US20160037389A1 - System for Providing Mobile VoIP - Google Patents

System for Providing Mobile VoIP Download PDF

Info

Publication number
US20160037389A1
US20160037389A1 US14/722,561 US201514722561A US2016037389A1 US 20160037389 A1 US20160037389 A1 US 20160037389A1 US 201514722561 A US201514722561 A US 201514722561A US 2016037389 A1 US2016037389 A1 US 2016037389A1
Authority
US
United States
Prior art keywords
recited
telecommunications system
communication
mobile unit
call
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/722,561
Inventor
James Tagg
Andrew Donald McEwan
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Truphone Ltd
Original Assignee
Truphone Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Truphone Ltd filed Critical Truphone Ltd
Priority to US14/722,561 priority Critical patent/US20160037389A1/en
Publication of US20160037389A1 publication Critical patent/US20160037389A1/en
Assigned to SOFTWARE CELLULAR NETWORK LIMITED reassignment SOFTWARE CELLULAR NETWORK LIMITED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MCEWAN, ANDREW DONALD, XOSIA LIMITED
Assigned to TRUPHONE LIMITED reassignment TRUPHONE LIMITED CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: SOFTWARE CELLULAR NETWORK LIMITED
Assigned to TRUPHONE LIMITED reassignment TRUPHONE LIMITED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MCEWAN, ANDREW DONALD
Assigned to SOFTWARE CELLULAR NETWORK LIMITED reassignment SOFTWARE CELLULAR NETWORK LIMITED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: TAGG, JAMES
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0011Control or signalling for completing the hand-off for data sessions of end-to-end connection
    • H04W36/0022Control or signalling for completing the hand-off for data sessions of end-to-end connection for transferring data sessions between adjacent core network technologies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2854Wide area networks, e.g. public data networks
    • H04L12/2856Access arrangements, e.g. Internet access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4633Interconnection of networks using encapsulation techniques, e.g. tunneling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/029Firewall traversal, e.g. tunnelling or, creating pinholes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/40Support for services or applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0011Control or signalling for completing the hand-off for data sessions of end-to-end connection
    • H04W36/0022Control or signalling for completing the hand-off for data sessions of end-to-end connection for transferring data sessions between adjacent core network technologies
    • H04W36/00224Control or signalling for completing the hand-off for data sessions of end-to-end connection for transferring data sessions between adjacent core network technologies between packet switched [PS] and circuit switched [CS] network technologies, e.g. circuit switched fallback [CSFB]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0055Transmission or use of information for re-establishing the radio link
    • H04W36/0072Transmission or use of information for re-establishing the radio link of resource information of target access point
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0212Power saving arrangements in terminal devices managed by the network, e.g. network or access point is master and terminal is slave
    • H04W52/0216Power saving arrangements in terminal devices managed by the network, e.g. network or access point is master and terminal is slave using a pre-established activity schedule, e.g. traffic indication frame
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/12Setup of transport tunnels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/04Large scale networks; Deep hierarchical networks
    • H04W84/042Public Land Mobile systems, e.g. cellular systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Definitions

  • the present invention relates to a system that provides VoIP over wireless LAN and WAN networks.
  • the Internet came into being in its current form in 1983 when all the computers connected to ARPANET—a military network—began using the same communication protocol. In 1986 ARPANET became NSFNET in a bid to link the USA's supercomputers. E-ail began to be commercially available in 1990 at much the same time that Mosaic—the first worldwide web browser—became a useful product.
  • the Internet comprising mainly the WWW (world wide web) and e-mail is now an extremely important business tool.
  • TCP/IP Transmission Control Protocol/Internet Protocol
  • ATM Asynchronous Transfer Mode
  • Mobile users are commonly envisaged as people using a cell phone or other radio device, but for our purposes a ‘mobile user’ is anyone away from their fixed home base.
  • SMS Short Message
  • HDML High-Reliable and Low-Reliable
  • WAP Wireless Fidelity
  • I-Mode the main standards. All of these standards suffer to some extent from problems such as limited bandwidth and complex authoring environments.
  • SMS short message service
  • a server at the mobile phone service either routes them to other mobile phone users or provides a gateway that translates the messages and sends them as e-mail to Internet e-mail services.
  • the gateway will also translate incoming email and send it to the user in SMS format.
  • HDML High Speed Markup Language
  • a wireless gateway translates these tags so that the mobile device may view them.
  • a mobile device equipped with a micro browser capable of interpreting HDML can display this information on a small LCD.
  • WAP wireless application protocol
  • WML wireless markup language
  • RAS remote access server
  • always on a packet based system
  • I-Mode specialist tags are again used to create pages formatted in compact-HTML. These are served over a gateway to users on a packet-based system.
  • a specialist gateway is used to provide output formatted for mobile devices.
  • An alternative method of accessing the Internet from a mobile device is provided by fixed wireless systems such as Bluetooth and the IEEE 802.11 wireless LAN standard.
  • the two wireless devices establish a point to point or point to multi-point link using spread spectrum radio technology.
  • the two wireless devices can be any type of electronic appliance—PC, PDA, Cell phone, microwave oven, home security system. This link replaces wires and does nothing to reformat the content of data.
  • IrDA Infrared Data Association
  • two devices with IrDA capability positioned near one other can communicate using infra-red beams.
  • the standard suffers from two problems. Firstly that the link is optical and therefore requires a clear line of sight. The devices must be positioned so that their ports are visible to each other or at least so that sufficient reflected light reaches the, ports. Secondly the two computers need to have their IrDA ports configured and switched on. This is a non-trivial task: The hardware must be enabled—commonly powersaving and compatibility issues mean that computers are shipped with the port disabled. A device driver must be installed. Once the physical link is available a logical link is needed to allow file transfer or access to the hard disk of the companion computer. Security and privacy must be ensured.
  • firewalls may be present. If a shared connection is obtained in the home or office, access to the Internet may be blocked or restricted by the activities of a firewall. The same technology that provides the firewall capability may also track usage and web sites visited providing a risk to privacy. Additionally information that is sent or received may be logged causing considerable security risk.
  • the process of connecting a PC or PDA to a cell phone is complex and requires considerable reconfiguration of the device.
  • the current mode of access to the Internet is predominantly through a one-to-one commercial negotiation.
  • Each person has a connection to the Internet via their own ISP. When visiting someone else's home obtaining access to the Internet is difficult. Calling the ISP requires another phone line.
  • the MAC address of the network adaptor is registered to the ISP so that a second user can't use the connection. You can install a network and enable connection sharing in your OS—for example Windows 2000TM—but this involves a number of complex steps.
  • Wi-Fi wireless local area networks
  • Table 1 set forth below.
  • Bluetooth when used in its low power mode, is often called a personal area network (PAN) and WiMAX technology can have extended range that rivals cellular macro-cell coverage.
  • PAN personal area network
  • WiMAX wireless access
  • WWAN-audio and WWAN-IP Internet Protocol
  • WWAN-VoIP (-Voice over IP).will refer to the situation of carrying voice over WWAN-IP.
  • Roaming is the feature where a mobile phone can acquire a radio connection and signal to an authentication method to request a connection to services
  • handoff is the feature where a mobile phone moves from one radio connection to the next maintaining a voice call or data connection with as little interruption as possible. When this interruption is not noticeable to the user the handoff is deemed “seamless.” Seamless handoff is not always an advantage. For example, when the user moves from a low cost connection to a high cost connection they generally want the transition to be made clear.
  • UMA Unlicensed Mobile Access
  • APs WLAN Access Points
  • UMA is described in relation to the GSM system but can be generalized to WWAN-Audio systems including 3G. We shall refer to the GSM case for this discussion.
  • a handset is modified to send voice and data via a WLAN connection (such as 802.11 a/b/g or Bluetooth).
  • WLAN connection such as 802.11 a/b/g or Bluetooth.
  • UMA Network Controller (UNC) that de-encapsulates the protocol and sends it on to the cellular infrastructure.
  • UMA UMA Network Controller
  • the primary object of the UMA specification is to make connection to the core cellular network as quickly as possible and then make all further communication through that core cellular network.
  • Roaming is possible on UMA because the protocol encapsulation and emulation of a GSM base station allows the handset-AP combination to appear as a GSM cellular phone and GSM base-station even though the wireless protocol being used is WLAN. Handoff is supported between cells where the initial cell is a WLAN-AP and the handoff is made to a GSM cell or vice versa. In these cases the handset must simultaneously switch radio layer protocols while maintaining the GSM signaling and audio channel connectivity.
  • the phone may signal a handoff ‘start’ while using one radio layer and then signal the handoff ‘completion’ using another radio layer.
  • the system design is complex with many points of integration between the WLAN signaling elements and the GSM elements at low levels in the stack.
  • Presently, such low level integration requires considerable engineering time to implement as the software elements are real-time and time critical—often upwards of 18 months for software work, manufacturing and test prior to launch in the network.
  • UMA handsets require a full cellular infrastructure to operate, consisting of a Mobile Switching Centre (MSC) within the HPLMN (Home Public Land Mobile Network) interworking with location databases including HLR (Home Location Register) and VLR (Visitor Location Register) or SGSN (Serving GSM Support Nodes).
  • MSC Mobile Switching Centre
  • HPLMN Home Public Land Mobile Network
  • HLR Home Location Register
  • VLR Visitor Location Register
  • SGSN Serving GSM Support Nodes
  • a mobile VoIP system entails using a phone that supports the Bluetooth cordless telephony protocol (CTP) connecting to a Bluetooth enabled base station that also supports CTP.
  • CTP Bluetooth cordless telephony protocol
  • a CTP system implements two protocols: telephony control specification-binary (TCS-binary) and the synchronous connection oriented (SCO) audio protocol.
  • TCS-binary telephony control specification-binary
  • SCO synchronous connection oriented
  • Bluetooth and Wi-Fi differs for different classes of system and in different scenarios.
  • the Bluetooth protocol has slightly better in-building range, but is hampered by the fact that Bluetooth systems are not commercially available with good diversity schemes.
  • Wi-Fi systems have excellent diversity schemes where two antennas receive signals a few inches apart so that one or other antenna avoids interference, but are generally high-power only devices.
  • a system is needed that optimizes the mix of Wi-Fi and Bluetooth systems and uses each to the best of its capability.
  • Bluetooth has declined in usage as Wi-Fi enters the space.
  • a number of advantages of Bluetooth over Wi-Fi exist It is very low cost, it has about 1/10 th the power consumption of the equivalent Wi-Fi function, it is already designed into roadmaps for the next two years, many low power Bluetooth headsets exist that are unlikely to be displaced by Wi-Fi. Therefore, any proposed system needs to cope with a mixed world of Bluetooth and Wi-Fi handsets and plan for the introduction of Wi-Max. At present there are no satisfactory Bluetooth/Wi-Fi dual mode access devices.
  • ADSL Router broadband router
  • Bluetooth is the low cost link. It is a complex task to select a Bluetooth Profile that is available both on a Smart phone and on a PC. The following table is a reasonably comprehensive but far from exhaustive list of the profiles currently specified for Bluetooth.
  • GAP Service Discovery Application Profile
  • SDAP Cordless Telephony Profile
  • IP Serial Port Profile
  • SPP Headset Profile
  • HSP Dial-up Networking Profile
  • DUNP Fax Profile LAN Access Profile
  • LAP Generic Object Exchange Profile
  • SP Object Push Profile
  • SP Synchronization Profile
  • HFP Human Interface Device Profile
  • HFP Human Interface Device Profile
  • HFP Human Interface Device Profile
  • HRP Hard Copy Replacement Profile
  • BIP Personal Area Networking Profile
  • PAN Basic Printing Profile
  • BPP Advanced Audio Distribution Profile
  • A2DP Audio Video Remote Control Profile
  • AVRCP SIM Access Profile
  • Wi-Fi Wireless Fidelity
  • MAC Media Access Control
  • 802.11e wireless MAC enhancements for QoS
  • 802.11e provides a method for solving this but this still suffers from contention issues for the wireless medium particularly with respect to ‘unfriendly’ cohabitations such as Bluetooth with Wi-Fi (which share the same frequency band).
  • Wi-Fi which share the same frequency band.
  • An embodiment of the present invention provides a method and system for connecting to a network—typically the Internet via a cooperative membership arrangement.
  • Members of the cooperative networking service have an identifier that uniquely identifies them as a member of the service.
  • a fixed member hosts
  • CTA Cooperative Tunneling Agent
  • the server contains preference information on all members that can be referenced by their identifiers.
  • the status information is compared to the preferences of the two members and, if the comparison is successful, a link to the Internet is provided to the mobile member.
  • the CTA can work with or without reference to a server. When working independently of the server the comparison is made using data from the host and the client and the server is only accessed if additional information or service is required.
  • the CTA ensures that the mobile user has no access to the fixed user's computer other than as a pipe thru to the Internet.
  • the data packets may be encrypted and sent via the fixed host to the server.
  • the server may decrypts the data and sends it to the Internet. Return data is similarly dealt with.
  • the fixed member cannot eavesdrop on the mobile member's data or voice traffic.
  • Such encryption can be set at a variety of strengths according to user preference and applied selectively depending on the data type. Routing of the data may also be performed selectively according to data type.
  • An advantage of the system is that two members can quickly and simply set up secure link so that one member can access the Internet thru the other members network connection without causing security risks to either member.
  • a further advantage of the system is that one member can use the low cost access method available to another user.
  • a further advantage is that voice calls can be sent to the host and routed over the EP network using VOIP technology thus dramatically reducing costs.
  • a further advantage is that voice calls can be routed thru the cellular system to a local VOIP server thus saving long distance cellular charges.
  • a further advantage is that by simplifying the operation of logging onto the network thru fixed nodes commercial node providers will find it easier to acquire customers and the service to those customers will be improved and simplified.
  • a further advantage is that by providing a universal logical standard for connection incompatible transport protocols can be made compatible. In the example of Bluetooth and IEEE 802.11 the CTA can ensure that the protocols synchronize to divide their spectrum usage in either time domain or frequency domain for all members present.
  • a further advantage of the system is that since access is automated according to preset preferences the system can be used for the connection of autonomous appliances and machines who are not able to make complex decisions regarding optimal network access.
  • the link can transport either data or voice.
  • voice In the case of voice the CTA handles the VOIP (voice over IP) protocol.
  • VOIP and Multimedia can be either sent via the complete path thru our secure server or split apart to take a more optimum routing.
  • the software allows the user to access the Internet, send and receive e-mail and obtain high bandwidth services such as MP3 files and movies.
  • the network is cooperative as each user agrees to both give and receive access depending on their status.
  • Each user is a node.
  • a cell phone located within 100 feet of a fixed host device can connect to the Internet through that device, obtaining phone calls at a fraction of the cost of a regular cellular connection.
  • a portable computer or PDA would be able to connect through a host node and obtain a high bandwidth link to the Internet for a modest sum of money.
  • cooperative connection there will be two main types of connection; cooperative connection and commercial connection.
  • a cooperative connection a fixed user connected to the Internet provides a bridge so that other mobile users may access the Internet through their link.
  • This link is provided free of charge in return for reciprocal roaming rights.
  • the user locates a commercial node and the CTA negotiates connection and payment terms according to preset user preferences. While this invention is primarily targeted at simplifying the task of connecting using fixed wireless devices such as Bluetooth or 802.11 it will apply to any connection methodology—IrDA port, network cable, serial cable, USB crossover connector et al. Our invention is intended to facilitate connection to any rigid network infrastructure but the Internet is the most important of these.
  • Means for cleanly handing off connection from one system to another are provided by the CTA.
  • the CTA By storing both the customer's Cellular provider information and the Cooperative network ID the call can be routed through either system.
  • the call can be set up in the VOIP system and handed over and visa versa.
  • the technology provides the function of a bandwidth moderator. As a user moves about their daily life from home to office via different modes of transport, their requirements for Internet connection change in characteristic, and the mode of connection changes. Our technology sits between the user and the Internet constantly negotiating the most cost effective means by which they can gain access. While today the modes seem simple—it's a wired or a wireless link—this will not remain so in the future and all software systems will require an agent to perform this task. It is an objective of the present invention to optimize the ‘last mile’.
  • This system differs substantially from the cellular system in that a substantial amount of network hardware is provided by the members of the network and not by high capital value dedicated infrastructure. It is generally a surprise to people when they realize how often they are within 100 feet of an Internet connection. Additionally the cellular system provides no handoff methodology between differing classes of carrier.
  • the present Invention provides a means for wirelessly enabling a home, office or public environment such that commonly available hardware, such as PCs and mobile phones, may be easily and readily used in conjunction with simple low cost repeaters, PCs enabled as access points and one or more wireless access points, providing a complete telephony solution that allows a person to use one phone handset for all their telecommunications needs.
  • the system solves a range of problems with previous systems.
  • this technology will also enable VoIP services for the home, office and mobile environments that have hitherto been prohibitively expensive and have suffered from poor user experience.
  • this technology allows Mobile VoIP to operate on Nokia phones and Microsoft operating system PCs that have not previously had these capabilities without modification of the hardware or embedded/fixed software elements of these systems.
  • multi-media services such as music streaming and download and real time gaming.
  • Multimedia subsystems within phones are also capable of recording and rendering pictures and video.
  • the proposed system converts speech or data immediately into VoIP, a protocol optimized for the Internet that is time independent of its control signaling and where the precise timing of the packets is not material.
  • the benefits of a packet-based protocol are that packet time and real time are independent of each other. This significantly reduces the complexity of the software for the phone, access points and server infrastructure. Indeed such simplicity allows that any generic access point can be used.
