The present invention relates to a wireless terminal and a handover method of a wireless terminal.
In association with the advancement of information communication technology, a wireless LAN has become widely popular. As a technique for properly attaining mobile communication in which the wireless LAN is used, a technique referred to as a handover is known. Japanese Patent Application Publication (JP-P2002-016958A: conventional example 1) describes a technique that uses spreading code corresponding to a base station selected from a base station candidate list, tries the reception of a pilot signal from the base station, and then determines whether or not it is suitable as the base station of a handover destination. Japanese Patent Application Publication (JP-P2004-207922A: conventional example 2) describes a technique in which as a handover processing method used in a wireless LAN system, a wireless terminal apparatus stores data of a wireless base station in an access point (AP) connection candidate list, as a result of a scanning process. Japanese Patent Application Publication (JP-P2005-175932A) describes a technique with regard to a wireless LAN handover process. Japanese Patent Application Publication (JP-P2005-184160A) describes a technique with regard to a handover solution method.
When carrying out the handover, the wireless LAN terminal uses data of access points collected in advance to select an optimal access point, and moves to a channel used by the access point, and then transmits Authentication Request and Re-association Request frames. The collection of the data of the access points is carried out by receiving a Beacon frame or transmitting a Probe Request frame through a usable channel and collecting a Probe Response frame that is a response to the frame. However, when the data of the access points are collected over usable all channels, it takes a time to switch wireless channels for each channel or collect the Beacon frame or the Probe Response frame. For this reason, this operation is expensive in temporal and power costs. Thus, this operation is not frequently carried out but typically carried out in the interval of several seconds to several tens of seconds. The data of the newest access point is data before a current time by one time period, in the oldest case.
When the terminal is moving and the data of the access point is old, there is a possibility that the access point determined to be optimal cannot be already connected. In that case, it is necessary to collect the data of the access point over all the channels again and to then select the optimal access point.
When data are collected by use of a channel differing from a channel of the access point currently being used during a process of collecting the data of this access points, it is impossible to communicate with the access point currently being used. Thus, when this data collection is carried out during speech/audio communication in VoIP, there is a case that the data collection appears as a speech/audio break that can be recognized by a user.
An object of the present invention is to reduce a case that a handover process is failed because an incommunicable access point is selected as a handover candidate, when the handover is carried out.
In the present invention, a wireless terminal contains a data transmitting/receiving function and a handover controller. The handover control section scans all usable wireless channels to detect the presence or absence of the handover destination. Since scanning the channels to detect the presence or absence of the handover destination in advance prior to an handover execution, the handover control section obtains the handover destination candidate and executes a verification scan in order to check whether or not the candidate is located within the communicable area with the terminal, and then performs the handover on the candidate in accordance with the execution result of the verification scan.
The present invention can reduce failure of the handover because the incommunicable access point is selected as the handover candidate, when the handover is carried out.
The above-mentioned objects, effects and features of the present invention will be evident from the descriptions of the embodiments in conjunction with the attached drawings.
Hereinafter, a wireless LAN network according to exemplary embodiments of the present invention will be described in detail with reference to the attached drawings. However, the exemplary embodiments do not limit the technical range of the present invention.
The first access point 1 and the second access point 2 are access points based on the specifications of IEEE 802.11. The first area 3 is a area in which the reception electric field intensity of the first access point 1 is equal to or greater than a switching threshold level (the switching threshold level is described in
A VoIP terminal 7 is a terminal that has a function for performing a VoIP communication by using a wireless LAN. In other words, a wireless LAN apparatus is incorporated in the VoIP terminal 7, and the wireless LAN apparatus has a function for performing a handover in this exemplary embodiment.
The wired network 8 connects the first access point 1 and the second access point 2. For example, this is represented by a network such as Ethernet (registered trademark). The wide area network 9 is a network through which the mobile phone terminal 10 and the wired network 8 are connected, and the Internet or the like corresponds to this. The mobile phone terminal 10 is a terminal of the communication destination of the VoIP terminal 7. In this exemplary embodiment, the mobile phone terminal 10 is not always required to be the VoIP telephone.
The VoIP terminal 7 will be described below.
