, the off-loading information may be sent using and received as at least one short message service (SMS) message. This message may contain further information about local access server and security data used later for authentication or ciphering.
In at least one embodiment of the present invention, the information received from a local access server may be used to adjust the metrics or alter other information related to network bearer selection process executed for example in the receiver. It may also contain a specific action proposal for the bearer selection process. The decision of choosing any bearer to be used in exchanging data, however, is made by the sole owner of the bearer resources. Further, the context information such as, physical speed, active applications, data download and upload profiles may have an impact on the decision.
According to an embodiment of the first aspect of the invention, the method may further comprise detecting an event indicating closing of a connection using said supplementary wireless local area bearer; and rerouting an active data exchange session via the wide area bearer. In at least one embodiment according to the first aspect of the present invention, a change in the bearer used for data exchange session may cause routing all priori opened data exchange sessions to use this new bearer. In accordance with preferred embodiments of the invention, said event indicating closing of a connection and/or routing all priori opened data exchange sessions to use the new bearer may be triggered by the network selection process, loss of network coverage, such as loss of coverage of said supplementary wireless local area bearer, expiry of usage time, such as expiry of usage time of said supplementary wireless local area bearer, or by receiving an action proposal or an action state within a further off-loading indication message.
According to the second aspect of the invention, an apparatus comprising a processor capable to execute program code and a suitable memory capable to store program code and data. According to the second aspect of the invention, the program code is configured, when executed by the processor, to cause the apparatus to detect a feasible internal state that allows usage of a local area communications interface as a supplementary bearer, exchange signaling messages comprising information regarding one or more available local access networks with said at least one local access server specified in said off-loading indication message, select a local access network based at least part on information exchanged with said at least one local access server and on information regarding wireless signal coverage, activate the local area communication interface based at least part on information regarding one or more available local access networks received from said at least one local access server, and route new connections over the local area communication interface.
For the purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the invention. It is apparent, however, to one skilled in the art that the embodiments of the invention may be practiced without these specific details or with an equivalent arrangement.
As used herein, the term Client Manager (CM) refers to a physical component or set of physical components, e.g. computer hardware, networking infrastructure, and computer software, that provide the means for the wide area network operator to manage the network selection of its subscribers. As used herein, the term Network Manager (NM) refers to a physical component or set of physical components, e.g. computer hardware, networking infrastructure, and computer software, that provide the means for the local area network operator to manage the network selection, providing information about the network related details such as access credentials, and manage client authentication. Herein, the term Client (CL) includes, but is not limited to, a station, a mobile station, user equipment, or a mobile subscriber unit, or any other type of device capable of operating in wireless communication environments. Also, herein, the term WLAN refers to an IEEE 802.11 based wireless communication system and the term 3G refers to a Universal Mobile Telecommunications System (UMTS) wireless communication system.
The preferred embodiments of the invention facilitate methods for performing data off-load from one wireless communication system to another wireless communication system that likely use different communication protocols. The wireless communication systems may be any type of present or future developed wireless communication systems, but not limited to UMTS, High-Speed Packet Access (HSPA), Global System for Mobile Communications (GSM), General Packet Radio Services (GPRS), Code Division Multiple Access 2000 (CDMA2000), and IEEE 802.11 based WLAN systems.
For the purposes of explanation simplicity the example embodiments is described with reference to a 3G system and a WLAN communication system that provides a network, or a hot spot, within the coverage of 3G system. However, the preferred embodiments of the invention also apply to other wireless communication systems as well.