  • a packet based system may follow different routing paths providing for a high degree of redundancy and therefore reliability. For example, a packet may be forwarded at the radio layer via the Bluetooth, Wi-Fi and UMTS link simultaneously during handoff/over in the invented system. While UMA systems are also packet based systems over the radio layer, those packets are only comprehensible by a UNC (UMA Network Controller) and must transit through it for translation back into core cellular protocols. This introduces a compulsory routing node and therefore a single point of failure. Must of the advantage of an IP based packet system is therefore lost.
  • UMA UMA Network Controller
  • the invention separates the radio layer protocol and the audio protocol and uses IP sockets for the interfacing within the phone.
  • this sorting is not needed as there is no essential restriction on having two streams (i.e. a socket pair rather than a single socket) connecting mobile subscribers in the SIP domain, and this approach can be used to improve QoS and the seamlessness of handover.
  • a further advantage of the system using an all IP architecture is that handoff can be affected without interfacing with the low level stack components of a phone.
  • General purpose PCs can be co-opted into the invented network to provide broad coverage by enabling them with either Wi-Fi or Bluetooth.
  • the PCs are configured to bridge between the incoming SIP connection and the LAN.
  • These PCs can perform simple packet forwarding or more advanced mobility tasks such as handover to WWAN or gateways by translating into proprietary protocols such as SKYPE and terminating over the proprietary network.
  • the invented system has a new form of repeater in the system which is also radio layer agnostic and able to translate between Wi-Fi and Bluetooth and forward either protocol quickly and efficiently.
  • FIG. 20 describes the link budget problem. Essentially most mobile phones will have poorer antennas and lower power amplifiers than the access points or repeaters in a given system. This disparity tends to most affect the transmit power from the phone but also affects receive sensitivity. However, the invented system utilizes a low cost receiver that has high power and increased receive sensitivity and diversity reception in addition. The result is that low power standard mobile handsets may be used with reasonable range and coverage being provided by the link budget optimized repeater/AP.
  • the optimum combination is low noise receiver, high power output (+20 dBm), diversity reception and coexistence methods for removing interference between other radios. Furthermore at the system level, the ability of the AP to talk to the phone via a back channel provided by WWAN and the server can further reduce power consumption and provide an alternate diversity channel for very tough conditions.
  • the invented repeater has Bluetooth and Wi-Fi coexistence and SIP/VoIP compatibility so that it can be introduced into a home/office or hot spot to pick up the existing links and forward them to multiple devices using these giving both range and capacity improvement.
  • a significant problem that the repeater solves is the ability to quickly enable a home/office or hotspot using a device that has a minimum of configuration and therefore customer support requirements. Correct siting is easy to do using the BLUE/GREEN/AMBER LED pattern on the repeater. Amber indicates no signal, green indicates path back to Internet and blue indicates forward connection either to another repeater or a phone. This allows for very easy improvement to WLAN coverage to be made with minimal support costs.
  • the repeater further supports Simple Network Management Protocol (SNMP) specification so you can monitor and maintain the repeater from afar.
  • SNMP Simple Network Management Protocol
  • a further simplification to pairing and exchanging keys is provided by allowing a USB memory device to be plugged into any device in the system and automatically transfer the link key information to another device subsequently plugged in.
  • the WLAN repeater/translator further simplifies the home/office wiring problem by allowing wired phones to plug into the repeater with a suitable RJ45, RJ11 or BT plug, thus eliminating the need to provide a wiring system for fixed phones within the home and bonding the home system to the wireless VoIP infrastructure.
  • NAT Network Address Translation
  • Many computer networks block certain ports and allow incoming IP only as a direct response to outgoing IP.
  • the repeater makes regular contact with the system server and thus keeps an incoming channel open.
  • the repeater may perform Network Address Translation of Processing, search for and switch ports to an unblocked port on the server or take other action to maintain contract with the server. Since it is generally an AC powered, high power device these actions are not detrimental to its operation but would tax a phone in similar circumstances.
  • the system implements advanced coexistence methods to allow a variety of wireless networks to be used in a seamless fashion without causing interference with each other.
  • all devices in the invented system are Bluetooth/Wi-Fi coexistence devices capable of offering dual coverage without interference.
  • the system attempts to look for the shortest signal path, thus the handset can uses peer-to peer-techniques to discover if another handset is in range. This may be achieved directly (for direct communication over the local radio link) where the telephone number is resolved to an IP address range and location and Bluetooth address or Wi-Fi MAC address. In this case the device or server can determine that the telephone number called is actually located in close proximity and route the traffic directly without even needing to transit an access point or repeater. The handset or server may track up the address range until it finds a short path for example or via a local repeater or communication over the LAN only.
  • a further advantage of the system is that phones that support Bluetooth but do not support CTP protocol may be used within the system. Nokia phones fall within this category and currently have the largest market share.
  • a further advantage is that a variety of devices can be used in the system that are Bluetooth and/or Wi-Fi enabled such that the signaling protocol and system architecture and coverage are substantially identical.
  • An advantage of routing through a PC is that there are widely used low cost devices, in the form of Bluetooth or Wi-Fi cards or dongles, which can be converted to access points with very little additional cost, which in turn means that the overall cost is kept low.
  • a further advantage is that range is increased by using repeaters.
  • Wi-Fi as the backbone and Bluetooth in the local link in a repeater scenario minimizes Bluetooth master/slave role reversal problems.
  • one repeater needs to be the master and the other a slave. This introduces the problem that a phone moving from one AP to another would have to connect to the first as a master and the second as a slave, or each AP would have to be slave and master simultaneously. While this simultaneous master and slave is possible within the specification it has an impact on channel throughput and is complex to implement.
  • Wi-Fi is used as the backbone link between a number of Bluetooth access points the access points can perform a single task, either master or slave, simplifying the architecture. This then allows for easy context transmission over the Wi-Fi backbone without the need for wiring and takes advantages of new developments within 802.11 chip sets implementations to maximize range and throughput.
  • a further advantage of routing through a PC is that all the VoIP packets and authentication information are available at the PC and can be transcoded to transmit over proprietary VoIP networks such as SkypeTM and MSNTM.
  • a further advantage is that the wireless coverage of a home or office can be effected with low cost devices and the wiring plan of that space can be substantially simplified.
  • the audio is sampled, compressed and packetized.
  • the link has a degree of packet retry, the forward error correction can be increased because the data is more highly compressed and the CODECs used have lost packet masking characteristics. Therefore there is both a lower chance of loosing a sample and a lost sample has less audible effect.
  • a further advantage is that all data transits over ACL links which can be optimized to have lower error rates and have forward error correction options.
  • a further advantage is highly compressed audio data can be transmitted using AMR codecs that are implemented in hardware on most mobile devices. This allows for lower data bandwidth over the link. The system has full control of the audio path.
  • a further advantage is that the combination of low data bandwidth and an error corrected link translates into improved range, and improved quality in the presence of interfering noise.
  • a further advantage is that the architecture and protocols are substantially the same when moving from Bluetooth to Wi-Fi networks.
  • a further advantage is gained by using Bluetooth ACL connections rather than SCO connection in that the quality and range are improved and ACL supports an IP data channel giving the advantages of an all IP approach.
  • a further advantage of using ACL links is that up to seven devices may be connected at one time to a Bluetooth Master.
  • the invented system solves this by providing a table of available Access Points and pre-pairing these in the background. If location information is available through cell ID, network location information, GPS (Global Positioning System) data, or the current or last known Access Point location, then the acquisition procedure can be further improved by initially limiting and then progressively widening the search space. Such efficient search patterns improve power consumption as well as reducing the time to connect. So for example a person may touch down in a foreign country and the phone detects a network change—the person roaming in Germany on one of the German Networks.
  • the handset communicates with the server to indicate that it is in Germany with Cell ID 12345.
  • the server will now send it the AP tables for that region of Germany and it can begin efficiently searching for AP resources. If no AP resources are known for Germany the handset will simply begin a basic search from first principles.
  • Previous systems have used the low level audio subsystem within the phone implemented for either GSM or Bluetooth CTP. These hardware systems are efficiently built but inflexible as previously illustrated. In particular, they are unable to hand their audio-streams to the high layers of the protocol stack for processing so the systems can not be easily re-programmed.
  • the invented system uses the software configurable digital path utilizing the operating system multi-media framework to implement the audio function. In this case it is necessary to correctly prioritize tasks within the system so that audio is handled without interruption.
  • VoIP Voice over IP
  • connection to the core cellular network is not required in order to perform telecommunication functions allowing anyone to implement a mobile VoIP solution with minimal infrastructure investment.
  • a major benefit of the invented system is that since the protocol stack is ‘all IP’ and then communicates over a general socket layer a hand-off between Bluetooth and Wi-Fi is straightforward.
  • the SIP proxy can cope with two IP addresses or endpoints connecting to the same caller and handoff is a matter of beginning, sending packets on one bearer, and ceasing on the other. Packets can be sent over both bearers to give diversity reception implemented at the IP level and in devices that can connect to more than one AP of either Bluetooth or Wi-Fi then multiple packet streams can be sent to multiple AP's if desired.
  • Another significant benefit of being able to switch seamlessly from Bluetooth to Wi-Fi is to use the extremely low power capabilities of Bluetooth to preserve battery life but still allow the use of Wi-Fi when Bluetooth is unavailable.
  • a further benefit is to extend coverage options and increase the likelihood that you will have a WLAN connection available to the Internet
  • FIG. 1 illustrates tunneling Internet access in one embodiment of the present invention.
  • FIG. 2 is a flowchart of the process by which a link is established.
  • FIG. 3 is a table showing the data record structure for a customer.
  • FIG. 4 is a flowchart of the process by which cooperative networking is enabled.
  • FIG. 5 is a diagram illustrating recursive service discovery.
  • FIG. 6 is a block diagram of the elements of the system.
  • FIG. 7 is a table describing a day in the life of a user.
  • FIG. 8 is a :flowchart of the matching algorithm.
  • FIG. 9 is a diagram illustrating voice over IP and service handoff.
  • FIG. 10 depicts a wireless VoIP system for a wireless enable home, office or public environment in accordance with one embodiment of the invention.
  • FIG. 11 depicts a block diagram for the phone 200 and PC 227 when using a Bluetooth and/or Wi-Fi and data enabled phone as the radio transport mechanism and a PC with Bluetooth and/or Wi-Fi connectivity in accordance with one embodiment of the invention.
  • FIG. 12 is a call flow diagram for the SIP protocol elements during handoff between a WLAN call and a WWAN-audio protocol call in accordance with one embodiment of the invention.
  • FIG. 13 a depicts a system that implements a UMA-type system
  • FIG. 13 b depicts one embodiment of the present invention
  • FIG. 13 c depicts a system that implements a Bluetooth-CTP type system.
  • FIG. 14 is a state diagram that illustrates the types of handoff cases that are handled by one embodiment of the invention.
  • FIG. 15 depicts a system wherein one or more servers within the system provide a range of telecommunications functions including call handling and termination.
  • FIG. 16 depicts a home system illustrating the different uses of one embodiment of the present invention.
  • FIGS. 17 and 18 depict the repeater utilized in one embodiment of the present invention.
  • FIGS. 19 and 20 depict the set top box utilized in one embodiment of the present invention.
  • FIGS. 21 a - b depict the repeater utilized in one embodiment of the present invention.
  • FIG. 22 depicts the set top box utilized in one embodiment of the present invention.
  • FIG. 23 is an electronic block diagram of a series of components that would form a system that allows voice, video and data wiring for the home, an office or a hotspot in accordance with one embodiment of the invention.
  • FIG. 24 illustrates the Network Address Processing required to process IP v4 RTP datagrams for the mobile roaming, handoff and handover in accordance with one embodiment of the invention.
  • FIG. 25 shows a configuration of a basic product in accordance with one embodiment of the invention.
  • FIG. 26 illustrates the IDP header compression and resolution of two compressed streams into a single outgoing stream.
  • FIG. 27 depicts a state diagram and physical schematic for power management and service discovery in a WLAN and WWAN system in accordance with one embodiment of the invention.
  • FIGS. 28 a and 28 b are a flow diagrams showing the procedures carried out in both the handset and AP when making a call where the SIP and RTP clients are both implemented in full on the AP in accordance with one embodiment of the invention.
  • FIGS. 28 c and 28 d are a flow diagrams showing the procedures carried out in both the handset and AP when making a call where the SIP and RTP clients are both implemented in full on the handset in accordance with one embodiment of the invention.
  • FIG. 28 e are flow diagrams that illustrate the peer-to-peer discovery process.
  • FIG. 29 is a flow diagram showing the security and authentication procedure for a wireless LAN connection to the system in accordance with one embodiment of the invention.
  • FIG. 30 illustrates the link budget and therefore the maximum achievable range for a WLAN systems in accordance with one embodiment of the invention.
  • FIG. 31 is a diagram that illustrates the system elements to permit co-existence between Bluetooth and Wi-Fi systems.
  • the present invention provides a method and system for easy, secure, mobile Internet access thru fixed connections points.
  • These fixed connection points being computers that are connected to the Internet and have another port available for connection by one or more; mobile users.
  • a fixed connection point can itself be a portable device, such as a portable PC, and may be moved from time to time. The term is a relative one.
  • To a mobile user a PC with an Internet connection is a fixed device.
  • hosts and a mobile user will be called a client.
  • the host can be any form of general purpose PC or a custom built device, which as two connection methodologies and an ability to selectively connect those methodologies under program control.
  • the simplest system has a host and a client.
  • the host will generally communicate with a server to transfer data and receive services but a host can run in stand-alone mode if connection to a server is unavailable or if client security and privacy are not high concerns such as when the host and client are used by the same person.
  • the system is composed of three main parts: The software application, the web server and associated web site and specialist network services such as streaming and VOIP which are provided by other parties.
  • the link functions include:
  • the tunneling functions include:
  • the server functions include:
  • Third party functions that may be linked to include:
  • the software application runs on both the client and the host, varying its mode of operation depending on its function in the network. (It is possible for the software to run within a browser thus giving a ‘software-less’ mode of operation. Is will be obvious however that software is indeed running in this instance.)
  • the web server provides the user interface to the service, allowing people to register and also the configuration software to correctly set up each machine and ensure that the software application which runs on the client's and host's is up-to-date and correctly configured.
  • IP packets may not be routed to the server but may travel via a third party routing service for optimum performance.
  • FIG. 1 illustrates the general layout of the network.
  • a roaming device, 106 which might be a mobile computer, PDA, cellular telephone or home appliance, comes within range of the fixed wireless link of a member, circles 107 - 110 .
  • the mobile device determines the connection methodologies available to it and their relative merits and then connects to the host using the best available standards.
  • the cooperative tunneling agent examines the preferences of the roaming member and the fixed member and compares these with a database stored on the server. If the comparison generates a match then standard IP packets are encrypted and sent from the roaming device 106 , thru the fixed device 104 or 105 thru any present firewall 103 thru the Internet 102 to our server via a link to the Internet 111 .
  • Our server 101 decrypts the packets and sends them onto the Internet via the link. Return packets from the Internet are passed back to the server and are similarly routed back to the member via the encrypted links.
  • a home user depicted as PC labeled 104 typically makes a direct connection to the Internet 102 without the benefit of a firewall 103 .
  • a corporate user connects to the Internet thru a proxy server and firewall 103 .
  • These two functions are shown as a single block but may be comprised of several physical units; a router, a server, a proxy server, a firewall and a security monitoring computer.
  • Firewalls provide a range of services. Primarily they block all ports except the commonly used business ports such as http port 80. This stops hackers accessing systems using older methodologies that often grant considerable powers to a user.
  • the firewall may block specific web sites thru the exclusion of certain IP address lists—‘black list’.
  • the tunneling agent can encode all packets and sends them thru port 80 bypassing any corporate specific snooping of the data. If the UDP (“user datagram protocol”) port is available this may be preferentially used for sending VOIP and other real time packets.
  • references to the server in this description may apply to any server providing our service.
  • the actions of the server may be split across several logical or physical devices so as to optimize performance.
  • some specialized tasks may be offloaded to third party servers.
  • the server may be the computer of another member such that there are no specialist servers in the system and all tasks are distributed. In such a case the members database might be duplicated and distributed thru the network to provide security and redundancy and a VOIP a single point of failure.
  • FIG. 2 is a flowchart giving the steps required to establish a link and obtain access to the Internet.
  • the tunneling agent running on the client computer sits in a loop attempting to find a network node 201 .
  • the polling rate can be set by user preference or turned off and re started by user command at a later stage.
  • the link protocol will find a network node and establish the physical link in step 202 .
  • the host computer has been pre-configured to direct all physical links to the CTA (cooperative tunneling agent) which acts as a gate keeper for all network access thus the logical link 203 is set up to point only to the CTA.
  • CTA cooperative tunneling agent
  • the client then sends the client ID and associated information to the CTA. If this is the first access by a user to the host system the local match step 205 will always fail. However the match can fail for two reasons. Firstly that the preferences don't match immediate failure can be notified to the client without reference to the server. If the preferences match but insufficient information is held to determine whether a complete link can be made the host will contact the server. (In certain circumstances such as the request for a non-client-secure link the client and host can operated independently of a server.) The client and host information is sent to the server in step 206 and the server attempts to make a match in 207 . If the match fails a link is not made and the user is notified and given options to modify their preferences and start again.
  • link information is cached on the host machine. This information can be used to reestablish the link without reference to the server if the link is broken.
  • a mobile user who is on the edge of range may be constantly moving in an out of range so caching the link information allows the link to be made and broken quickly without a server request being required every time.
  • FIG. 3 is an excerpt of a member record showing the important elements in creating; a match between cooperative members.
  • ISP Internet Service Provider
  • the most common link is a fixed member (host) connected to the Internet by an always-on connection, such as an ADSL modem, granting free access to a mobile member.
  • an always-on connection such as an ADSL modem
  • Another common connection occurs where the host is connected by metered access.