The CPU 11 executes software programs stored in the ROM and the RAM. The ROM 12 is a nonvolatile memory dedicated to read. The ROM 12 stores software programs required to drive the VoIP terminal 7 and OS. The RAM 13 is a volatile memory and used as a area to temporally hold data. It should be noted that the ROM 12 or the RAM 13 may be a nonvolatile memory such as a flash memory and the like in which the data can be erased.
The CODEC 14 converts sound data supplied from the microphone 21 into digital data with a format such as ITU-T G.711, or reversely converts the digital data with the format such as G.711 into the digital data to be reproduced in the speaker 19. The wireless LAN chip 15 is a chip for processing a wireless LAN protocol defined in IEEE 802.11. The antenna 16 is an apparatus for transmitting a signal sent from the wireless LAN chip 15 as radio wave and simultaneously receiving radio waves from the first access point 1 and the second access point 2 or another VoIP terminal.
The display 17 is a display unit that uses a liquid crystal or the like. The keyboard 18 is a keyboard to input a telephone number and the like. When inputting the speech/audio data converted by the CODEC 14, the speaker 19 outputs as a speech/audio data. The microphone 21 converts the sound into a digital signal.
The software programs contained by the VoIP terminal 7 will be described below. In the following exemplary embodiment, the software programs except for an OS is preferred to be stored in the ROM 12.
The VoIP application section 23 performs a control such that a speech/audio data received from the microphone 21 is converted into a coded data with the format of the G.711 definition by the CODEC 14 and the coded data is stored into a payload section of an RTP packet, and then the packet is transferred to the TCP/IP processing section 24. Also, the VoIP application section 23 performs a control such that the coded data with the G.711 format is extracted from the payload section of an RTP packet received from the TCP/IP processing section 24, and the extracted data is converted into a speech/audio data with the format that can be reproduced by the speaker 19 by means of the CODEC 14, and the speech/audio data is transferred to the speaker 19 to reproduce the received speech/audio data.
The TCP/IP processing section 24 is a section for processing the TCP/IP protocol that is defined in RFC791 and RFC793 issued from IETF. The wireless LAN driver 25 contains software programs for controlling the wireless LAN chip 15. The wireless LAN MAC 26 and the wireless LAN PHY 27 are stored in the wireless LAN chip 15, and the wireless LAN MAC 26 is a section for processing the MAC protocol defined in IEEE 802.11. Also, the wireless LAN PHY 27 is a section for processing the PHY protocol of the same specification.
The wireless LAN driver 25 includes a handover control section 28, a communication control section 29, an access point table 31, a verification scan parameter storage area 32, a usual scan parameter storage area 33, a switching threshold storage area 34 and a detection threshold storage area 35. The handover control section 28 collects the data of access points existing around the VoIP terminal, determines the necessity of handover, selects a handover destination, and executes a handover process. The communication control section 29 carries out a control necessary for communication other than the control carried out by the handover control section 28. The access point table 31 is an area where the data of access points obtained through a scanning operation of the VoIP terminal 7 are stored, and the data of access points as the candidates of the handover destination are stored here.
The switching threshold storage area 34 stores a switching threshold. The detection threshold storage area 35 stores a detection threshold. The detection threshold is a minimum level of the reception electric field intensity at which the VoIP terminal 7 can communicate with the access point. On the other hand, the switching threshold is a level slightly higher than the detection threshold. Specifically, when the VoIP terminal 7 is moving, a time period which is necessary to reduce the reception electric field intensity of the access point on communication from the switching threshold to the detection threshold, becomes longer than a time period which is necessary to perform the verification scan and the background all-channels scan, which will be described below. The switching threshold depends on the moving speed supported by the VoIP terminal 7 as the specification, and when it should correspond to the faster movement, the switching threshold is required to be higher than the detection threshold.
The operation of the first exemplary embodiment will be described below.
In a time period during which this verification scan is carried out, the terminal is located in the communicable area of the access point in the communication state at present, and this is carried out such that the transmission/reception of the data of the terminal is not obstructed. Thus, in this time period, the speech/audio signal non-presence does not occur. After that, the whole scan (hereinafter, to be referred to as a “background all-channels scan”) is carried out while the data transmission/reception is continued (1103), and the candidate of the handover destination is newly found out.