Operating Environment
Furthermore, those skilled in art will recognize that the
System Description
The second entity in the system is a connection manager (CM) 220. The CM 220 could be for example a network server running in the Internet with capabilities to process task list update requests 200a from core network 210. Upon receiving a task list update request 200a the CM 220 will process the content of the request and update its internal data records 222. This processing may include assigning a unique task identifier for the received task and combining that with the information received in task list update request 200a. After the internal processing the CM 220 looks for relevant network manager (NM) 230 instances from its internal NM database where the measurement of relevance may be the location of the subscriber, 3G network load, or other statistics. This location may be derived from the cell id received in request 200a. After the selection the CM 220 creates an IP based connection to the NM 230 and sends a service request 200b to the NM 230 with all relevant client information included after which the NM 230 may allocate computing resources 232 for the given task. NM 230 may perform authentication for the CM 220 using for example a digital certificate. If the NM 230 is able and willing to allocate such resources it will confirm the service request back to CM 220. The availability of the allocated resources 232 may be limited to be valid only for a certain amount of time, accessed only using a specific URI provided in 200b, or the resource may be considered invalid if the first attempt to access the resource using the provided URI fails for any reason. If any such failure occurs, allocated resources 232 may be deallocated.
After NM 230 has finished with the resource allocation and related confirmation, CM 220 may send an SMS-message 200d to the defined CL 240 to set up a connection with the NM 230. Using a known digital certificate of the CM 220, CL 240 is able to authenticate the sender of the SMS 200d using a asymmetric public key infrastructure cryptography. In the SMS message 200d CM 220 may inform the CL 240 about the assigned NM 230 details, the given unique task identifier and the URI to which a new connection should be made. Using this information the CL 240 is able to establish a connection to the NM 230. Upon connection creation the CL 240 may send an authentication data to the NM 230, which then authenticates the CL 240 by bypassing the data to CM 220 and waits for a confirmation of the authentication. The authentication process instance in NM 230 authenticates mobile with the help of CM 220, keeps track on a time window that was priori set during a service request from CM 220, and also manage possible payment procedures. Following the authentication the NM 230 and CL 240 are able to exchange data 200h. In this exchange of data NM 230 provides CL 240 detailed instructions about the preferred list of available WLAN networks 120. The selection of preferred WLAN networks, or Service Set Identifiers (SSID) hereafter, is carried out in a network selection process 234 in the NM 230. The list of SSIDs may be based on geographical location derived from the 3G cell-id received in a task allocation request 200b, or the NM 230 may request the CL 240 to provide list of SSIDs within its vicinity. Further the NM 230 will provide the required WLAN network credentials, such as WPA/WPA2 security keys, to the CL 240 when such credential exists. Following the message passing between CL 240 and the NM 230 the connection is closed and NM 230 may free the resources allocated for the task.
Client Operations
According to the preferred embodiments of the invention the client 240 may receive an off-load indication message from CM 220. If such message is received in step 320 the client process will store 322 any information received in the message such as a server address. After receiving the said off-load indication the client may analyze the present context in step 324. This may include analysis about the physical speed of the client device that would support usage of cellular connectivity 110 over WLAN connectivity 120 or even prevent the client from using WLAN communications. On the other hand currently active applications running in the client 240 may set such requirement that the WLAN communications would not satisfy. Furthermore the history data of the amount of downloaded or uploaded data in a recent time period may equally well indicate that only guaranteed outdoor coverage would be suitable for the client 240. If the context analysis indicates that the data offload from 3G network 110 to WLAN network 120 is impossible or may severely harm the operations of the client then the client may neglect the off-load indication information and continue operating as before receiving the said off-load indication.
If the conclusion in step 326 was not against off-load proposal a connection may be created to the server address, or URI composed of server address and a unique task identifier allocated by CM 220. This server is the NM 230. In this step 328 the client may reuse the digital certificate of the CM 220 that was pre-installed in the client 240 internal memory in the following manner. The client may encrypt its own IMEI, IMSI, or TMSI code using the public key of the certificate and send that as the first data to the NM 230. Similarly the client may use for example user account information of a web service to be encrypted for authentication purposes. NM 230 further passes the same data to the CM 220 as a part of a authentication message passing. Since the data was encrypted with the public key of the CM 220, it can verify the content and further verify that the sender of that information indeed is the one that was earlier advised to connect to the NM 230. If the authentication succeeds the operation continues in step 330, otherwise the client returns to normal operation state 318. In step 330, information about the availability of WLAN communications is exchanged between the client 240 and the NM 230. The communications may be in a form of XML structured information where the NM 230 provides a single, or a list of, SSID of the available WLAN network in the area where the client 240 is currently operating. If the NM 230 does not have information about any WLAN networks in the area it may ask the client 240 to scan for networks and send a report about those. In addition since in most cases the WLAN networks are secured using for example WEP, WPA, WPA2 or 802.1x security mechanisms the NM 230 supplies the necessary passwords to the client 240 for it to be able to associate to the said WLAN network. All this may be achieved by sending XML messages. All information received from NM 230 is stored locally in the client 240 in step 332 and is further used as a part of the decision-making process of the most suitable data bearer in any given time. The outcome of the process 300 is a set of details, rules, and other information about available networks stored locally in the client 240 memory depicted in step 334.