  • the host can inform the client of the cost prior to making a connection to the network. The process by which this information is used to establish a link is detailed in FIG. 8 .
  • FIG. 4 is the flow diagram by which cooperative networking capability is enabled.
  • the user logs onto the website to requests the service.
  • software is downloaded to the member device.
  • the software scans the members system and determines the connection methodologies available, sets parameters and directs the flow of data from those methods to a secure piece of software.
  • the user sets the tunneling preferences that they wish to grant to other members along with their personal details.
  • the user sets the access provision preferences they would like when they use the network.
  • the system summarizes the preferences and confirms they meet the customer policies pertaining at the time. These preferences are stored on the host client with the associated user ID. Confirmation of credit approval can be given at this point.
  • the software could run on the server and client system using a method such as Active JavaTM Pages.
  • the software will need to undertake a number of low level tasks which might be protected from modification by a Java program and downloadable program elements are generally required.
  • Some operating systems when connected to a new network, automatically log onto a default network specific web page upon boot-up. This feature can be readily provided so that a client system has only to connect their computer and turn it on and the host node will automate steps 401 and 402 .
  • the host computer may store a copy of the installation and registration software so that the registration and setting of preferences can be performed off-line and then uploaded to the server upon next connection.
  • the configuration software may be ‘beamed’ from one user to another or transferred over the link to user who does not yet have the service by a push or pull methodology.
  • FIG. 5 illustrates recursive service discovery.
  • a mobile user 505 wants to gain access to the Internet. Thru the wireless network it connects to another mobile user 504 and requests a tunnel to the Internet. This unit is not connected to the Internet thru a wired connection and so itself makes a request to another unit 503 .
  • This unit although fixed, has no hardwired Internet connection and so connects another Computer 502 , which does have a connection to the Internet 501 , and a link is made.
  • the link is established on a request basis as it is undesirable to establish a permanent link for power conservation: a pull system.
  • the link between 502 and 503 can be established once and be substantially permanent as both units have mains power supplies: a push system
  • the network can spread out to all permanently powered computers that are within range of each other and can be further increased in size on an ad hoc basis by requests from mobile units.
  • the scope of the network may be pushed outwards to encompass all available nodes or pulled outward by devices wanting connection to the fixed network.
  • FIG. 6 illustrates in block diagram form the elements of a system.
  • the client Browser 602 is pointed at the cooperative network website. It downloads and runs a program that sets up the computer. (This set-up was described in detail in association with FIG. 4 .)
  • the set-up means ensures that the correct drivers are installed on the computer to physically utilize the ports of the computer and that the IP stack and network resources are available and can be intercepted.
  • the CTA cooperative tunneling agent will either redirect all network calls thru its routines or provide a simple means for switching itself in when needed. The best method is usually described with examples in the documentation of the operating system.
  • the software for the client is the same as that of a host system but the CTA on a host system only needs to talk to the uplink as there is no further downlink to manage. That said the downlink must be left in a state awaiting connection so that a multi-hop request can be made.
  • the host computer runs two IP stacks and two sets of network drivers.
  • the first set 606 and 609 are used to communicate with the client.
  • the second set 608 and 610 are used to talk to the Internet.
  • the CTA 607 provides a low level link between the two.
  • the host browser and applications are generally unaware of the presence of the link unless the host desires to know, in which case it can either run a utility, point to a predefined web page or enable a status notification.
  • the host applications utilize the IP stack and drivers 608 and 610 in the normal way.
  • the server comprises a server engine 617 that performs all the tasks of linking with the Internet and decrypting and re-routing; packets.
  • the matching rule file 616 is containing the latest configuration software 615 .
  • a packet from the client takes the following path.
  • the browser routes the call to the IP stack in the client computer.
  • the CTA intercepts the request, encrypts it and encapsulates the packet in a new packet, which is routed to the host.
  • the host picks up the packet and routes it thru the CTA to the outgoing stack, adjusting the IP address appropriately.
  • the server receives the packet, de-encapsulates it, decrypts it and sends it onto the web. When a reply packet arrives, it is encrypted, encapsulated and sent to the client. Further details on implementation of tunneling protocols can be found in the literature.
  • FIG. 7 is a table describing one potential typical day for a mobile Internet user and illustrates the complex options available for connection and the many hand offs between systems.
  • the user has a cable modem giving access to the Internet at 500K bytes per second.
  • the potential connection speed is limited, even in the new 3G networks that are being proposed.
  • Once at work a free connection is available to the Internet using the office LAN 704 .
  • the user goes to a meeting they disconnect from their LAN and move either to a different LAN node or a mobile network provided by the IEEE 802.11 standard 705 .
  • FIG. 8 is a flowchart illustrating the matching process.
  • the matching process obtains the host 801 and client ID 802 and looks up the record on the database 803 . It then attempts to match the access permission with the desired access 804 / 805 . If this fails the client is asked whether it wants to change preferences 806 . (Typically the failure will occur because the client has no settings for obtaining a paid link to the Internet if the host is a commercial link or a cooperative link with non-zero incremental cost for access. The host will want to pass this cost onto the client.) This will require the client to amend their record 807 to provide billing info and to set the maximum connection charge and per minute charge that they are prepared to pay for an Internet connection. In the case of a paid link they can further set a budget for link costs.
  • FIG. 9 illustrates handoff between a fixed wireless, Internet based, VOIP system and the cellular system.
  • a mobile user 907 is within range of two methods for placing a call; a PC running our cooperative networking service and a cellular tower.
  • the call might be preferentially placed to either unit based on the users pre-set preferences or based on the current situation. Both links could be made or broken independently and exist simultaneously.
  • connection made over the Internet voice packets are sent over the air using a wireless link such as Bluetooth or IEEE802.
  • I to the host 905 These packets are routed thru the Internet 901 to a VOIP server 903 .
  • the VOIP server converts IP packets to a form suitable for use over the PSTN and handles making and breaking the connection to users.
  • VOIP servers There are many VOIP servers, two are shown here, located in each region such that the call is placed at a local rate. If the user moves away from the fixed wireless link 905 or the Internet becomes congested such that call is no longer of sufficient quality, a factor that can be determined either automatically or by the user the call can be dialed on the cellular link. There are a number of methods that handoff could take. Firstly the call could be dropped by the VOIP server and a new call initiated end-to-end thru the cellular network to the destination 908 . This would result in a break in the call. More suitably the mobile device would call a VOIP, either the existing server 903 or a server located near to the caller 910 .
  • the VOIP server would take information from the cooperative network server and route the call to the already established PSTN link and then to the destination 908 thus maintaining the call.
  • a benefit of this is that the call is not dropped, interrupted or reinitialized.
  • mobile device can place a call to a local VOIP server 910 which forwards the information to a VOIP server local to the receiving party thus saving cost.
  • the call routing between the two VOIP servers can be via the public Internet (dashed line) or thru a proprietary network.
  • the host node may send data using IP over the air or it can emulated the BluetoothTM air interface and appear as a cordless telephone base station for the client device.
  • IP IP over the air
  • it can emulated the BluetoothTM air interface and appear as a cordless telephone base station for the client device.
  • no specialist software needs to run on the client device if that device is a handheld phone or similar.
  • Security can be preserves by not decrypting the air interface on the host system and passing the un-decrypted information onto the server.
  • Roaming users will be able to get automatic high bandwidth connections to the Internet wherever there is another member present. Since members can be commercial or cooperative in their action this will allow ubiquity of service.
  • the CTA connecting automatically to their home computer and synchronizing their MP3 music collection with their on board hard drive.
  • FIG. 10 illustrates a wireless VoIP system for a wireless enabled home, office or public environment using commonly available systems such as GSM, SIP and UMTS (3G) but other similar systems might be used in substantially the same way for example CDMA (Code Division Multiple Access) and the H323 protocol.
  • a mobile phone 1001 is present in the environment of a PC 1013 , a wireless LAN access point 1002 , GSM network 1004 and 3G network 1003 . Each system is connected to the PSTN 1012 by differing routes.
  • a call may be made via the PC 1013 or WLAN AP 1002 by way of one or more switches (or routers) 1005 connected to the Internet 1008 and through a SIP proxy server 1009 a SIP server 1010 and a media gateway 1011 .
  • switches or routers
  • For the 3G network 1003 packets must transit the telco packet switch network 1006 prior to reaching the Internet 1008 , while the GSM network 1004 is connected via the telco circuit switch infrastructure 1007 directly to the PSTN 1012 .
  • the range may be extended and the protocols translated by a repeater 1014 .
  • the other routes will utilize the Internet 1008 .
  • the SIP proxy server 1009 provides media transcoding functions
  • the SIP server 1010 provides call management and mobility management functions while the media gateway 1011 translates media and signaling for the PSTN 1012 so that a call can be made to a general number, for example a telco circuit switch network 1007 .
  • the phone can be modified to include a SIP stack or Micro stack (that is simply a functional subset of SIP) for signaling.
  • Enabling the WWAN (typically UMTS) layer is done by issuing an attach command.
  • Enabling the WLAN connection is done by issuing a pairing and connect command to the Bluetooth subsystem or the equivalent for a Wi-Fi enabled device. Both WWAN and WLAN connections may be made simultaneously providing multiple IP connectivity paths to the same point.
  • VoIP data (RTP stream plus signaling) is sent over the Bluetooth data link to an access point (AP), for example WLAN AP 1002 , which routes the VoIP packets to a SIP server through the Internet 1008 .
  • AP access point
  • the packets are destined for a party that does not support VoIP they are sent to a media gateway that transcodes the packets into Common Channel Signaling System No. 7 (SS7) data for onward transmission to the Public Switched Telephone Network (PSTN) or a private branch exchange (PBX).
  • PSTN Public Switched Telephone Network
  • PBX private branch exchange
  • the process operates in reverse for the return leg of the call.
  • the call is destined for another VoIP enabled party they are routed to that party over IP (if no transcoding is needed, and NAT (Network Address Translation) traversal is not an issue, then the RTP streams will be sent directly peer to peer).
  • IP Public Switched Telephone Network
  • NAT Network Address Translation
  • the phones have two numbers—a conventional WWAN phone number and a ‘native’ number.
  • the owner can choose to use either or both of these numbers in various ways as described. The owner need not be aware of this as the initial configuration on purchase can map the two numbers together for all practical purposes. If the network provider had both an IP and a mobile range within their switching infrastructure the two numbers can be completely hidden. If the system is deployed by a network carrier who has number processing capability then one number can be issued to a customer and the number processed to route calls, however if deployment is required in the telephone system by a non carrier then the following description illustrates how the incoming number routing problems are solved:
  • SIP Session Initiation Protocol
  • SS7 Common Channel Signaling System No. 7
  • Truphone Landline VoIP call converted by media gateway to analogue voice locally to the receiving number and routed to landline by SS7 or SIP server.
  • Truphone Mobile VoIP call converted by media gateway to PSTN data locally to the receiving number and routed to landline by SS7 or SIP server.
  • the Truphone can identify whether the recipient is on the same network and in the same country as its own connection, and if so places a conventional phone call.
  • Landline TruPhone Call passes through SS7 or SIP server, which will native or first identify whether the call can be routed as VoIP, PSTN and if so route the call via the media gateway for number format translation and forward the data to the Truphone IP address.
  • the initial data packets are specially formatted to cause the Truphone to ring (SIP invite packets), and also cause the Truphone to wake as described. If not, hand the call on to the phone network.
  • Landline Truphone Handle call pursuant to conventional mobile call GSM procedures. number WWAN Truphone If the mobile operator has a suitably configured GSM (or GSM SS7/SIP server, then the call can be routed to UMTS number Truphone VoIP or Mobile connection according to voice) user preference, otherwise a conventional mobile Mobile call is made.
  • the call can be routed to UMTS number Truphone VoIP voice) Mobile Truphone Truphone End to end VoIP call, route established by P2P discovery techniques, if possible
  • IP network e.g. Bluetooth, UMTS, or Wi-Fi
  • the phone When placing an outbound call in range of an IP network (e.g. Bluetooth, UMTS, or Wi-Fi), the phone will search in layers in a sequence as follows:
  • IP network e.g. Bluetooth, UMTS, or Wi-Fi
  • Some of these layers may be skipped for an individual call, based on configuration information or previously discovered location/available connection information. If the phone cannot reach an IP network it will place a conventional mobile call.
  • FIG. 11 is a functional block diagram for the phone 1100 and PC 1127 when using a Bluetooth and/or Wi-Fi and data enabled phone as the radio transport mechanism and a PC with Bluetooth and/or Wi-Fi connectivity:
  • the PC is configured as a bridge.
  • Full duplex, bi-directional audio is implemented using the multi-media record 1102 and play 1103 systems that are resident within the phone.
  • Multi-media record system 1102 , play system 1103 , CODECS 1104 , and 1105 can all be implemented using a Digital Signal Processor.
  • a short or long echo cancel 1106 system may be implemented by subtracting a proportion of the play stream from the record stream with an appropriate time delay—such systems may be fixed or adaptive.
  • Comfort noise may be added by noise module 1107 so that the user is not disconcerted during quiet periods.
  • SIP authentication module 1108 is implemented by the user inputting their SIP user ID and password (which can alternatively be auto provisioned) and then placing a call by typing the phone number on the phone keypad or selecting it
  • audio is sent via the RAW/RTP module 1109 into the socket interface 1110 on the phone which is then connected either to the Bluetooth subsystem over RFCOMM (Radio Frequency Communications Protocol) module 1111 , or directly to L2CAP (Logical Link Controller and Adaptation Protocol) module 1112 or directly to the HCI (Host Controller Interface) 1115 , or in a Wi-Fi system to the MAC (Medium Access Control) and PHY (Physical) layers 1114 , 1117 , or in a 3G system to the 3G and hardware layers 1115 & 1116 .
  • RFCOMM Radio Frequency Communications Protocol
  • L2CAP Logical Link Controller and Adaptation Protocol
  • L2CAP communicates using HCI commands over a UART (Universal Asynchronous Receiver/Transmitter) connection to the Bluetooth ‘below HCI’ hardware 1118 which implements a radio connection to the PC 1127 hardware Bluetooth element 1119 which reverses the radio packetisation and delivers the packet to the HCI 1120 , L2CAP 1121 and RFCOMM 1122 layers and then onto a socket 1123 on the PC 1127 .
  • UART Universal Asynchronous Receiver/Transmitter
  • Bluetooth element 1119 which reverses the radio packetisation and delivers the packet to the HCI 1120 , L2CAP 1121 and RFCOMM 1122 layers and then onto a socket 1123 on the PC 1127 .
  • For a PC with Wi-Fi communication is made over the MAC 1118 and PHY layers of the Wi-Fi card directly to the Socket subsystem 1123 on the PC.
  • For a PC with 3G capability communication is made over the 3G and Hardware layers on the 3G card 1131 & 1130 .
  • a protocol stack on the PC then performs any SIP conversion necessary through SIP converter 1124 , bridges to external IP (using an IP or MAC bridge or Bluetooth to IP conversion) and sends the date to the Internet via the PC's Internet connection.
  • the PC may implement an authentication layer 1126 itself by way of a cooperative tunneling agent (CTA) or other means 1126 so that the server knows whose PC the call was routed through for billing and logging purposes.
  • CTA cooperative tunneling agent
  • the on-going Ethernet link 1134 , 1135 may itself be a wireless link. In this way, the PC has been configured as a Bluetooth to Wi-Fi repeater.
  • socket interface is multi-homed and connects to more than one transport layer simultaneously and the SIP/RTP interfaces can connect across the socket layer to multiple lower layers simultaneously.
  • An optional SIP conversion by module 1124 implements a subset of full SIP when talking to the phone so as to minimize code complexity and processor load in the phone.
  • This penultimate device in the IP routing chain is either a PC 1127 or an access point (not illustrated) and runs the MicroSIP to SIP translation function as follows.
  • the PC device is programmed to implement fully compliant SIP, RTP, RTSP while the phone 1100 can then implement a subset. For example, it can assume that all the packets are transmitted in order with no duplications, that the RTP headers have already been processed and removed leaving raw audio packets and that only the subset of SIP commands that it is programmed to deal with will be transmitted (the PC or access point will intercept and deal with all other protocol elements).
  • the PC forwards the stream to the Internet by way of its network controller MAC and PHY 1134 , 1135 .
  • the data will be routed to the proxy server or another client within the system.
  • the 3G (UMTS) path from the phone 1115 , 1116 reaches the Internet 1128 . This happens by way of the 3G Network which is not illustrated.
  • packets may route anywhere on the Internet. It is worth pointing out that because of this connection point via the Internet 1128 the phone is connected by two routes to the Internet and the PC is potentially connected to the phone by at least two routes: The WWAN route via the Internet and one or more WLAN routes through the radio layers 1132 and 1119 .
  • SPP Serial Port Profile
  • FIG. 13 compares and contrasts the typical configurations of the three main forms of converged phone solution; UMA, the proposed Invention, and CTP.
  • a UMA network Controller 1302 In a UMA system the mobile subscriber (MS) 1308 connects over WLAN 1309 through an IP broadband system 1310 to the UMA Network Controller (UNC) controller 1302 , 1311 using the Ub protocol specification.
  • This UNC controller performs the job of a base station controller (BSC) in a cellular system, handling the de-encapsulation of protocols and managing mobility and handoff in conjunction with the cellular core network.
  • BSC base station controller
  • the UMA controller 1302 interfaces with a set of subsystems within the core network HPLMN/VPLMN 1301 a to provide cellular coverage over WLAN. Roaming authentication is handled by way of an AAA proxy call between 1313 , 1316 to the home location register (HLR) 1315 a of a roaming subscriber in their HPLMN 1314 .
  • HLR home location register
  • the UNC If successful in authentication the UNC handles the signaling required to achieve handoff.