When the background all-channels scan is ended, exchange of authentication request/response messages (1104, 1105) and Association Request/Response messages (1106, 1107) with a candidate of a new handover destination is carried out. Thus, the handover is completed to the access point of the new handover destination candidate.
The foregoing operation will be described below in detail by using flowcharts.
At a step S101, the wireless LAN MAC 26 receives a beacon frame. The reception of the beacon frame is notified to the wireless LAN driver 25 with an interruption. At a step S102, when receiving the interruption of the beacon frame reception, the wireless LAN driver 25 obtains the reception electric field intensity on the reception of the beacon frame. At a step S103, the wireless LAN driver 25 checks whether or not the obtained reception electric field intensity is smaller than the switching threshold. If the reception electric field intensity is equal to or greater than the switching threshold, the handover process is ended.
In case of the reception electric field intensity smaller than the switching threshold, the control flow proceeds to a step S104. At the step S104, the wireless LAN driver 25 refers to the access point table 31 to check the presence or absence of the access point as any handover destination candidate. Usually, even if the reception electric field intensity of the access point in the current communication state is equal to or greater than the switching threshold, the VoIP terminal 7 always holds the access point as the handover destination candidate through the all-channels periodical scan. At this time, when there is no candidate, the control flow proceeds to a step S105, and the all-channels scan is carried out.
Here, the operation for the all-channels scan will be described.
At a step S204, when the scanning operation is finished, the existence of unscanned channel among usable channels is next checked. If no unscanned channel is left, the control flow proceeds to a step S205, and if there remains any channel to be switched, the control flow proceeds to a step S206. At the step S205, the data recorded in the access point table 31 are referred, and the access point having the highest reception electric field intensity is selected as the handover destination candidate, and the all-channels scanning process is then ended. At the step S206, the channel is switched to a next channel of the non-checked channels, and the control flow returns to the step S203 at the newly switched channel. Again, the scanning process is executed.
The whole scan is an operation that requires the time of the Min-Channel-Time at the minimum and the time of the Max-Channel-Time at the maximum. The values set for the Min-Channel-Time and the Max-Channel-Time are not especially determined. However, there is an intention to collect the data of as many access points as possible. Thus, the respective values between several tens of ms and several hundreds of ms are usually set. For this reason, there is a case that one second or more is required to scan all of the channels.
Here, the scanning process at the step S203 will be described.
At the step S303, when the Probe Response is received even one time after the transmission of the Probe Request, the control flow proceeds to the step S304. When the Probe Response is received even one time, whether or not the Probe Timer is equal to or greater than the Max-Channel-Time is checked at the step S304. When the Probe Timer is not equal to or greater than the Max-Channel-Time, the control flow returns to the step S303, and the Probe Response frame is collected until the elapse of the time of the Max-Channel-Time. In case of the elapse of the Max-Channel-Time or more, the control flow proceeds to the step S305. At the step S305, as for the Probe Response frame received in this scanning process, the transmission source of the Probe Response frame and the reception electric field intensity are written into the access point table 31. As mentioned above, the scanning process on a channel is ended.
The operation in the flowchart shown in
A case of the existence of the handover destination candidate at the step S104 will be described below. In case of the existence of the handover destination candidate, at a step S108, in order to check a time after acquisition of the data of the handover destination candidate, whether or not it is acquired prior to a threshold T1 second or more is determined.
As the result of the determination, if it is determined in the threshold T1 second or less, the data is regarded to be new, and the probability of the data is regarded to be high. Then, without any execution of the verification scan, the control flow proceeds to the step S122, and the handover process is executed in its original state. If the data of the handover destination candidate is old data after the elapse of T1 second or more, the control flow proceeds to a step S109, and the verification scan is carried out. At the step S109, the time of non-communication is determined from the transmission/reception time of the VoIP frame in the up and down directions. Then, the non-communication time is selected, thereby switching to the channel used by the access point of the handover destination candidate.
Here, the operation for determining the time of the non-communication will be described.