Referring to
According to an embodiment of the invention, activation of a supplementary wireless local area bearer, such as a bearer providing WLAN connectivity, comprises activating said supplementary wireless local area bearer only in case said supplementary wireless local area bearer provides improved performance over the currently employed wide area bearer, such as a bearer providing 3G connectivity. As an example, a supplementary wireless local area bearer may be activated only in case it provides a performance at least equal to the currently employed wide area bearer. As another example, a supplementary wireless local area bearer may be activated only in case it provides a performance that exceeds the performance of the currently employed wide area bearer by at least a predetermined margin. A performance evaluation may comprise consideration of one or more factors associated with the quality of service (QoS) metrics. As an example factors considered in a performance evaluation may comprise one or more of average, maximum or guaranteed data rate provided by a bearer, error rate provided by a bearer, one-way or round-trip transport time provided by a bearer, etc. Means for evaluating a performance of a bearer may comprise for example metrics derived based on transmission of actual user data over a bearer or transmission of probe data e.g. in a form of one or more ping messages.
According to an embodiment of the invention, an event indicating closing of a connection using a supplementary wireless local area bearer, such as WLAN, may be detected. The event that indicates closing of the connection may be based at least in part on for example one or more of loss of coverage of said supplementary wireless local area bearer, expiry of usage of said supplementary wireless local area bearer or receiving an action state within an off-loading indication message. Furthermore, closing of the connection may comprise routing one or more active data exchange sessions making use of the supplementary wireless local area bearer via a wide are bearer, such a 3 G communication network. An event indicating closing of a connection using a supplementary wireless local area bearer may further trigger deactivating an interface to the supplementary wireless local area bearer. In an embodiment of the invention, the deactivation of an interface to the supplementary wireless local area bearer takes place only in case the interface to the supplementary wireless local area bearer was activated as a result of off-loading a data session using a wide area bearer to the supplementary wireless local area bearer.
Example Implementation
Although the features and elements of the present invention are described in the previous embodiments in a specific combinations, each feature or element can be used alone without the other features or elements of the embodiments or in a various combinations with or without the other features or elements of the present invention.
The following numbered clauses describe some embodiments of the invention.
Clause 1. A method comprising opening at least one IP based wireless connection to a destination identified by a specified Internet Protocol address using a wide area bearer; receiving, over wide area bearer, an off-loading indication message containing address information of at least one local access server, exchanging messages with at least one local access server specified in said off-loading indication message, selecting one local access network based at least partly on information exchanged with said local access server and wireless signal coverage, activating a supplementary wireless local area bearer using network selection information received from said local access server, routing new connection opening requests to said supplementary local area bearer, detecting an event indicating the closing of logical connections using the supplementary bearer, and rerouting all active data exchange sessions via said wide area bearer.
Clause 2. The method as described in clause 1, further comprising a routing a priori opened data exchange sessions via the supplementary local bearer.
Clause 3. The method as described in clause 1, further comprising receiving authentication information from local access server.
Clause 4. The method as described in clause 3, wherein the authentication information include security scheme to be applied and secure keys.
Clause 5. The method as described in clause 1, wherein the off-loading indication message is received as at least one short-message-service message.