  • a gateway to the mobile subscriber controller (GMSC) 1305 is used to communicate either over SS7 1303 or SIP 1306 to other subscribers.
  • the subscriber mobile location controller (SMLC) 1300 can provide valuable information regarding customer location to aid in discovery of WLAN connectivity and provide mobility and location services.
  • the interfaces between the UNC and core network are:
  • packets initially take the same path as in a UMA solution, originating from an MS 1319 , traveling over a WLAN router 1320 via an IP connection 421 , but then arriving first at our server that supports SIP 1318 .
  • the packets themselves are simpler in format (see FIG. 26 ) than in a UMA system as less protocol encapsulation is required.
  • the SIP server is the main centralized control element in our system, interfacing with all the other systems and managing roaming, handoff and location management, but the handset can take control in a number of cases and obviate the necessity for a server, providing peer-to-peer capabilities that are not envisaged by UMA.
  • the SIP server in the invented system performs a number of tasks which are more fully described later in FIG. 15 .
  • the SIP server communicates via a media gateway function 1317 over SS7 or if the other system supports a SIP interface directly using SIP.
  • a SIP connection to a cellular core network GMSC (Gateway Mobile Switching Centre) 1326 is shown for example.
  • Authentication is provided using RADIUS (Remote Authentication Dial-In User Service) to ANY AAA (Access, Authorization, and Accounting) server and might include RADIUS proxy authentication calls to the cellular core network 1330 , 1333 or any other AAA server that the user specifies (including one that is part of the SIP server 1318 ).
  • RADIUS Remote Authentication Dial-In User Service
  • AAA Access, Authorization, and Accounting
  • the core network VPLMN (Visited Public Land Mobile Network) 1323 pictured is out of scope for our system, as is the UMA 1324 , UNC 1329 block, so these are not further described.
  • the WLAN router 1320 may contain a subset of the SIP server 1318 and media gateway 1317 , such that it is able to route calls directly to the PSTN locally.
  • the MS 1335 In a CTP system the MS 1335 must support CTP and the WLAN device 1336 must also support CTP—a standard Bluetooth profile.
  • This Bluetooth device must be paired with a transcoder 1337 , able to convert the Bluetooth CTP protocol either into SIP protocol or telephone system (POTS/ISDN) signals for carrying down regular telephone lines to the PSTN 1339 .
  • the WLAN Bluetooth transcoder may convert to SIP and route over an IP broadband connection 1338 to a SIP server 1334 which can terminate calls to the PSTN via a gateway or proxy SIP calls to further SIP servers.
  • this SIP server does not have end-to-end SIP connectivity with the MS 1335 which limits the call scenarios that may be handled.
  • Handoff involves passing the user to a different network.
  • Handover involves passing the user to a different radio antenna on the same network.
  • Non-seamless handoff is where:
  • Make-before-break is where packet streams are sent via two paths during handoff/over. Break-before-make is where there is a pause in packet sending as handoff is made. Break & Make is where there is such a short time between the break and make that the user does not notice it even though it is technically a break before make event. Pre-buffering and rate conversion techniques can be used to smooth over a break-before-make handoff so that the listeners do not hear an interruption, however there is a transitory increase and then decrease in latency which might be noticed by some users.
  • Case Voice call on Voice call 1460 Walk away from Wi-Fi 1 WLAN on WWAN AP where 3G is (IP Circuit) (IP Circuit) available, picks up UMTS data connection.
  • Case Voice call on Voice call 1459 Walk into Wi-Fi 2 WWAN- on WLAN coverage area call is Audio Circuit (IP Circuit) diverted to Wi-Fi and GSM call drops.
  • Case Voice call on Voice call 1458 Walk away from Wi-Fi 3 WLAN on WWAN- AP, (no 3G) reverts back (IP Circuit) Audio to GSM call via Circuit conference feature.
  • Case Voice call on Voice call 1454 Voice call on GSM 4 WWAN- on WWAN switches to voice call on Audio Circuit (IP Circuit) UMTS-VoIP Case Voice call on Voice call 1457 Voice call on UMTS- 5 WWAN on WWAN- VoIP switches to voice (IP Circuit) Audio Circuit call on GSM Case Voice call on Voice call 1464 WLAN becomes 6 WWAN on WLAN available again and call is (IP Circuit) (IP Circuit) switched back to use it.
  • IP Circuit IP Circuit
  • the phone will switch to transmitting the packets via WWAN.
  • the mobile device Prior to handoff, the mobile device will have communicated with the SIP Micro-Proxy in the Access Point or server to ensure that both WLAN and mobile data paths have connectivity, at least during the discovery and authentication process 1453 and probably from time to time due to handover or polling events, 1462 , 1463 .
  • a SIP Micro-Proxy supports a subset of SIP such that it can provide similar functionality to that of a full SIP server as now described.
  • the phone will be known to the server by two IP addresses which are resolved in the SIP server or SIP Proxy by a Network Address Processor (NAP).
  • NAP Network Address Processor
  • the phones IP address may remain the same via both paths even though the paths differ and ports may be used to distinguish the two streams. If neither the ports nor IP address differ the RTP systems should still cope with the packet duplication as this is a standard feature of the SIP/RTP protocol.
  • RSSI Receive Signal Strength Indication
  • BER Bit Error Rate
  • NSS Network Location Services
  • FIG. 12 is a call flow diagram showing one embodiment for handing off a call that was initiated as a WLAN call and will be switched to a WWAN-audio protocol call.
  • the SIP server supports conference calling function.
  • a call is in progress 1205 (the set up of which is not shown) between the mobile phone and the fixed phone:
  • the mobile phone 1201 is connected to the SIP server 1203 via an access point 1202 which is in communication with a PSTN phone 1204 .
  • All calls in the system are setup as a conference call so that when the SIP call is broken because the user moves away from the WLAN access point the onward call is held 1207 awaiting further parties to join.
  • This call is held for a programmable time period, typically 10 seconds, and a notification is made to the user that the call is handing off if handoff has not been made within 1.5 seconds. Greater than 1.5 seconds being an arbitrary definition of the boundary between seamless and non-seamless handoff that can be varied as required.
  • the WLAN 1215 and WWAN 1214 control, C and media, M channels are shown to the left of the mobile phone 1201 .
  • the mobile now sets up a call by one of two mechanisms. If a WWAN channel 1214 is available then using a SIP call method with invite 1208 acknowledge 1209 , 1210 mechanism the phone re-joins the conference call 1212 .
  • the media stream is re-made 1213 and a handoff between WLAN-VoIP and WWAN-VoIP is effected.
  • the phone dials using the native voice calling capabilities of the phone (WWAN-Audio) and joins the conference via the PSTN.
  • the media stream is transcoded from the PSTN and re-joined to the conference bridge.
  • the dial up procedure takes 2-7 seconds and so will rarely be seamless but in some networks high speed connection is available and seamless connection can be achieved.
  • a make before break alternative can be used where WWAN-IP is available such as in UMTS.
  • WWAN-IP is available such as in UMTS.
  • a duplicate audio path to/from the proxy via another IP route is created when hand-off is looking likely, then when hand-off is confirmed, the handset switches over to the new audio-path and disconnects the old one. This does not require any re- invitation or conferencing as the proxy is the client as far as the server is concerned and so never changes its IP address.
  • Case 2 depicts the scenario of handing off from a WWAN-Audio to WLAN.
  • a call is proceeding over the WWAN-Audio circuit typically a GSM call.
  • the first step in handling this handoff is to determine the availability of a WLAN AP.
  • the phone will acquire a WLAN resource through the discovery procedure. Transferring the call to WLAN will depend on the nature of the two phones involved in the call and the nature of the carrier network that started the call.
  • WLAN-IP 1460 allows for the simplest architecture it is not always available.
  • WWAN-IP connections such as UMTS are only available in a limited number of countries and areas within those countries.
  • Other WWAN-IP technologies such as EDGE do have coverage but data rate and latency are not useful for making a voice call on presently deployed systems.
  • the SIP server is used as a conference bridge to mediate handoff to a WWAN-Audio-only technology, such as GSM:
  • Handset initiates handoff to WWAN-AUDIO: While making a VoIP WLAN call the signal conditions for data transmission become unacceptable.
  • the SIP server is programmed to hold all calls for a predetermined time limit if streaming is interrupted and to allow all calls to be conference calls. (A SIP server consumes almost no resource to allow a call to be a conference call but there is a statistical calculation required of the media gateways to determine the number of PSTN/PBX connections that might be active at any time.)
  • the phone application optionally reads the GSM RSSI to determine whether a handoff is possible, if not simply terminating the call. Once the phone determines that a handoff is possible it calls the conference call phone number, and the user is automatically connected to the other party in the call.
  • a smart phone is capable of calling a conference number and entering a DTMF password without user intervention and indeed totally silently so as to give the impression of an automatic relatively or totally seamless handover.
  • conference call function being used there are in fact only two parties: the caller and the receiver.
  • ‘Call-in handoff’ (where the GSM call to the conference bridge is initiated by the handset) is particularly attractive from a commercial point of view as the calling leg is initiated by the calling party using their normal mobile phone account and will be billed to their regular phone bill. There is therefore no additional cost incurred by the conference bridge owner. (In fact they will generally receive a call termination fee.) There is still an attractive price benefit for the user as the conference call number will generally be a local number chosen from a small table of least cost routes and the outward leg from the conference bridge will still be using VoIP call.
  • the conference bridge is implemented by the SIP server so that an appropriate billing record can be generated for either the call as a whole, or the non-GSM portion of the call—the remainder being handled by the customer's normal billing mechanism.
  • the GSM call must then in general be dropped prior to reconnection of the VoIP call as the GSM subsystem must release resources to the VoIP system.
  • WLAN, UMTS and GSM could have simultaneous use of the phone's resources: the described scheme caters for both.
  • Case 4 This case is conceptually similar to case 2. A user on an audio call will switch to VoIP using the same mechanisms as explained in case 2 are available with of course the proviso that the call is re-routing to WWAN-IP not WLAN-IP.
  • Case 5 This case is conceptually similar in operation to case 3, in that a handoff is made between a VoIP call and a voice call with the same techniques being applicable. However in this case the phone needs to make a regular WWAN-Audio call, for example a GSM call in order to rejoin the conference bridge and maintain the call.
  • a regular WWAN-Audio call for example a GSM call
  • Case 6 is the inverse of case 1.
  • a user making a call over WLAN-IP moves out of range and the handset switched to WWAN-IP. This is a straightforward switch as authentication remains valid and the call path in the higher level stack needs no change.
  • the units can flip back and forth freely between the cases and the Network Address Processing element in the server (or the access point or repeater if implemented there) will ensure that the user appears to the rest of the world as if they are not moving between networks.
  • Make before break, or make and break can be implemented to make the user experience optimal and indeed both paths may be used in poor signal conditions as a form of multi-bearer diversity signaling.
  • WLAN ⁇ WLAN Wi-Fi/Bluetooth
  • the above handover cases are all capabilities of the invented system and allow the user to walk through a large space where a single access point can not provide complete coverage. Since the protocol stack is ‘all IP’ and communicates over a general socket layer, a handover between Bluetooth and Wi-Fi is possible.
  • the SIP proxy can cope with two IP addresses or endpoints connecting to the same caller and handoff is a matter of beginning, sending packets on one bearer, and ceasing on the other. Packets can be sent over both bearers to give diversity reception implemented at the IP level and in devices that can connect to more than one AP, either Bluetooth or Wi-Fi then multiple packet streams can be sent to multiple AP's if desired. Another benefit of being able to switch from Bluetooth to Wi-Fi is to use the extremely low power capabilities of Bluetooth to preserve battery life.
  • Wi-Fi and Bluetooth With both Wi-Fi and Bluetooth in normal operation, standard discovery, pairing and authentication need to be executed as mobile devices move from AP to AP. Bluetooth reconnect takes 1.2-3 seconds if the devices have been pre-paired and up to 30 seconds if not.
  • FIG. 15 shows one or more servers within the system providing a range of telecommunications functions including call handling and termination.
  • a call originates on the mobile phone 1512 and connects to the server 1500 via wireless connections WLAN 1509 and WWAN 1519 and an Internet connection 1510 .
  • the system comprises three main parts: a Media Gateway 1522 that handles the real time elements of media streams, a server 1521 that handles signaling commands, and an application 1511 that contains the logic and communicates with databases 1505 , 1506 , 1507 and other external sources of information.
  • the signaling and streams are handled by the server as follows.
  • the phone 1512 initiates a search for WLAN resources 1519 and locates them. Some resources ‘cloak’ and so the phone may probe using a system ID such as an SSID from its access rights table, other resources broadcast their availability publicly, for example by broadcasting their SSID in a Wi-Fi system. Once located the phone checks its local table of access rights and uses the appropriate logon authentication for this AP. The table is maintained in least cost order by updating from time to time from the LCR (least Cost Routing) data store 1507 .
  • LCR least Cost Routing
  • SSID and WEP Wi-Fi
  • Wi-Fi either or both the SSID and WEP (Wired Equivalent Privacy) keys form keys for access to the system and these are provided automatically by the system—Advanced Encryption Standard (AES) and Temporal Key Integrity Protocol (TKIP) may be used in place of WEP.
  • AES Advanced Encryption Standard
  • TKIP Temporal Key Integrity Protocol
  • This table of access rights is updated from time to time with information that is relevant to the approximate location of the user and their behavior pattern so that only a subset of access rights needs to be stored at any one time in the mobile device. If the access rights table does not include the WLAN access point in its table then the phone sends a request via WWAN for an updated access rights entry for that resource giving as much information as possible to narrow the request and minimize the data sent. If no access information is available then a service ticket is generated according to the distributed discovery description below.
  • a service ticket is automatically sent to the Access Point Location register 1505 with as much detail as possible, ideally using WWAN network location services or global positioning system (GPS) location information to exactly pinpoint the AP.
  • the central server can then take a variety of actions to contact the radio resource and recruit them to the system.
  • An automated method is available by creating and publishing a naming specification that the AP resources may use that allows owners of AP's to give the AP a unique address that can be resolved to the email address of the owner.
  • the distributed discovery method is an automatic system for users to cooperate to grow the network and is akin to other distributed computing methods. For cooperative access points that want to ensure security using link keys those keys are provided over the WWAN encrypted connection to authenticated users.
  • Truphone Zones systems are configured to allow free access to the IP address of a Truphone server on the understanding that revenue is derived by the AP owner from a share of calls rather for timed access to the network resource.
  • the Truphone server logs the IP of the access point from which the call packets originated and the client may give the IP address and system ID of the system that allowed it access for added security.
  • the user has been authenticated to the radio resource, encrypted that link if desired and achieved access to network resources, either the Internet or a restricted subset of address ranges or a local address range for corporate users residing within their offices.
  • the user desires to make a call and the mobile device signals to the application server.
  • the application server checks its active subscriber register to determine if the user is in good standing (no blocks on accounts, credit available or credit worthiness still active), again Radius proxy authentication may be enacted for users that are not ‘home’ on this server and whose primary records are held elsewhere.
  • the least cost route database will then use available information from the Access Point Register, Location information provided by the phone and IP address range information to form a least cost path.
  • the priority for routing is:
  • the Media Gateway 1523 is involved in a number of scenarios:
  • Mobility Management (Handoff, handover) is handled in the Application Server 1511 which controls the Network Address Translation and mapping functions 1523 and possibly other functions such as codec conversion, echo and noise cancellation and packet repair as needed.
  • the CODEC conversion module 1524 allows real time conversion of packet streams from one CODEC such as AMR-WB to another such as G.711.
  • the Packet Repair module 1526 provides for jitter buffering, duplicate packet removal, missing packet re-request or masking, and packet re-ordering. Duplicate packet removal is particularly important when make before break seamless handoff is used where the packets must be de-duplicated in conjunction with the NAP function as duplicate packets may not have the same IP address and port.
  • AMR (Adaptive Multi-Rate) CODECs are especially used in such systems as they have very good packet loss masking characteristics and good quality over lossy radio systems.
  • packets can be interleaved and transmitted multiple times to extend range while minimizing interference.
  • QoS Quality of Service
  • Echo and noise cancellation module 1525 is often implemented in the end points but in circumstances where the handsets do not have this function or have a limited function it may be an advantage to implement a short and particularly long echo cancel function in the Media Gateway.
  • CODECs may be renegotiated during a call if bandwidth conditions change but a benefit of this invention is that a low data rate CODEC is chosen initially and so CODEC renegotiation is minimized.
  • the SIP server can implement a range of added value voice and data services once the basic link has been established.
  • the access table method described in FIG. 6 and background pre-pairing we ensure that the most handovers are pre-paired unless there is a system failure in which case an automated trouble ticket will be created.
  • Buffers and rate converters can ensure no voice is lost in these circumstances by temporarily buffering a large amount of data. Any ‘catching up’ required can be implemented using a speech rate converter. (A speech rate converter allows 5 seconds of speech to be played in 4 seconds of time without changing the pitch of the voice. It does this in simple form by throwing away a percentage of the waveforms while maintaining continuity at the zero crossing.
  • Wi-Fi Wireless Fidelity
  • Using the access table and a context translation mechanism allows Wi-Fi to handoff quickly even when there are different makes of Wi-Fi controller involved in the system.
  • the handoff/handover cases apply in a broadly similar manner to the situation where a person has traveled internationally but there are some subtleties in the current UMTS system there are some caused by this.
  • IP network is homogenous internationally. That person will have a source IP address in a number range that is associated with the place you have traveled to. (IP address location can be ignored but may be used as a cross check for fraud.)
  • WWAN data in current schemes is carried by the roamed to network internally but transited back to your home network for termination.
  • the person's IP packets will exit from a GGSN in the person's home country and will have an IP address in a number range that is associate with that person's home network.