With reference to
Time t6=Time t3+(Time t3−Time t1)
Also, a time t8 when a frame will be received from the access point after the foregoing frame can be similarly predicted as follows:
Time t8=Time t6+(Time t3−Time t1)
Also, a time when the VoIP terminal itself will transmit a frame in the upstream direction can be predicted as follows:
Time t7=Time t4+(Time t4−Time t2)
As the time period when the verification scan is carried out, there are two of a time period (hereinafter, to be referred to as a first time period L1) from the time when the VoIP terminal receives a speech/audio frame from the access point to the time when a speech/audio frame is transmitted to the access point; and a time period (hereinafter, to be referred to as the second time period L2) from the time when the VoIP terminal transmits a speech/audio frame to the access point to the time when a speech/audio frame is received from the access point. In this case, the first time period L1 and the second time period L2 can be respectively calculated as follows;
First Period L1=Time t7−Time t6
Second Period L2=Time t8−Time t7
Next, which of the first time period L1 or the second time period L2 is longer is checked. When the first time period L1 is longer, the verification scan is carried out just after the VoIP frame is received at the time t6. When the second time period L2 is longer, the verification scan is carried out just after the frame of the up direction is transmitted. The time period of the non-communication is determined as mentioned above.
Again, the flowchart of
At a step S111, the Probe Request frame is transmitted. When the Probe Request frame is transmitted, whether or not the Probe Response frame as the response to the Probe Request frame is received from the access point of the handover destination candidate within the time of the Min-Channel-Time is checked at a step S112. As the result of the check, if it is not received, the control flow proceeds to a step S113.
At the step S113, whether or not the response to the Probe Request frame has not been received continuously more than the number of times indicated by a threshold T2 is checked. If the response to the Probe Request has not been received continuously more than the number of times indicated by the threshold T2 from the access point of the handover destination candidate, this case is regarded as the non-existence of the access point of the handover destination candidate. Then, the control flow proceeds to the step S105, and the all-channels scan is carried out. As the result of the check, if it does not reach the number of times indicated by the threshold T2, the control flow returns to the step S111, and the Probe Request frame is again transmitted.
When a value of the threshold T2 is excessively great, the time necessary for the verification scan becomes long. Thus, at the longest, the threshold T2=about 2 is set. At the step S112, when the Probe Response frame is received from the access point of the handover destination candidate within the Min-Channel-Time, the control flow proceeds to a step S114. Then, the reception electric field intensity of the Probe Response frame is checked. At a step S115, the reception electric field intensity and the switching threshold are compared. As the result of the comparison, when the reception electric field intensity of the Probe Response frame is smaller than the switching threshold, the control flow proceeds to a step S116. In this case, the terminal is regarded to have moved outside the communicable area of the access point of the handover destination candidate. Then, the access point of the handover destination candidate is again searched.
However, in order not to obstruct the current communication, the all-channels scan is preferably carried out in the background, and the search is again carried out. For this reason, at the step S116, the Max-Channel-Time and the Min-Channel-Time are returned to the parameters stored in the usual scan parameter storage area, and the switching to the channel of the access point in the current communication state is carried out. At a step S117, the background all-channels scan is carried out in which the all-channels scan is carried out between the communications.
Here, the operation of the background all-channels scan will be described.
At a step S403, the scanning process is executed. This scanning process is similar to the process of the step S105. The timing when the scanning process is ended is the timing when the VoIP terminal transmits or receives a data. At a step S404, in order to hold the scanned channel, the current channel is substituted into a variable CH.
At a step S405, when the current channel is set to the variable CH, the channel is switched to a channel used by the access point with which this terminal communicates. When the channel switching is ended, a process for transmitting or receiving the data is executed at a step S406. When the process for transmitting or receiving the data is ended, the variable CH is referred to at a step S407, so that the channel is switched to the previously scanned channel.
At a step S408, the number of times of scan of the same channel is checked. As the result of the check, if the number of times of actual scan is less than the number of times indicated as a certain threshold T4, the control flow proceeds to a step S409. At the step S409, “1” is added to the variable n, and the control flow is returned to the step S402. On the other hand, if the number of times of scan is already more than the number of times indicated as the threshold T4, the control flow proceeds to a step S410.