Clause 6. The method as described in clause 1, further comprising detecting feasible internal state for using a local area network as supplementary bearer based on is at least partly on speed, amount of active applications, amount of downloaded data in a recent time period or amount of uploaded data in a recent time period.
Clause 7. The method as described in clause 1, wherein identification method of the wireless local area network is service set identifier (SSID).
Clause 8. The method as described in clause 1, wherein event indicating the closing of logical connection is triggered at least partly based on loss of coverage, expiry of usage of the supplementary bearer or receiving an action state within the off-loading indication.
Clause 9. The method as described in clause 1, wherein the full address of the local access server is obtained by combining information received in the off-loading indication message and static internal information.
Clause 10. The method as described in clause 1, further comprising sending the information of available local area networks to the local access server before receiving local area network selection information.
Clause 11. The method as described in clause 1, further comprising comparing own data transmission and serving cell-ID to stored values; and depending on the comparison result sending position and telephone number information to a predefined location.
Clause 12. The method as described in clause 1, wherein routing is performed by adjusting the metric values of the interfaces of the bearers.
Clause 13. The method as described in clause 12, wherein the values used for adjusting are at least partly received from the said wide area network.
Clause 14. The method as described in clause 12, wherein the decision of executing any routing changes with the data exchange sessions is done by the receiver of the off-loading indication message.
Clause 15. The method as described in clause 14 or claim 2, wherein routing is performed by disabling routes on other interfaces than interface of the bearer desired to be used.
Clause 16. The method as described in clause 1, claim 2, claim 12 or claim 13, wherein routing is performed by using firewall rules to hard-limit the network interface of the bearer to be used.
Clause 17. An apparatus comprising, a processor capable to execute program code, a suitable memory capable to store code and data, a wide area communication interface capable to open and utilize IP based wireless connections, a local area communication interface capable to open and utilize IP wireless connections, a virtual communication interface to receive an off-loading indication message containing address information of at least one local access server, program code configured to detect feasible internal state that allows usage of a local area communications interface as supplementary bearer, program code configured to exchange messages with at local access server specified in said off-loading indication message, program code configured to select local access network based at least partly on information exchanged with said local access server and wireless signal coverage and activating the local area communication interface using the network selection information received from said local access server, program code configured to route new connections over the local area communication interface, and program code configured to detecting an event indicating the closing of logical connections using the local area communication interface and to reroute all active data exchange sessions over the wide area communications bearer.
Clause 18. The apparatus as described in clause 17, wherein a priori opened data exchange sessions are rerouted over the local area communications interface.
Clause 19. The apparatus as described in clause 17, further comprising receiving authentication information from the local access server.
Clause 20. The apparatus as described in clause 19, wherein the authentication information includes security scheme to be applied and secure keys.
Clause 21. The apparatus as described in clause 17, wherein the virtual communications interface is short-message-service (SMS) Application Programming Interface (API).
Clause 22. The apparatus as described in clause 17, wherein the feasible internal state for using a local area communications interface to establish the supplementary bearer is at least partly depended on speed, active applications, amount of downloaded data in a recent time period or amount of uploaded data in a recent time period.
Clause 23. The apparatus as described in clause 17, wherein identification method of the wireless local area network is service set identifier (SSID)
Clause 24. The apparatus as described in clause 17, wherein event indicating the closing of logical connection is triggered at least partly based on loss of coverage, expiry of usage of the supplementary bearer or receiving an action state within the off-loading indication.
Clause 25. The apparatus as described in clause 17, wherein the full address of the local access server is obtained by combining information received in the off-loading indication message and static internal information.
Clause 26. The apparatus as described in clause 17, further comprising sending the information of available local area networks to the local access server through the wide area communications interface before receiving local area network selection information.
Clause 27. The apparatus as described in clause 17, further comprising comparing own data transmission and serving cell-ID to stored values; and depending on the comparison result sending position and telephone number information to a predefined location.
Number | Date | Country | Kind |
---|---|---|---|
20100055 | Feb 2010 | FI | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/FI2010/051076 | 12/22/2010 | WO | 00 | 10/19/2012 |