  • WWAN audio will be carried and terminated in the network that is roamed to. Therefore it will not travel through home networks audio gateway. Any SS7 signaling to control handoff between WWAN-AUDIO when traveling internationally will need to be sent to and accepted by the network that has been roamed to. Any least cost routing tables and methods must take into account the International charging issues.
  • the state table in FIG. 14 represents the in call handover and handoff states. A more complete list of the states is shown below:
  • a message needs to be sent to the SS7 system of the originating or terminating telco server to indicate that it should reroute the call to the invented proxy SIP server to implement roaming.
  • These commands can use standard follow-me methods that are more fully described in the literature and will not be described here. If the 3 rd party telco server has a SIP interface then this may be used in preference.
  • FIG. 16 shows different scenarios for usage of the invented system in the home.
  • the Truphone enabled phone 1602 connects directly to a Bluetooth dongle 1603 , which is connected to the study PC 1606 , which in turn is connected by Ethernet or USB to an ADSL modem (not shown).
  • the PC must be turned on for the Truphone to work, range is not optimal, but the cost is minimized.
  • Phones 1607 and 1609 may be out of range of the dongle, and would be limited to making a conventional GSM call, or a UMTS VoIP call.
  • the study PC 1606 is connected to an access point 1605 .
  • This may either be a conventional Wi-Fi enabled ADSL or cable modem, or a specifically Truphone compatible device with additional Bluetooth and mesh networking capabilities. In the descriptions below, the latter is assumed. The PC does not have to be switched on in these scenarios.
  • the Study PC 1606 would normally be connected to either a Bluetooth dongle 1603 or to an access point 1605 , although for completeness both are shown in this diagram.
  • the device can be the first hop on a multi-hop or subsequently star network topology and can provide mobile IP fix up at the radio level or the IP level or implement mobile IP as per any one of the IETF RFCs.
  • FIGS. 17 and 18 illustrate a repeater in isometric and orthogonal projections.
  • FIG. 21 illustrates the repeater in exploded view showing the attachment of a cable, interchangeable plugs and a wall mounting bracket.
  • the repeater is approximately the size of a UK mains adapter in width (2 inches, 50 mm) and the length of a PCMCIA card (4 inches, 100 mm) with a depth in the predominately flat section approximating that of PCMCIA card (1 ⁇ 4 inch, 5 mm) and then increasing to accommodate the connectors and main plug unit.
  • the optional extender cable length is approximately the head height of a human being (5 feet, 1.5 meters) and the wall bracket is sized to sit discreetly behind the unit when wall mounted.
  • the device comprises a mains plug plus a rectangular form that houses the PCB(s) with Antenna mounting and one or more connectors.
  • the form factor of the device solves several problems:
  • FIGS. 19 and 20 illustrate a set top box in isometric projection.
  • FIG. 22 illustrates the set top box in exploded view showing the internal arrangement of components and the attachment of antennae.
  • the set top box fits within a rectangle that is approximately the same size as a regular full size hi-fi unit. (12 inch wide, 8 inches deep and 4 inches high, 300 mm ⁇ 200 mm ⁇ 100 mm).
  • the device form factor design to solve several problems.
  • FIG. 23 is an electronic block diagram of a series of components that would form a system that allows voice, video and data wiring for the home, an office or a hotspot. Subsets of this block diagram can be implemented to provide a low cost repeater function, a low cost home wiring function, a set top box or a wireless Internet access point with ADSL connection.
  • the minimal repeater contains a Bluetooth radio transceiver system 2310 and Wi-Fi radio transceiver system 2312 with co-existence interface between them to reduce interference and de-sensitization issues to a minimum.
  • the systems have a direct interface to Flash 2314 or similar memory that contains their program and settings and may also route out their internal USB ports to an external connector.
  • More complex repeaters are possible which incorporate a Host Transceiver 2315 element that includes a Microprocessor, Flash ROM and RAM 2314 for program storage and execution and provides Ethernet 100-Base-T capability 2316 .
  • the device pictured has 100-Base-T and ADSL but the ADSL may not be used in lower cost implementations of the repeater or a simpler chip may be substituted).
  • Optional SLIC Subscriber Line Interface Circuit
  • POTS connector for POTS interface telephone device can be added in conjunction with a Voice processing DSP so that DECT (Digital Enhanced Cordless Technology) handsets or traditional wired telephones can be included within the system.
  • DECT Digital Enhanced Cordless Technology
  • the repeaters most complex version envisages is a version supporting 802.11, Bluetooth, USB, 100-Base-T, POTS. Providing translation and bridging between these interfaces. This product would enable a home, office or hotspot to be enabled for wireless VoIP in the vast majority of scenarios.
  • the repeater could either be used as the primary access point device—as a wired to wireless repeater—with wired connection to incoming data connection, or as range extending repeater that forms a backbone network over Wi-Fi back to the primary connection point and connects to local devices such as handsets, PDAs and laptop computers that use either Bluetooth, Wi-Fi or both.
  • Multi-country PSU module with optional cable extension, driver disks and packaging are not pictured but would be included within a compete package.
  • the wall mounting bracket providing optimal wall mounting or it may itself be bolted to a universal joint mounted on the wall to provide an ability to move the antenna direction.
  • APs contain all the blocks and components from the repeater above plus the addition of ADSL Host Transceiver 2315 with ADSL line interface hybrid 2321 , ADSL micro-filter 2329 , diversity antenna configurations, external antenna connectors, DAA (Data Access Arrangement) 2336 , emergency service power fail fallback routing for POTS 2341 , SIP proxy, firewall, AntiVirus and standard home SOHO features. Used in the primary data connection position in the home or SOHO network, it provides for wireless connections to devices (handsets, PDAs laptop PCs) or to repeaters as described above. A VoIP client and server could be introduced that would allow for direct termination to the PSTN or inclusion of the POTS telephones into the system.
  • Set-Top Box or Media Centre includes all features of the Access point plus digital audio and video send and receive for home media networking with appropriate connectors for linking to common AV components.
  • IRDA transceiver for remote control extension.
  • Commonly available components could be added, such as hard disk drives and CD and DVD drives to offer complete home multi-media centre features.
  • a Phone may be Built Using the WiFi/Bluetooth Coexistent System Described.
  • a CODEC chip, speaker and microphone must be added to the bill of material.
  • the benefit of having a cordless phone incorporated into the system that includes coexistence is to further maximize system capacity while keeping to absolute minimum power consumption.
  • FIG. 24 illustrates the Network Address Processing required to process IP v4 RTP datagrams for the mobile roaming, handoff and handover.
  • the RTP datagram 2400 is constructed in the normal way with IP, UDP, RTP and Data headers, hereafter referred to as an RTP packet.
  • each RTP packet contains source and destination information for both IP address and port—together known as a socket.
  • the phone sends RTP packets to one or more sockets during handoff, handover and other events and these packets may travel over WWAN 2402 or WLAN 2404 infrastructure prior to reaching the Internet and our server.
  • RTP packets 2404 and 2406 may arrive from two different sockets and these need to be processes and de-duplicated into one stream prior to traveling on to the media gateway 2408 .
  • An important factor is that both the WLAN and WWAN paths will need authentication to allow streams to enter the SIP server and in addition the user name password SIP address should be authenticated against the SIM address in the phone.
  • FIG. 25 shows configuration of a basic product.
  • a user can enable their home PC(s) 2506 , 2507 as ‘micro-cells’ capable of connecting to their mobile phone 2505 to the telephone system (PSTN or SIP network or Proprietary Networks) by way of the Internet 2508 .
  • the kit comes in a blister pack and contains:
  • FIG. 26 shows microSIP to SIP translation.
  • the AP may need to implement a transcoding function to:
  • FIG. 27 represents a state diagram and physical schematic for power management and service discovery in a WLAN, WWAN system.
  • the handset can be in one of three coverage zones: WWAN only 2705 , WLAN 2707 only or an overlap zone 2706 .
  • Power Management involves cycling between the different discovery and active states. If a handset comes into an overlap zone it will look for resources due to three possible stimuli; a timer, location information received from the WWAN system (or local GPS data although no phones currently support this), or any touch by the user on the UI provided that an update has not recently been undertaken.
  • the phone then moves into discovery mode 2709 where it will first use information provided by any location message, such as cell ID or latitude and longitude, then search for known devices based on location information and any movement vector information it has, and finally go through a full unknown device scan. At the end of this phase it will either succeed and move to 2710 ‘ready’ or fail and return to sleep until next woken. If the phone has good battery it may continue with further searches once the first WLAN AP has been acquired so that it can populate its WLAN access table with a complete map. This search does not have to be exhaustive as it is likely to be undertaken reasonably regularly so eventually a full picture will be built up. Any discovered APs are notified to the home server to keep the map up to date. Also other phones will be searching and cooperatively building the map.
  • any location message such as cell ID or latitude and longitude
  • the handset If the AP is lost the handset returns to its search pattern in 2709 . After a period of time the handset may return to sleep state 2708 but it now remembers its AP table and can quickly wake and re-acquire the AP. It is undefined currently whether the WLAN RF circuitry can be woken from sleep state by a message or whether the AP receive RF is fully off.
  • a deep sleep state 2710 can be entered where the unit no longer searches for WLAN, but can be woken by receiving a message or a UI command.
  • FIGS. 28 a - e illustrate the procedures carried out in both the handset and AP when making a call for different scenarios. These diagrams are representative of all the calling procedures possible and are by no means exhaustive.
  • FIG. 28 a and b show the instance where the SIP and RTP clients are both implemented in full on the AP.
  • FIGS. 28 c and 28 d show the situation where the SIP and RTP clients are both implemented in full on the handset.
  • FIG. 28 a illustrates the calling procedure using a very simple system on the handset, with the more complicated procedures of SIP and RTP being carried out wholly on the AP (see FIG. 28 b ).
  • the process starts when the user selects the number that they wish to call, for example, by entering it manually 2802 or selecting it from the phonebook of the handset 2801 .
  • the phone number then needs to be passed to the AP to make the call but this can only be done once a connection to the AP has been established. It is therefore necessary to check which AP the user wishes to connect to so, if they have not selected one before, they must do so now before a call can be made.
  • the handset connects to the AP in step 2806 and sends it the phone number that the user wishes to call in step 2807 .
  • the handset begins to send PCM audio data from its audio in stream (usually from a microphone) to the AP in step 2815 and to play PCM audio data received from the AP to the audio out stream (usually an earpiece or headset) in steps 2812 and 2814 . This continues until the call is hung up, either by the user 2810 or the AP in step 2813 , when the streams will be stopped and the connection with the AP dropped.
  • FIG. 28 b illustrates the procedure on the AP that corresponds to the handset procedure in FIG. 28 a .
  • the process starts when the handset has connected to the AP and sent the phone number that the user wishes to call in step 2822 .
  • the AP then connects to, and authenticates with, a SIP server using the settings for the AP in step 2823 or, if the system allows various users to connect via any AP, settings it receives as part of the connection procedure with the phone (for clarity, not shown).
  • the AP will then convert the phone number into a SIP INVITE command and negotiate with the SIP server to get an endpoint (usually a media gateway connected to the PSTN) for sending and receiving VoIP RTP packets in step 2824 .
  • endpoint usually a media gateway connected to the PSTN
  • a connection is established in step 2825 and the call can proceed.
  • the AP takes the PCM data from the handset in step 2828 and converts it to RTP packets in step 2831 before sending it on to the RTP endpoint in step 2836 .
  • Audio is simultaneously received from the RTP endpoint in step 2827 and converted in the reverse manner in step 2832 before being sent to the handset in step 2835 .
  • This exchange of audio/RTP data continues until the call is hung up, either by the handset in step 2829 or by either of the SIP or RTP endpoints sending a SIP BYE command in step 2830 , and the connection to the handset is dropped.
  • FIG. 28 c illustrates the procedure on the handset where SIP and RTP are both done wholly on the handset. This is a similar procedure to that in FIG. 28 a , but all of the SIP negotiation and RTP (de)packetisation from FIG. 28 b are moved from the AP to the handset.
  • the diagram should be self-explanatory with reference to the explanations of FIGS. 28 a and b.
  • FIG. 28 d illustrates the procedure on the AP that corresponds to the handset procedure in FIG. 28 c .
  • the AP is now a simple pass-through server—effectively a proxy. It performs IP packet “fix-up”, until the call is hung up, by changing the source and destination addresses in order that any messages sent to it may be forwarded between the handset and the SIP/RTP endpoints
  • FIG. 28 e illustrated the peer-to-peer discovery process by which a handset attempting to make a call first determines whether it can connect directly to another handset at the radio layer 2868 , if this is not possible it determines whether a connection on the LAN 2869 is possible, then checks whether the other party can be connected by an all IP SIP routing 2870 and if these all fail terminates the call via the PSTN 2871 . In this way the client always attempts to make a peer-to-peer connection if possible. In particular when checking on the LAN segment a check of each cooperative PC is also made to see if it has a bridge to a 3 rd party VoIP service such as SKYPE or MSN.
  • SKYPE 3 rd party VoIP service
  • FIG. 29 illustrates the security and authentication procedure for a wireless LAN connection to the system.
  • a phone 2900 connects to a WLAN AP 2901 to a broadband router 2902 that contains a firewall and access control system, then via broadband connection to our SIP server 2903 which may authenticate directly or via a proxy 2904 .
  • a gateway to the PSTN 2905 is provided allowing calls to be made to the PSTN 2906 .
  • the phone looks for a WLAN AP resource using its radio search capability and making use of any access permission information stored in its memory. If access is allowed the phone will authenticate to the AP and obtain a local IP connection.
  • the radio layer connection may be protected by WEP for Wi-Fi APs and Bluetooth Encryption for Bluetooth APs.
  • the IP segment of the connection is only physically protected by default.
  • the phone will then request external access from the router at the edge of the LAN. This may either ask the SIP server 2903 which may proxy the authentication to one ore more chained AAA servers, may grant the request itself from its local authentication table or the phone may bypass the SIP server and request IP access directly from a AAA authority. In this case two authorizations will be required: one to the Internet access and one to the SIP access.
  • These authentication messages use MD5 encryption and security is provided at a transaction level.
  • the system may then optionally use encryption on either or both the SIP message 2909 and the RTP VoIP streams 2910 .
  • the phone sends a SIP Invite message to the SIP server which may check on a transaction by transaction basis with an external AAA server 2904 that the person is in good standing to make a call. If call rights are granted then VoIP call is initiated. Note that the final leg of the call 2911 on the PSTN circuit is only protected through physical security.
  • the at risk elements in the system are as follows.
  • the authentication interchanges have been illustrated in the diagram with a simple request/acknowledge transaction.
  • a challenge response mechanism such as MD5 is used.
  • the mobile subscriber requests access, receives a challenge message, responds to this message and then receives an authentication message.
  • the challenge and response are matched using public key encryption techniques to prove that both parties have a shared secret (username/password) without transmitting that secret password over the link.
  • Subscriber Identity Module SIM may be used to provide authentication either by performing the authentication using the SIM ID transported over WLAN layers or by requesting username password using the SIM ID as authentication for an initial transaction and thereafter using the user name password combination.
  • the 3 rd Party Authentication 1136 and SIP translation (control and media) 1137 are used. These provide a method for interconnecting at the PC level with services such as MSNTM or SKYPETM.
  • the 3 rd party interoperability element receive the data and control streams from the phone and perform further authentication and media translation. Additionally this PC 3 rd party interoperability may implement the session bonding roaming and handoff protocols described in FIG. 24 and the cooperative tunneling agent which is described above.
  • FIG. 30 shows that the range of WLAN systems and indeed all radio systems depends on the link budget and the attenuation caused by intervening materials.
  • the following link budget and sensitivity calculations are given for Bluetooth devices but very similar calculations apply to WLAN devices.
  • the maximum sensitivity achieved by Bluetooth devices today is:
  • Ranges within WLAN are generally quoted at 1 bit in 100 error rate (10 ⁇ 2 ).
  • the error rate rises with range as the signal to noise ratio drops. (A square law for free space and a power of 3.3 for in building.)
  • the audible perception of this error rate will depend on the probability of packet loss due to this bit error rate, the redundancy level of packets and the audible perception of a lost VoIP packet given the ability of CODECs to mask lost packets.
  • the proposed repeater is constructed to optimally use 802.11 g with advanced diversity reception to maximize in building transmit range and act as a backbone link so that Bluetooth can be used to make the final short hop to the handsets. This obviates the need to use Bluetooth to repeat itself as it is complicated because of the master/slave role switching that would be needed.
  • the function of this repeater is to translate packets from one protocol into the other and is more fully described in FIG. 22 .
  • Encoding Audio using AMR CODECs that have missing packet masking capability Encoding audio using small AMR codec so that VoIP packets can be transmitted with multiple copies without overloading the radio channel. Connected using UART giving theoretical 961 kbaud an ACL link is nominal 721 kbps. VoIP using AMR 4.85 can use all 7 channels while still using less than 10% of the link budget thus giving better range and or more channels.
  • a side effect of using AMR to encode voice is that few packets are sent for a given call.
  • Each Bluetooth packet represents a potential inference event for Wi-Fi and reducing these events helps with co-existence.
  • Finally using these digital methods with error correction and detection allows little or no interference to breakthrough into the perceived audio signal as compared with high bit rate CODECs that do not have error correction such as Bluetooth SCO.
  • Bluetooth chips that have been created with coexistence capability toggle their coexistence pins for each packet they transmit.
  • Full Diversity schemes for Bluetooth can be achieved but are complex.
  • a simple scheme that will increase the effective range of VoIP calls is as follows: Transmit each VoIP packet in a packet that fits exactly inside one Bluetooth air interface packet. Transmit multiple but odd-numbered (e.g. 3,5,7) copies of each VoIP packet,and toggle the antenna switch for each Bluetooth packet transmit signal. You are then guaranteed that each VoIP packet will be transmitted at least once on two different antennas in the diversity scheme.