At the step S410, whether or not there remains any non-checked channel to be switched to next switching is checked. As a result, if the non-checked channel remains, the control flow proceeds to S411. At the step S411, the check channel is switched to a next-usable channel that is not still checked, and the control flow is returned to the step S401. If the non-checked channel does not remain, the control flow proceeds to the step S412. At the step S412, the access point table 31 is referred, and the access point having the greatest reception electric field intensity is determined as the handover destination candidate.
In the background all-channels scan, when the threshold T4 is increased, the surer scan can be carried out. However, when it is excessively great, the time necessary for the background all-channels scan becomes long. Thus, it is reasonable that “1” to “2” is set for the threshold T4.
Again, the flowchart of
At a step S121, values to be set for the Min-Channel-Time and the Max-Channel-Time are acquired from the usual scan parameter storage area 33, and set respectively. Then, at the step S122, the handover is carried out on the access point of the handover destination candidate.
It should be noted that the verification scan in this exemplary embodiment will be described by using a scheme that the Min-Channel-Time and the Max-Channel-Time are reduced to several ms, in order to perform the verification scan within an area based on the existing IEEE 802.11. When a verification scan is carried out using a Probe Request with an access point address as a destination address, which is out of IEEE 802.11 specification, an Ack (Acknowledgement) frame can be received only after SIFS (Short Interframe Space) interval because of the response for unicast frame. In this case, it is possible to perform the verification scan faster and surer.
The second exemplary embodiment of the present invention will be described below. It should be noted that the configuration of the VoIP terminal 7 in the second exemplary embodiment is similar to the above-mentioned first exemplary embodiment. Thus, the same description is omitted. The verification scan is useful even in an area in which the reception electric field intensity of the access point in the communication state at present is equal to or greater than the switching threshold.
At a step S501, the determination of whether or not the background all-channels scan has been carried out for more than seconds indicated by a threshold T3 is carried out. As the result of the determination, if the time indicated by the threshold T3 has already elapsed from the last background all-channel scan, the control flow proceeds to a step S507. At the step S507, the background all-channels scan is carried out.
As the result of the determination of the step S501, when the last background all-channel scan was carried out within the seconds indicated by the threshold T3 from now, the control flow proceeds to a step S502. At the step S502, the time of the non-communication is determined from the transmission/reception time of the VoIP frame in the upstream and downstream directions. Then, the non-communication time is selected, and switching to the channel used by the handover destination candidate is carried out.
At a step S503, values to be set as the Min-Channel-Time and the Max-Channel-Time are read from the verification scan parameter storage area and set for the respective registers. At a step S504, the Probe Request frame is transmitted. At a step S505, the determination is carried out of whether the Probe Response frame that is the response frame to the Probe Request frame is received from the access point of the handover destination candidate within a time designated by the Min-Channel-Time. As the result of the determination, if it is not received, the control flow proceeds to a step S506.
At the step S506, the determination of whether or not the Probe Response for the Probe Request has not been continuously received more than the number of times indicated by the threshold T2 is executed. As the result of the determination, the control flow returns to the step S504 in case of the number of times less than the number of times of reception indicated by the threshold T2, and the Probe Request frame is again transmitted. As the result of the determination, when the response is not yet generated more than the number of times indicated by the threshold T2, the VoIP terminal is regarded to be located outside the communicable area of the access point of the handover destination candidate. In this case, since the access point as another candidate needs to be newly searched, the control flow proceeds to a step S507. At the step S507, the background all-channels scan is carried out.
As the result of the process of the step S505, if the Probe Response frame is received from the access point of the handover destination candidate within a time designated by the Min-Channel-Time, the control flow proceeds to a step S508. At the step S508, the reception level of the Probe Response frame is checked.
At a step S509, the determination of whether or not the reception level is equal to or higher than the switching threshold is carried out. As the result of the determination, if the reception level is lower than the switching threshold, the VoIP terminal is not anymore located within the communicable area of the access point of the handover destination candidate. Therefore, the control flow proceeds to the step S507, and the background all-channels scan is carried out.