  • RSSI Signal to Noise ratio
  • VoIP using AMR 4.85 is implemented so that all 7 channels can be used while still using less than 10% of the link budget thus giving better range and more channels from a given Bluetooth access device. It is advantages that this CODEC is used end to end in the system to provide a high MOS. This compares favourably with the current situation where the audio link is at 50% utilisation (721 kbps) using 2 Bluetooth SCO links giving little headroom for error tolerance.
  • FIG. 31 illustrates the system elements to permit co-existence between Bluetooth and Wi-Fi systems.
  • WLAN systems in the unlicensed bands have traditionally been free to choose their coding schemes. This has resulted in the two main schemes, Bluetooth and 802.11 having poor intrinsic coexistence features.
  • Bluetooth works by frequency hoping across the entire ICM band. While 802.11 divides the ICM band into 14 sections and picks one particular band for its spread spectrum coding. Thus each time a Bluetooth frequency hop lands in the chosen 802.11 band both systems suffer interference and loose data.
  • Coexistence can be achieved by adaptive methods and proactive methods. The adaptive method used today is for Bluetooth to sense the interference levels on each of its 79 channels and pick those channels on which there is no interference for its hopping sequence.
  • the Bluetooth device has to learn the sequence which takes time.
  • An improvement can be achieved by sending a signal from the 802.11 hardware to the Bluetooth system to tell it actively what frequency band the 802.11 has chosen. This has the advantage that interference avoidance is immediate.
  • a further improvement can be achieved by actively signaling Bluetooth activity to the Wi-Fi subsystem. This scheme provides considerable interference immunity but further benefits can be achieved in our system as the repeater device has knowledge of both Bluetooth and Wi-Fi timing.
  • the power saving beacon schema of 802.11 allows the repeater device to know when the next transmission from a remote device will be received.
  • This time can be signaled to the Bluetooth subsystem to instruct it not to transmit during this time slot and so avoiding interference with remote 802.11 APs as well.
  • the beacon time wake up is intended to give the system enough time to start up from its low power state, we want to ensure that the system does not start transmitting in the beacon time.
  • FIG. 31 illustrates the stack and timing arrangements for this system.
  • Beacon wake events 3115 , 3116 occur with an interval between them where the AP can indicate that it has queued data for the mobile device.
  • the mobile device is programmed to wake prior to the beacon time slot 3117 , 3118 , at time W and begin listening, time W+T for signals from the AP.
  • the mobile device either takes action based on some information it received during the beacon or sleeps again after shutting down its systems, time S.
  • the beacon time hold off when Bluetooth may not transmit is the TX time indicated in the diagram and so the system needs to keep track of time W and S so that it may transmit in this time.
  • Time W wake
  • TX beacon transmit
  • S going to sleep
  • Interval sleep, power down.
  • the repeater functionality is as follows.
  • the 802.11 subsystem 3107 and the Bluetooth Subsystem 3108 interface to the higher levels within the repeater and to a coexistence means 3104 that uses channel information, Bluetooth activity information and the beacon time (Along with an assessment of the startup time) to holdoff Bluetooth transmissions and so avoid interference with the AP.
  • the AP is not shown in this diagram but would be any standard 802.11 access point:
  • the repeater is located within its coverage.
  • the lower level stacks for 802.11, MAC 2212 and PHY 2213 are explained previously within the patent and have the same function.
  • the Bluetooth stack elements, shown in schematic form 3109 , 3110 , 3111 , 3114 are also explained mode fully elsewhere.
  • the upper level functions of the repeater are to communicate with the subsystems using a driver 3103 , control the hardware 3102 , extract the data to the IP level 3101 and bridge the data streams together 3100 . Further control functions such as setup and configuration may also be provided but are not illustrated.
  • mobile devices, mobile subscriber and endpoints are used interchangeably and usually refer to a mobile phones with WLAN capability:
  • a general purpose computing device that has been modified to implement a phone function using wireless WAN or wireless LAN protocol can be substituted.
  • An access point (AP) or access node or PC that has radio connectivity and appropriate software to allow it to act as an access point may be substituted for each other.
  • WLAN is used to generically describe any wireless local area network including, but not limited to, Bluetooth, 802.11, DECT and Zigbee.
  • UMTS is referred to in the description, but any wide area mobile data might be substituted such as GPRS, EDGE, TETRA et. al.
  • Smartphones allow complex reprogramming of their functions using downloadable software: It is perfectly possible to use the aforementioned techniques in general purpose mobile phones by reprogramming their firmware or implementing the features in hardware in each case achieving an improvement in performance while reducing flexibility. Although this means a degree of integration and test is required the integration is less onerous as it occurs at a higher level within the stack.
  • the caller is the party that does authentication or roaming but it should be noted that since the system can accept incoming calls the receiver may be the active party and indeed if two members are both using the system both the caller and the receiver may handoff, roam and authenticate.
  • One possible system has a Bluetooth enabled mobile phone connected by way of a Bluetooth enabled laptop computer to the public Internet terminating at a SIP server which is able to make calls to the PSTN via a media gateway. All IP and protocol translation is handled within the PC making a server based SIP proxy unnecessary. All handoff and handover may be executed by placing SIP server capability in the handset and PC.
  • SIP server describes a general purpose Session Initiation Protocol servers which might be a SIP server as defined by the IETF or in implementation by JSR116 but substitution of an alternative SIP server such as one based on Global IP (a proprietary specification) or even the older H323 protocol are all possible. Such substitutions and the necessary modification of software would be possible for one skilled in the art who had understood our description based on IETF SIP.

Abstract

A system for providing handoff for a mobile devices comprising a mobile phone programmed to automatically handover between differing data bearers and to optimally detect those bearers in a roaming environment keeping power consumption to a minimum. Repeating means for these mobile devices to extend the range of coverage and the protocol for that coverage.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application is a continuation application of U.S. application Ser. No. 11/129,184 filed on May 12, 2005. U.S. application Ser. No. 11/129,184 is a continuation in part of patent application Ser. No. 09/706,406 filed Nov. 3, 2000. The entire disclosure of both are hereby incorporated by reference.
  • FIELD OF THE INVENTION
  • The present invention relates to a system that provides VoIP over wireless LAN and WAN networks.
  • BACKGROUND OF THE INVENTION
  • The Internet came into being in its current form in 1983 when all the computers connected to ARPANET—a military network—began using the same communication protocol. In 1986 ARPANET became NSFNET in a bid to link the USA's supercomputers. E-ail began to be commercially available in 1990 at much the same time that Mosaic—the first worldwide web browser—became a useful product. The Internet comprising mainly the WWW (world wide web) and e-mail is now an extremely important business tool.
  • The world is now networked, much of this provided by TCP/IP (Transmission Control Protocol/Internet Protocol) but ATM (Asynchronous Transfer Mode) is still dominant in telecommunications. Most major companies have access to the Internet and the Internet backbone runs thru much of our environment. This infrastructure is made up from largely fixed, rigid connections; wires, routers, switches and similar.
  • Human beings tend to move around when engaged in work and leisure. An easy way to connect to the fixed network is needed for these mobile users. Mobile users are commonly envisaged as people using a cell phone or other radio device, but for our purposes a ‘mobile user’ is anyone away from their fixed home base.
      • 1. Wireless connections are inherently expensive as they use a rare resource—radio frequency spectrum—and require large infrastructure investments.
      • 2. There are practical difficulties when away from home base, such as determining IP addresses, proxy server settings, negotiating billing and payment and security and privacy concerns.
  • Even the simple task of moving from one office to another within the same company can be fraught with complications and more often than not people fail to make connection when traveling away from home base. With so many companies relying on e-mail and the World Wide Web as a critical business tool, an inability to connect can prove costly to companies. In the last three years the ability to access the Internet has begun to migrate to mobile devices. Small mobile devices have tended to use a variety of specialist Internet access methodologies with varying degrees of commercial success. They all suffer from the limitation of low bandwidth and high cost.
  • There are a number of methods by which users can get access to data from mobile wireless devices: SMS, HDML, WAP and I-Mode being the main standards. All of these standards suffer to some extent from problems such as limited bandwidth and complex authoring environments.
  • In SMS (short message service) users can send and receive simple, short text messages from their phone. A server at the mobile phone service either routes them to other mobile phone users or provides a gateway that translates the messages and sends them as e-mail to Internet e-mail services. The gateway will also translate incoming email and send it to the user in SMS format. Although rudimentary, large successful businesses have been founded from sending these short messages demonstrating that people need data on the move and are prepared to pay for it.
  • In HDML (Handheld Device Markup Language) a web site is composed using specially modified tags. A wireless gateway translates these tags so that the mobile device may view them. A mobile device equipped with a micro browser capable of interpreting HDML can display this information on a small LCD.
  • In WAP (wireless application protocol) a web site is composed using WML (wireless markup language) and this information sent to a WAP gateway. The user gains access to this gateway either by dialing a RAS (remote access server) or by using a packet based system, commonly referred to as ‘always on’.
  • In I-Mode specialist tags are again used to create pages formatted in compact-HTML. These are served over a gateway to users on a packet-based system.
  • In the above systems a specialist gateway is used to provide output formatted for mobile devices. An alternative method of accessing the Internet from a mobile device is provided by fixed wireless systems such as Bluetooth and the IEEE 802.11 wireless LAN standard.
  • In the 802.11 and Bluetooth standard two wireless devices establish a point to point or point to multi-point link using spread spectrum radio technology. The two wireless devices can be any type of electronic appliance—PC, PDA, Cell phone, microwave oven, home security system. This link replaces wires and does nothing to reformat the content of data.
  • Another wireless standard that has reached ubiquity in availability but has very little usage is IrDA (Infrared Data Association). In the IrDA standard two devices with IrDA capability positioned near one other can communicate using infra-red beams. The standard suffers from two problems. Firstly that the link is optical and therefore requires a clear line of sight. The devices must be positioned so that their ports are visible to each other or at least so that sufficient reflected light reaches the, ports. Secondly the two computers need to have their IrDA ports configured and switched on. This is a non-trivial task: The hardware must be enabled—commonly powersaving and compatibility issues mean that computers are shipped with the port disabled. A device driver must be installed. Once the physical link is available a logical link is needed to allow file transfer or access to the hard disk of the companion computer. Security and privacy must be ensured.
  • Looking at problems of getting Internet access when mobile a number of steps are required.
      • 1. Some form of driver software is needed to configure the user's hardware to allow a link to be made.
      • 2. The physical link needs to be made. This may be by pointing the two computers at each other or connecting a back-to-back USB cable, which has been provided by, for example, the hotel at which the user is staying.
      • 3. The host user needs to enable and share certain services, such as printers and hard disks and network connections.
      • 4. The host user needs, itself, to log onto the Internet.
      • 5. The host user needs to act as a gateway for the connecting user, translating and forwarding packets onto the Internet.
      • 6. The IP address of the host's interface needs to be configured to a non conflicting address with that of its Internet link.
      • 7. The IP address of the connecting user needs to point to the host user.
      • 8. The ports and proxy servers need to be set up. Even if no special set up is required a user who normally works in a corporate network with special settings will need to write these down and then delete them from the system, remembering to type them back in when returning to the corporate environment.
      • 9. If the link has a cost to it a financial transaction needs to be entered into with metering and billing.
      • 10. No simple solution is available to ensure a secure link.
      • 11. E-mail may or may not require yet more steps to enable.
  • This multi-step process is fraught with difficulties and there are numerous potential points of failure. Most connections fail because either one of the steps cannot be completed, or each step is so time consuming that the user gives up before completing the task. Since mobile users are usually short of time, have limited resources (such as driver disks, spare cables) and have to configure multiple times as they travel thru different environments, the effort is very frustrating. Typically the above exercise is completed around 30% of the time with a mean time of effort of two and a half hours. Although many operating systems (such as Windows 2000™) allow connection sharing the implementation of these makes the task very complex.
  • An additional further complexity has been generated by the lack of interoperability between IEEE 802.11 and Bluetooth. Since both standards operate in the same frequency spectrum the two systems will tend to interference with each other.
  • Additional difficulties occur when a firewall is present. If a shared connection is obtained in the home or office, access to the Internet may be blocked or restricted by the activities of a firewall. The same technology that provides the firewall capability may also track usage and web sites visited providing a risk to privacy. Additionally information that is sent or received may be logged causing considerable security risk.
  • Although the cellular system provides some degree of roaming it provides no solution to inter-system roaming and uses expensive infrastructure, which results in high call cost. In addition the process of connecting a PC or PDA to a cell phone is complex and requires considerable reconfiguration of the device. The current mode of access to the Internet is predominantly through a one-to-one commercial negotiation. Each person has a connection to the Internet via their own ISP. When visiting someone else's home obtaining access to the Internet is difficult. Calling the ISP requires another phone line. In the case of ADSL or cable systems the MAC address of the network adaptor is registered to the ISP so that a second user can't use the connection. You can install a network and enable connection sharing in your OS—for example Windows 2000™—but this involves a number of complex steps. In addition there is a significant security implications to this. Generally home and commercial networks are not set up with the anticipation that roaming users will be physically connected to the network inside the Firewall. Thus many network services are not secured against internal access. (It is not uncommon for a corporate network running Windows™ 2000 to have numerous hard disks shared without passwords.) Although the firewall blocks this from external access, a local connection would be inside the firewall.
  • Although these problems have existed for some time, the emergence of Bluetooth and IEEE 802.11 are encouraging people to connect more often. While the above discussion is centered on the difficulty of human beings obtaining connection to the Internet it should be bourn in mind that autonomous machines have similar difficulties. Much talk is made of microwave ovens, video recorders and refrigerators talking together using home networks. It is also envisaged that automobiles will be similarly equipped. These systems are likely to become ubiquitous over the next five years as networking capabilities are built into appliances. These devices need to obtain services from somewhere and need to obtain a connection to the Internet. It will be prohibitively expensive to give each device it's own dedicated connection. The devices will also need services tailored to them. One can consider that an appliance once manufactured an shipped becomes a roaming device in need of connection to the Internet.
  • As described above, there are two main types of wireless network present in the world today—wide area networks (WWAN) exemplified by cellular systems and local area networks (WLAN) provided typically by 802.11 (also referred to generically as “Wi-Fi”) and Bluetooth technologies. Some examples are named in Table 1 set forth below.
  • TABLE 1
    WWAN WLAN
    GSM Wi-Fi (802.11 a/b/g)
    UMTS Bluetooth
    W-CDMA DECT
    CDMA2000 ZigBee (802.15.4)
    FOMA WiMAX
    TETRA HomeRF
    GPRS HyperLAN
    HSCSD
    HSDPA
    EDGE
  • Some technologies defy this simple classification. Bluetooth, when used in its low power mode, is often called a personal area network (PAN) and WiMAX technology can have extended range that rivals cellular macro-cell coverage. The distinctions can often be based on heritage and infrastructure ownership, but nevertheless today there is general agreement on the two classifications and the distinction between them—a WWAN connects to the core cellular network first, while a WLAN connects to a computer network first.
  • A complication of WWANs in particular, but all networks in general, is that they distinguish between voice bearers and data bearers. Thus in GSM there are GSM audio channels and GSM data channels such as EDGE. For the purposes of this patent, WWAN-audio and WWAN-IP (-Internet Protocol) will refer to these distinctions respectively. Additionally, WWAN-VoIP (-Voice over IP).will refer to the situation of carrying voice over WWAN-IP.
  • A number of methods have been proposed for implementing mobile voice and data systems so that they operate on both WWAN and WLAN based infrastructure. In implementing such mobile voice and data systems, these systems will have to deal with the problems of roaming and handoff between them. Roaming is the feature where a mobile phone can acquire a radio connection and signal to an authentication method to request a connection to services, while handoff is the feature where a mobile phone moves from one radio connection to the next maintaining a voice call or data connection with as little interruption as possible. When this interruption is not noticeable to the user the handoff is deemed “seamless.” Seamless handoff is not always an advantage. For example, when the user moves from a low cost connection to a high cost connection they generally want the transition to be made clear. The ability to do seamless handoff is an important feature of these systems even if, on occasion, it is deliberately switched off or the handoff made non-seamless through the use of notifications. When a mobile phone moves from one radio connection to another and the bearer technologies are the same we will hereafter refer to this as handover to differentiate it from handoff—for example when moving from one Wi-Fi access point to another.
  • Two types of systems that have implemented mobile voice and data systems that operate on both WWAN and WLAN based infrastructure are; (1) UMA-based systems and (2) Bluetooth CTP-based systems.
  • UMA-Based Systems
  • The most prominent standard for WWLAN to WWAN interoperability is the Unlicensed Mobile Access (UMA) system, whose specifications can be obtained from www.umatechnology.org. UMA technology provides a method for using the cellular network infrastructure and specially modified handsets with WLAN Access Points (APs) to implement micro-cells in the network. UMA is described in relation to the GSM system but can be generalized to WWAN-Audio systems including 3G. We shall refer to the GSM case for this discussion. In the UMA system a handset is modified to send voice and data via a WLAN connection (such as 802.11 a/b/g or Bluetooth). When using the WLAN connection, the GSM protocols (speech encoding and mobility management et. al.) are encapsulated and sent over WLAN via an access point which routes traffic to a UMA Network Controller (UNC) that de-encapsulates the protocol and sends it on to the cellular infrastructure. The primary object of the UMA specification is to make connection to the core cellular network as quickly as possible and then make all further communication through that core cellular network.
  • Roaming is possible on UMA because the protocol encapsulation and emulation of a GSM base station allows the handset-AP combination to appear as a GSM cellular phone and GSM base-station even though the wireless protocol being used is WLAN. Handoff is supported between cells where the initial cell is a WLAN-AP and the handoff is made to a GSM cell or vice versa. In these cases the handset must simultaneously switch radio layer protocols while maintaining the GSM signaling and audio channel connectivity.
  • Because of this requirement to emulate the GSM cellular protocols (signaling and voice) in complex handoff scenarios these systems suffer from a number of practical problems: The GSM specification was not written with the assumption that the radio layer could change mid way through a transaction and it therefore organizes the signaling channel with precise time slot assignments, interleaved with the voice channels. Implementation of UMA therefore requires complex integration with the GSM software stack at a low level in the phone such that the phone can perform these handoff tasks.
  • In particular the phone may signal a handoff ‘start’ while using one radio layer and then signal the handoff ‘completion’ using another radio layer. Because of these timing, slotting, encapsulation and signaling elements, the system design is complex with many points of integration between the WLAN signaling elements and the GSM elements at low levels in the stack. Presently, such low level integration requires considerable engineering time to implement as the software elements are real-time and time critical—often upwards of 18 months for software work, manufacturing and test prior to launch in the network.
  • While these time scales are appropriate for products in the mobile domain the convergence of fixed and mobile networks brings Internet development timescales into play with the problem that by the time deeply embedded, real-time software stacks have been implemented for a phone it is often the case that the Internet protocols have moved forward or the handset is obsolete before launch. Even with considerable design effort system performance can still be limited with handoff failures and interoperability restrictions.
  • In addition, although the specification calls for the use of standard access points, in practice the access points have to be specially designed to cope with the timing requirement inherent in the protocol management and this means the systems can not work with general purpose access points such as those deployed in the market already in hotspots, homes and offices. This need to specifically design each AP dramatically increases the total cost to deploy a system as every Access Point must be visited where the older units need to be swapped out and the newer unit installed.
  • In addition UMA handsets require a full cellular infrastructure to operate, consisting of a Mobile Switching Centre (MSC) within the HPLMN (Home Public Land Mobile Network) interworking with location databases including HLR (Home Location Register) and VLR (Visitor Location Register) or SGSN (Serving GSM Support Nodes). This requirement is disadvantageous because it is architecturally complex—data packets must transit through the cellular system even when they originated from WLAN Access Points as Internet Protocol (IP) and are often destined to terminate via IP, say as a VoIP call, thus putting unnecessary stress on these systems and causing numerous unnecessary protocol translations that introduce latency and potential for failure. A call which might have been routed locally perhaps over only a few hundred yards of IP cabling will have to transit through the entire cellular core network. So a UMA protocol based system is essentially incompatible with peer-to-peer routing and SIP based RTP stream direct connection paths. Also, many companies that want to utilize voice and data services over wireless do not possess core cellular network infrastructure and such infrastructure is extremely expensive to purchase and the arrangements for leasing capacity are generally unattractive.
  • Bluetooth CTP-Based Systems
  • Another implementation of a mobile VoIP system entails using a phone that supports the Bluetooth cordless telephony protocol (CTP) connecting to a Bluetooth enabled base station that also supports CTP. A CTP system implements two protocols: telephony control specification-binary (TCS-binary) and the synchronous connection oriented (SCO) audio protocol. A call is initiated between the phone and the access point using the TCS-binary protocol to initiate off-hook, dial-tone, and send and confirm the number. Once the call is connected, audio is transmitted directly from the microphone and speaker hardware to the Bluetooth low level stack, usually a hardware implementation, and then over the air interface to the AP's audio hardware which then needs to encode the audio in a suitable form for onward transmission.
  • There are a number of problems with this:
      • i) The cordless telephony protocol implements ‘SCO-Audio’ which is a fairly simple high bandwidth audio compression/decompression algorithm (codec) that is not particularly well protected from interference by other radio devices; this limits range.
      • ii) The codec used by CTP is not directly supported by Session Initiation Protocol (SIP) servers used in Internet telephony and so the stream has to be re-encoded by the CTP-enabled base station. Re-encoding with different compression can produce serious audio artifacts, takes processing power, increases latency and substantially reduces the Mean Opinion Score (MOS) by which people rate the quality of sound.
      • iii) The CTP algorithm is not IP based and so when switching from one network (Bluetooth) to another (WWAN or WLAN), the phone and AP must swap protocols. This typically involves unhooking the Bluetooth hardware audio system and re-initialing a completely new audio path through the phone's digital signal processing (DSP) subsystem which causes an interruption in the audio stream and a change in the audio characteristics requiring an end-to-end renegotiation of elements such as CODECs, Quality of Service (QoS) and echo cancellation parameters. A similar reconfiguration of the AP is also needed.
      • iv) Differing compression algorithms are used on the differing radio connection methods and this makes for very complex control when trying to throttle bandwidth.
      • v) Because CTP is a relatively high bandwidth protocol and because CTP is a low level timing critical protocol few connections can be supported by an AP. Three connections can be supported in theory, but only one connection is often feasible in practice.
      • vi) CTP is implemented at a very low level in the protocol stack and takes audio directly from the microphone and speaker into the Bluetooth audio codec. This means that the higher levels of software have no control of this path to implement elements such as mixing, echo cancellation, improved CODECs, or indeed any extension to the basic audio functionality available.
      • vii) Finally, the CTP protocol must be implemented in the handset and the AP at a hardware level and interoperability tests performed.
  • Again, deep integration is needed to implement CTP which is time consuming and expensive and this has not been implemented by several manufacturers. For example Nokia™ does not support CTP on their phones and Microsoft™ does not support audio profiles (including CTP) in any of its operating systems including in particular the current shipping of Windows XP™ service pack 2.
  • Access Point and WLAN Issues with Other Systems
  • For both Bluetooth and Wi-Fi as described above, the most commonly available AP in an office is a WLAN-enabled PC. However, problems exist with using these both for Bluetooth and Wi-Fi. In the case of Bluetooth, the current versions of Windows™ do not support audio profiles including CTP. In Wi-Fi enabled PCs they are set as devices rather than access points.
  • In addition to the protocol elements described above there are a number of problems presented when trying to provide coverage for a home or office in an affordable fashion:
      • i) WLAN range is limited in a home by in-building multi-path interference effects and blocking due to walls and other obstructions.
      • ii) WLANs are usually protected by firewalls which are not friendly to VoIP
      • iii) WLANs may not handle mobility very well in that the user's IP address may change as they travel from one access point (AP) to another.
      • iv) Home wiring is becoming very complex and requiring yet further physical wiring to provide additional WLAN points spread around the home or office is difficult.
      • v) In home environments, the selection of locations for access points (APs) is difficult as they must be in prominent locations to provide coverage, but when in such locations antenna efficiency may be compromised by having other objects placed close to or on top of them.
  • The range of Bluetooth and Wi-Fi differs for different classes of system and in different scenarios. On one hand, the Bluetooth protocol has slightly better in-building range, but is hampered by the fact that Bluetooth systems are not commercially available with good diversity schemes. On the other hand, Wi-Fi systems have excellent diversity schemes where two antennas receive signals a few inches apart so that one or other antenna avoids interference, but are generally high-power only devices. A system is needed that optimizes the mix of Wi-Fi and Bluetooth systems and uses each to the best of its capability. A summary of the capabilities of different protocols is presented below.
  • TABLE 2
    Range Range
    free in Other
    Type Modulation Freq. space Building considerations
    Blue- Frequency 2.4 GHz CI 330M CI Very Low Power
    tooth Hopping CII+ 60M CII+ Very Low Cost
    Spread CII 40M CII Complex
    Spectrum CII− 25M CII− software stack
    GFSK CIII
    10M CIII
    802.11a OFDM   5 GHz  80M  40M No interference
    802.11b Spread 2.4 GHz 240M 120M Low Cost,
    Spectrum backward
    DSSS compatible
    802.11g OFDM 2.4 GHz 120M  60M Best in Building
    (200)* at high
    throughput
    *Advanced diversity methods significantly improve in building range by dramatically mitigating multi-path issues.
  • While Bluetooth has declined in usage as Wi-Fi enters the space. A number of advantages of Bluetooth over Wi-Fi exist: It is very low cost, it has about 1/10th the power consumption of the equivalent Wi-Fi function, it is already designed into roadmaps for the next two years, many low power Bluetooth headsets exist that are unlikely to be displaced by Wi-Fi. Therefore, any proposed system needs to cope with a mixed world of Bluetooth and Wi-Fi handsets and plan for the introduction of Wi-Max. At present there are no satisfactory Bluetooth/Wi-Fi dual mode access devices. In addition, many people already have Broadband access in place but the broadband router (ADSL Router) is often not ideally positioned to give good in home or in office coverage for an area. Existing Bluetooth handsets tend to be low power devices to keep power consumption low and to avoid interference with the WWAN circuitry in the phone. Additionally the phones are optimized for headset links that are perhaps only intended to be 10 meters or so. This means the phone is not optimized for maximum transmission range and provides a poor contribution to the link budget.
  • As stated above, one of the benefits of Bluetooth is the low cost link. It is a complex task to select a Bluetooth Profile that is available both on a Smart phone and on a PC. The following table is a reasonably comprehensive but far from exhaustive list of the profiles currently specified for Bluetooth.
  • TABLE 3
    Bluetooth Protocol List
    Generic Access Profile (GAP)
    Service Discovery Application Profile (SDAP)
    Cordless Telephony Profile (CTP)
    Intercom Profile (IP)
    Serial Port Profile (SPP)
    Headset Profile (HSP)
    Dial-up Networking Profile (DUNP)
    Fax Profile
    LAN Access Profile (LAP)
    Generic Object Exchange Profile (GOEP)
    Object Push Profile (OPP)
    File Transfer Profile (FTP)
    Synchronization Profile (SP)
    Hands-Free Profile (HFP)
    Human Interface Device Profile (HID)
    Hard Copy Replacement Profile (HCRP)
    Basic Imaging Profile (BIP)
    Personal Area Networking Profile (PAN)
    Basic Printing Profile (BPP)
    Advanced Audio Distribution Profile (A2DP)
    Audio Video Remote Control Profile (AVRCP)
    SIM Access Profile (SAP)
  • For WLANs in general and 802.11 ‘Wi-Fi’ products in particular, they suffer from voice Quality of Service (QoS) issues because of their original design to carry data. The radio layer error recovery mechanism implemented at the Media Access Control (MAC) level retries packets at lower data rates if a packet is not acknowledged. In some cases, the handset spends more time transmitting error recovery packets than useful data. 802.11e (wireless MAC enhancements for QoS) provides a method for solving this but this still suffers from contention issues for the wireless medium particularly with respect to ‘unfriendly’ cohabitations such as Bluetooth with Wi-Fi (which share the same frequency band). When Bluetooth interferes with Wi-Fi, the Wi-Fi backs off its data rate to a lower bit rate, increasing the overall packet size in time. These longer packets have a higher probability of colliding with other users of the data network and causing yet more back off and retry events—a downward spiral which limits practical deployments to 6 users per Wi-Fi channel when the theoretical limit is more than 30. Creating a clean interference-free WLAN environment is highly desirable.
  • Another problem that can exist with these two types of systems is that handoff protocols might have to re-initiate authentication procedures. Fast roaming protocols, 802.11r and Inter Access Point Protocol (IAPP), 802.11f allow for the APs to switch in the sub 100 ms range and exchanges access point context so clients needn't go through the entire authentication process when roaming and handing off, but the context data (the pairing, authentication and channel data that specifies the parameters of a given link) exchanged is vendor proprietary, so handoff performance varies considerably. When roaming in a homogenous access point network with the same Service Set Identifier (SSID), the hand-off is usually fast but an improved and general method for handoff, and handover would be advantageous.
  • The problems with these systems can be classified as follows:
      • 1. Architectural Complexity
      • 2. Mobile Device Complexity
      • 3. Protocol mismatch requiring excessive translations
      • 4. Lack of affordable coverage solutions
      • 5. Poor co-existence between different WLAN systems
      • 6. Lack of range due to poor link budget management and protocol issues
      • 7. Slow handoff and handover.
      • 8. Inability to implement peer-to-peer operation.
    SUMMARY OF THE INVENTION
  • An embodiment of the present invention provides a method and system for connecting to a network—typically the Internet via a cooperative membership arrangement. Members of the cooperative networking service have an identifier that uniquely identifies them as a member of the service. A fixed member (host) enables its link capabilities for mobile users (clients) but directs those links to communicate with a secure piece of software—the Cooperative Tunneling Agent (CTA). Upon access by a mobile member, the CTA sends both identifiers and status information to a server. The server contains preference information on all members that can be referenced by their identifiers. The status information is compared to the preferences of the two members and, if the comparison is successful, a link to the Internet is provided to the mobile member. If the comparison fails the members may be notified and allowed to modify the preferences, make a one-off exception or reject the link. The CTA can work with or without reference to a server. When working independently of the server the comparison is made using data from the host and the client and the server is only accessed if additional information or service is required. The CTA ensures that the mobile user has no access to the fixed user's computer other than as a pipe thru to the Internet. To ensure that the mobile user's security and privacy are protected the data packets may be encrypted and sent via the fixed host to the server. The server may decrypts the data and sends it to the Internet. Return data is similarly dealt with. By this method the fixed member cannot eavesdrop on the mobile member's data or voice traffic. Such encryption can be set at a variety of strengths according to user preference and applied selectively depending on the data type. Routing of the data may also be performed selectively according to data type.
  • BENEFITS OF THE INVENTIONc(O&A)
  • An advantage of the system is that two members can quickly and simply set up secure link so that one member can access the Internet thru the other members network connection without causing security risks to either member. A further advantage of the system is that one member can use the low cost access method available to another user.
  • A further advantage is that voice calls can be sent to the host and routed over the EP network using VOIP technology thus dramatically reducing costs. A further advantage is that voice calls can be routed thru the cellular system to a local VOIP server thus saving long distance cellular charges.
  • A further advantage is that by simplifying the operation of logging onto the network thru fixed nodes commercial node providers will find it easier to acquire customers and the service to those customers will be improved and simplified. A further advantage is that by providing a universal logical standard for connection incompatible transport protocols can be made compatible. In the example of Bluetooth and IEEE 802.11 the CTA can ensure that the protocols synchronize to divide their spectrum usage in either time domain or frequency domain for all members present.
  • A further advantage of the system is that since access is automated according to preset preferences the system can be used for the connection of autonomous appliances and machines who are not able to make complex decisions regarding optimal network access.
  • The link can transport either data or voice. In the case of voice the CTA handles the VOIP (voice over IP) protocol. VOIP and Multimedia can be either sent via the complete path thru our secure server or split apart to take a more optimum routing.
  • The software allows the user to access the Internet, send and receive e-mail and obtain high bandwidth services such as MP3 files and movies. The network is cooperative as each user agrees to both give and receive access depending on their status. Each user is a node. A cell phone located within 100 feet of a fixed host device can connect to the Internet through that device, obtaining phone calls at a fraction of the cost of a regular cellular connection. Similarly a portable computer or PDA would be able to connect through a host node and obtain a high bandwidth link to the Internet for a modest sum of money. It is anticipated that there will be two main types of connection; cooperative connection and commercial connection. In a cooperative connection, a fixed user connected to the Internet provides a bridge so that other mobile users may access the Internet through their link. This link is provided free of charge in return for reciprocal roaming rights. In a commercial connection the user locates a commercial node and the CTA negotiates connection and payment terms according to preset user preferences. While this invention is primarily targeted at simplifying the task of connecting using fixed wireless devices such as Bluetooth or 802.11 it will apply to any connection methodology—IrDA port, network cable, serial cable, USB crossover connector et al. Our invention is intended to facilitate connection to any rigid network infrastructure but the Internet is the most important of these.
  • Means for cleanly handing off connection from one system to another are provided by the CTA. By storing both the customer's Cellular provider information and the Cooperative network ID the call can be routed through either system. In addition if a voice call is in progress and a Bluetooth cooperative connection becomes available the call can be set up in the VOIP system and handed over and visa versa.
  • The technology provides the function of a bandwidth moderator. As a user moves about their daily life from home to office via different modes of transport, their requirements for Internet connection change in characteristic, and the mode of connection changes. Our technology sits between the user and the Internet constantly negotiating the most cost effective means by which they can gain access. While today the modes seem simple—it's a wired or a wireless link—this will not remain so in the future and all software systems will require an agent to perform this task. It is an objective of the present invention to optimize the ‘last mile’.
  • This system differs substantially from the cellular system in that a substantial amount of network hardware is provided by the members of the network and not by high capital value dedicated infrastructure. It is generally a surprise to people when they realize how often they are within 100 feet of an Internet connection. Additionally the cellular system provides no handoff methodology between differing classes of carrier.
  • The present Invention provides a means for wirelessly enabling a home, office or public environment such that commonly available hardware, such as PCs and mobile phones, may be easily and readily used in conjunction with simple low cost repeaters, PCs enabled as access points and one or more wireless access points, providing a complete telephony solution that allows a person to use one phone handset for all their telecommunications needs. The system solves a range of problems with previous systems.
  • The use of this technology will also enable VoIP services for the home, office and mobile environments that have hitherto been prohibitively expensive and have suffered from poor user experience. In particular this technology allows Mobile VoIP to operate on Nokia phones and Microsoft operating system PCs that have not previously had these capabilities without modification of the hardware or embedded/fixed software elements of these systems.
  • Using the roaming and handoff further multi-media services can be provided such as music streaming and download and real time gaming.
  • Multimedia subsystems within phones are also capable of recording and rendering pictures and video.