When the reception level is equal to or higher than the switching threshold, the access point as the current candidate of the handover destination has no problem as the candidate. As a result, the control flow proceeds to a step S510, and it is switched to the channel of the access point of the current candidate. In this case, the handover destination candidate needs not to be again selected by performing the all-channels scan. Therefore, at a step S511, values to be set for the Min-Channel-Time and the Max-Channel-Time are read from the usual scan parameter storage area and set for respective items. Then, the process of the verification scan is ended in an area in which the reception electric field intensity of the access point in the communication state at present is equal to or higher than the switching threshold.
The third exemplary embodiment of the present invention will be described below. In the second exemplary embodiment, at the step S509 in
Predicted Reception Electric Field Magnitude S3=Second Reception Electric Field Magnitude S2+(Second Reception Electric Field Magnitude S2−First Reception Electric Field Magnitude S1).
If the predicted reception electric field intensity S3 is lower than the switching threshold, the background all-channels scan is carried out even if the second reception electric field intensity S2 has a value higher than the switching threshold. It should be noted that in the third exemplary embodiment, only the result of the previous verification scan is used to predict the result of the next verification scan. However, it is possible to use a value in which the precision of a prediction value as the result of the next verification scan is improved by using not only the previous result but also a result before it.
As mentioned above, in the third exemplary embodiment, prior to carrying out the handover, whether or not the access point as the handover destination candidate is valid is checked in advance by carrying out the verification scan. Thus, it is possible to reduce influence on the speech/audio quality of a VoIP call when the VoIP terminal moves to a location outside the communicable area of the handover destination candidate.
With reference to
As mentioned above, in case that the verification scan is not carried out, the disconnection is caused for a longer time which is a summation of a time required to transmit and re-transmit the Authentication Request frame, a re-transmission time interval of the Authentication Request frame, and a time necessary for the all-channels scan, as compared with a case of performing the verification scan.
Tentatively, in the operation shown in
However, when the Authentication Request frame is re-transmitted many times (1122, 1123), there is a possibility that the terminal goes outside the communicable area with the access point in the communication state at present, and the disconnection occurs. In order to prevent this, when the switching threshold is set to a greater value, the area in which the reception electric field intensity equal to or more than the switching threshold is provided is made narrow, which results in the frequent occurrences of the handover. This is not preferable.
The configuration and operation of the above-mentioned exemplary embodiments are contained, and the verification scan is firstly carried out, which makes a period having a possibility of the occurrence of the disconnection to set the period from when the Authentication Request is transmitted (1104) to when the Association Response is received (1107).
In the above-mentioned exemplary embodiments, when the handover is predicted to be carried out, the verification scan in which the temporal and electric power costs are lower is carried out, and whether or not the terminal is located within the communicable area with the handover destination candidate. If the terminal is determined to be located outside the communicable area of the handover destination candidate, the data of the access point is collected by use of a usable channel between the communications, so as not to obstruct the communication with the access point in the communication state at present. Thus, a proper handover destination can be found out, to which the handover can be carried out. For example, it is possible to reduce the occurrence of the disconnection because the incommunicable access point is selected as the handover candidate, during the VoIP call.
Also, in the above-mentioned exemplary embodiments, by mixing the verification scan when the access point of the handover destination candidate is checked, it is possible to reduce a frequency of execution of the all-channels scan and a power consumption amount. Also, the check of the reasonability of the access point of the handover destination candidate can be executed more frequently. When the check of the reasonability is carried out more frequently, the access point of the handover destination candidate becomes more reasonable. Thus, for example, during the VoIP call, the probability of the failure of the handover is reduced, which can avoid the degradation in the speech/audio quality of the VoIP call at the time of the handover.
It should be noted that one skilled in the art can easily execute various variations of the above-mentioned exemplary embodiments. Thus, the present invention is not limited to the above-mentioned exemplary embodiments. This is construed in the widest range that can be considered in accordance with claims and its equivalents.
Number | Date | Country | Kind |
---|---|---|---|
2007-037468 | Feb 2007 | JP | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/JP2007/073780 | 12/10/2007 | WO | 00 | 8/19/2009 |