  • System Architecture & Mobile Device Simplicity
  • In contrast with previous systems based on protocols such as UMA or CTP, the proposed system converts speech or data immediately into VoIP, a protocol optimized for the Internet that is time independent of its control signaling and where the precise timing of the packets is not material. The benefits of a packet-based protocol are that packet time and real time are independent of each other. This significantly reduces the complexity of the software for the phone, access points and server infrastructure. Indeed such simplicity allows that any generic access point can be used.
  • Another significant advantage of a packet based system is that the packets may follow different routing paths providing for a high degree of redundancy and therefore reliability. For example, a packet may be forwarded at the radio layer via the Bluetooth, Wi-Fi and UMTS link simultaneously during handoff/over in the invented system. While UMA systems are also packet based systems over the radio layer, those packets are only comprehensible by a UNC (UMA Network Controller) and must transit through it for translation back into core cellular protocols. This introduces a compulsory routing node and therefore a single point of failure. Must of the advantage of an IP based packet system is therefore lost.
  • In addition, the invention separates the radio layer protocol and the audio protocol and uses IP sockets for the interfacing within the phone. By doing this, several advantages are achieved:
      • 1) The radio layer may change without reconfiguring the audio layer thus allowing fast switching and handoff.
      • 2) Digital signal processing techniques may be applied to the audio independently of the radio layer so that the audio quality is kept similar during handoff.
      • 3) Audio packets can be sent to more than one radio subsystem simultaneously allowing a make-before-break architecture.
  • The protocols used in the invention can be Session Initiation Protocol (SIP) and Real-time Transport Protocol (RTP) optimized for wireless transport. These are encoded at a high level within the protocol stack and transmitted down the protocol stack using IP within the phone to the different radio subsystems for transmission to the network. In this way, the audio or data protocols are radio layer agnostic. A benefit of this agnosticism is that a packet can be formatted and sent to the appropriate socket (Bluetooth, Wi-Fi or UMTS) completely freely and simultaneously. The Network Address Processing in the server of the invention (a modified SIP server) will sort the streams back into a single stream for termination to the PSTN or forwarding to other parties. If the other party has a compatible client then this sorting is not needed as there is no essential restriction on having two streams (i.e. a socket pair rather than a single socket) connecting mobile subscribers in the SIP domain, and this approach can be used to improve QoS and the seamlessness of handover. A further advantage of the system using an all IP architecture is that handoff can be affected without interfacing with the low level stack components of a phone.
  • Affordable Coverage Solutions
  • General purpose PCs can be co-opted into the invented network to provide broad coverage by enabling them with either Wi-Fi or Bluetooth. The PCs are configured to bridge between the incoming SIP connection and the LAN. These PCs can perform simple packet forwarding or more advanced mobility tasks such as handover to WWAN or gateways by translating into proprietary protocols such as SKYPE and terminating over the proprietary network.
  • Repeater
  • In addition to these PCs, the invented system has a new form of repeater in the system which is also radio layer agnostic and able to translate between Wi-Fi and Bluetooth and forward either protocol quickly and efficiently. FIG. 20 describes the link budget problem. Essentially most mobile phones will have poorer antennas and lower power amplifiers than the access points or repeaters in a given system. This disparity tends to most affect the transmit power from the phone but also affects receive sensitivity. However, the invented system utilizes a low cost receiver that has high power and increased receive sensitivity and diversity reception in addition. The result is that low power standard mobile handsets may be used with reasonable range and coverage being provided by the link budget optimized repeater/AP.
  • The optimum combination is low noise receiver, high power output (+20 dBm), diversity reception and coexistence methods for removing interference between other radios. Furthermore at the system level, the ability of the AP to talk to the phone via a back channel provided by WWAN and the server can further reduce power consumption and provide an alternate diversity channel for very tough conditions. The invented repeater has Bluetooth and Wi-Fi coexistence and SIP/VoIP compatibility so that it can be introduced into a home/office or hot spot to pick up the existing links and forward them to multiple devices using these giving both range and capacity improvement.
  • A significant problem that the repeater solves is the ability to quickly enable a home/office or hotspot using a device that has a minimum of configuration and therefore customer support requirements. Correct siting is easy to do using the BLUE/GREEN/AMBER LED pattern on the repeater. Amber indicates no signal, green indicates path back to Internet and blue indicates forward connection either to another repeater or a phone. This allows for very easy improvement to WLAN coverage to be made with minimal support costs. The repeater further supports Simple Network Management Protocol (SNMP) specification so you can monitor and maintain the repeater from afar. A further simplification to pairing and exchanging keys is provided by allowing a USB memory device to be plugged into any device in the system and automatically transfer the link key information to another device subsequently plugged in.
  • The WLAN repeater/translator further simplifies the home/office wiring problem by allowing wired phones to plug into the repeater with a suitable RJ45, RJ11 or BT plug, thus eliminating the need to provide a wiring system for fixed phones within the home and bonding the home system to the wireless VoIP infrastructure.
  • Another significant problem that is overcome by the repeater is Network Address Translation (NAT) traversal. Many computer networks block certain ports and allow incoming IP only as a direct response to outgoing IP. The repeater makes regular contact with the system server and thus keeps an incoming channel open. Additionally the repeater may perform Network Address Translation of Processing, search for and switch ports to an unblocked port on the server or take other action to maintain contract with the server. Since it is generally an AC powered, high power device these actions are not detrimental to its operation but would tax a phone in similar circumstances.
  • Co-Existence Between Different WLAN Systems
  • The system implements advanced coexistence methods to allow a variety of wireless networks to be used in a seamless fashion without causing interference with each other. In general all devices in the invented system are Bluetooth/Wi-Fi coexistence devices capable of offering dual coverage without interference.
  • Improved Link Budget Management
  • In the present invention considerable attention is paid to the link budget and maximising the range from both Bluetooth and Wi-Fi access points using techniques such as balancing the transmit and receive link budget and optimising the data packet format for Wireless.
  • Shortest Signal Path
  • The system attempts to look for the shortest signal path, thus the handset can uses peer-to peer-techniques to discover if another handset is in range. This may be achieved directly (for direct communication over the local radio link) where the telephone number is resolved to an IP address range and location and Bluetooth address or Wi-Fi MAC address. In this case the device or server can determine that the telephone number called is actually located in close proximity and route the traffic directly without even needing to transit an access point or repeater. The handset or server may track up the address range until it finds a short path for example or via a local repeater or communication over the LAN only. Failing this, if the SIP server detects that two phones are presently logged onto the system and that one phone is trying to ‘call’ the other by entering its phone number it may link the two phones by the shortest possible path without sending the packets into the PSTN. This in conjunction with presence services can give very rich user experience.
  • A further advantage of the system is that phones that support Bluetooth but do not support CTP protocol may be used within the system. Nokia phones fall within this category and currently have the largest market share.
  • A further advantage is that a variety of devices can be used in the system that are Bluetooth and/or Wi-Fi enabled such that the signaling protocol and system architecture and coverage are substantially identical.
  • An advantage of routing through a PC is that there are widely used low cost devices, in the form of Bluetooth or Wi-Fi cards or dongles, which can be converted to access points with very little additional cost, which in turn means that the overall cost is kept low.
  • A further advantage is that range is increased by using repeaters. Using Wi-Fi as the backbone and Bluetooth in the local link in a repeater scenario minimizes Bluetooth master/slave role reversal problems. In a system that uses Bluetooth repeaters, one repeater needs to be the master and the other a slave. This introduces the problem that a phone moving from one AP to another would have to connect to the first as a master and the second as a slave, or each AP would have to be slave and master simultaneously. While this simultaneous master and slave is possible within the specification it has an impact on channel throughput and is complex to implement. If Wi-Fi is used as the backbone link between a number of Bluetooth access points the access points can perform a single task, either master or slave, simplifying the architecture. This then allows for easy context transmission over the Wi-Fi backbone without the need for wiring and takes advantages of new developments within 802.11 chip sets implementations to maximize range and throughput.
  • A further advantage of routing through a PC is that all the VoIP packets and authentication information are available at the PC and can be transcoded to transmit over proprietary VoIP networks such as Skype™ and MSN™.
  • A further advantage is that the wireless coverage of a home or office can be effected with low cost devices and the wiring plan of that space can be substantially simplified.
  • The best coverage for the widest range of devices can be obtained by supporting Wi-Fi and Bluetooth, however both systems inhabit the same frequency range and so strategies for coexistence must be used. There are well understood coexistence regimes within the Bluetooth 1.2 specification and additional hardware support for coexistence can be provided for example within the CSR BlueCore™ and UniFi™ Portable specifications. However when using voice over the SCO (Synchronous Connection Oriented) Bluetooth link, interference is still audible. A benefit of using audio over the ACL (Asynchronous Connectionless Link)—a packet based data channel—is that the link is more robust, supporting greater error correction which makes the system much more resistant to noise. In a SCO link, a circuit is set up with reserved bandwidth, the audio is encoded into digital samples and streamed over the link. There is no re-transmission if parts of this stream are lost (although there is some forward error correction provided by the protocol). Thus, an interfering event that affects the stream will still be audible.
  • In an ACL link, the audio is sampled, compressed and packetized. The link has a degree of packet retry, the forward error correction can be increased because the data is more highly compressed and the CODECs used have lost packet masking characteristics. Therefore there is both a lower chance of loosing a sample and a lost sample has less audible effect.
  • A further advantage is that all data transits over ACL links which can be optimized to have lower error rates and have forward error correction options.
  • A further advantage is highly compressed audio data can be transmitted using AMR codecs that are implemented in hardware on most mobile devices. This allows for lower data bandwidth over the link. The system has full control of the audio path.
  • A further advantage is that the combination of low data bandwidth and an error corrected link translates into improved range, and improved quality in the presence of interfering noise.
  • A further advantage is that the architecture and protocols are substantially the same when moving from Bluetooth to Wi-Fi networks.
  • A further advantage is gained by using Bluetooth ACL connections rather than SCO connection in that the quality and range are improved and ACL supports an IP data channel giving the advantages of an all IP approach.
  • A further advantage of using ACL links is that up to seven devices may be connected at one time to a Bluetooth Master.
  • In the previously available systems it has proven difficult to implement seamless handoff between cells or infrastructure. In both the UMA and CTP systems the audio is encoded in substantially different ways for the different radio paths—although efforts have been made in UMA to make these as similar as possible. As handoff occurs, the system must be re-configured as quickly as possible to implement the new coding scheme for audio transmission. In the invented system, the protocol is encoded in the same way regardless of which radio connection method is used. This means that without burdening system resources the handoff can be implemented quickly as no re-configuration is required or the packets can be simultaneously sent over both radio connections during the handoff to provide seamless handoff.
  • In current systems, acquisition of a WLAN Access Point by the handset can take some time. The invented system solves this by providing a table of available Access Points and pre-pairing these in the background. If location information is available through cell ID, network location information, GPS (Global Positioning System) data, or the current or last known Access Point location, then the acquisition procedure can be further improved by initially limiting and then progressively widening the search space. Such efficient search patterns improve power consumption as well as reducing the time to connect. So for example a person may touch down in a foreign country and the phone detects a network change—the person roaming in Germany on one of the German Networks. The handset communicates with the server to indicate that it is in Germany with Cell ID 12345. The server will now send it the AP tables for that region of Germany and it can begin efficiently searching for AP resources. If no AP resources are known for Germany the handset will simply begin a basic search from first principles.
  • Previous systems have used the low level audio subsystem within the phone implemented for either GSM or Bluetooth CTP. These hardware systems are efficiently built but inflexible as previously illustrated. In particular, they are unable to hand their audio-streams to the high layers of the protocol stack for processing so the systems can not be easily re-programmed. The invented system uses the software configurable digital path utilizing the operating system multi-media framework to implement the audio function. In this case it is necessary to correctly prioritize tasks within the system so that audio is handled without interruption.
  • Previous systems have used relatively simple coding schemes in the handsets and subsequently encoded the data into VoIP later in the system, either at the AP or in the Network itself. By contrast, in the invented system, voice is converted immediately into Voice over IP (VoIP): This protocol is inherently timing independent and there is no attempt to encapsulate or emulate another protocol, thus minimizing the system complexity. By encoding the audio streams into VoIP streams in the handset our system enables a range of peer-to-peer routing options that are unavailable in the previous systems. Indeed, it is possible for the audio streams to route locally without touching the Internet and even for the audio streams to run handset to handset without routing through the AP's. Thus in each condition the route can be optimized while maintaining the same fundamental audio coding scheme.
  • A significant contrast with UMA is that connection to the core cellular network is not required in order to perform telecommunication functions allowing anyone to implement a mobile VoIP solution with minimal infrastructure investment.
  • The use of dual mode repeaters in the system allows the phones to use the optimum WLAN protocol for power consumption.
  • A major benefit of the invented system is that since the protocol stack is ‘all IP’ and then communicates over a general socket layer a hand-off between Bluetooth and Wi-Fi is straightforward. Once again, the SIP proxy can cope with two IP addresses or endpoints connecting to the same caller and handoff is a matter of beginning, sending packets on one bearer, and ceasing on the other. Packets can be sent over both bearers to give diversity reception implemented at the IP level and in devices that can connect to more than one AP of either Bluetooth or Wi-Fi then multiple packet streams can be sent to multiple AP's if desired.
  • Another significant benefit of being able to switch seamlessly from Bluetooth to Wi-Fi is to use the extremely low power capabilities of Bluetooth to preserve battery life but still allow the use of Wi-Fi when Bluetooth is unavailable.
  • A further benefit is to extend coverage options and increase the likelihood that you will have a WLAN connection available to the Internet
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 illustrates tunneling Internet access in one embodiment of the present invention.
  • FIG. 2 is a flowchart of the process by which a link is established.
  • FIG. 3 is a table showing the data record structure for a customer.
  • FIG. 4 is a flowchart of the process by which cooperative networking is enabled.
  • FIG. 5 is a diagram illustrating recursive service discovery.
  • FIG. 6 is a block diagram of the elements of the system.
  • FIG. 7 is a table describing a day in the life of a user.
  • FIG. 8 is a :flowchart of the matching algorithm.
  • FIG. 9 is a diagram illustrating voice over IP and service handoff.
  • FIG. 10 depicts a wireless VoIP system for a wireless enable home, office or public environment in accordance with one embodiment of the invention.
  • FIG. 11 depicts a block diagram for the phone 200 and PC 227 when using a Bluetooth and/or Wi-Fi and data enabled phone as the radio transport mechanism and a PC with Bluetooth and/or Wi-Fi connectivity in accordance with one embodiment of the invention.
  • FIG. 12 is a call flow diagram for the SIP protocol elements during handoff between a WLAN call and a WWAN-audio protocol call in accordance with one embodiment of the invention.
  • FIG. 13 a depicts a system that implements a UMA-type system
  • FIG. 13 b depicts one embodiment of the present invention
  • FIG. 13 c depicts a system that implements a Bluetooth-CTP type system.
  • FIG. 14 is a state diagram that illustrates the types of handoff cases that are handled by one embodiment of the invention.
  • FIG. 15 depicts a system wherein one or more servers within the system provide a range of telecommunications functions including call handling and termination.
  • FIG. 16 depicts a home system illustrating the different uses of one embodiment of the present invention.
  • FIGS. 17 and 18 depict the repeater utilized in one embodiment of the present invention.
  • FIGS. 19 and 20 depict the set top box utilized in one embodiment of the present invention.
  • FIGS. 21 a-b depict the repeater utilized in one embodiment of the present invention.
  • FIG. 22 depicts the set top box utilized in one embodiment of the present invention.
  • FIG. 23 is an electronic block diagram of a series of components that would form a system that allows voice, video and data wiring for the home, an office or a hotspot in accordance with one embodiment of the invention.
  • FIG. 24 illustrates the Network Address Processing required to process IP v4 RTP datagrams for the mobile roaming, handoff and handover in accordance with one embodiment of the invention.
  • FIG. 25 shows a configuration of a basic product in accordance with one embodiment of the invention.
  • FIG. 26 illustrates the IDP header compression and resolution of two compressed streams into a single outgoing stream.
  • FIG. 27 depicts a state diagram and physical schematic for power management and service discovery in a WLAN and WWAN system in accordance with one embodiment of the invention.
  • FIGS. 28 a and 28 b are a flow diagrams showing the procedures carried out in both the handset and AP when making a call where the SIP and RTP clients are both implemented in full on the AP in accordance with one embodiment of the invention.
  • FIGS. 28 c and 28 d are a flow diagrams showing the procedures carried out in both the handset and AP when making a call where the SIP and RTP clients are both implemented in full on the handset in accordance with one embodiment of the invention.
  • FIG. 28 e are flow diagrams that illustrate the peer-to-peer discovery process.
  • FIG. 29 is a flow diagram showing the security and authentication procedure for a wireless LAN connection to the system in accordance with one embodiment of the invention.
  • FIG. 30 illustrates the link budget and therefore the maximum achievable range for a WLAN systems in accordance with one embodiment of the invention.
  • FIG. 31 is a diagram that illustrates the system elements to permit co-existence between Bluetooth and Wi-Fi systems.
  • DETAILED DESCRIPTION OF THE INVENTION
  • Referring to the drawing figures, like reference numerals designate identical or corresponding elements throughout the several figures.
  • The present invention provides a method and system for easy, secure, mobile Internet access thru fixed connections points. These fixed connection points being computers that are connected to the Internet and have another port available for connection by one or more; mobile users. A fixed connection point can itself be a portable device, such as a portable PC, and may be moved from time to time. The term is a relative one. To a mobile user a PC with an Internet connection is a fixed device. For the purpose of discussions regarding the system operation these fixed points will be described, as hosts and a mobile user will be called a client. The host can be any form of general purpose PC or a custom built device, which as two connection methodologies and an ability to selectively connect those methodologies under program control.
  • The simplest system has a host and a client. The host will generally communicate with a server to transfer data and receive services but a host can run in stand-alone mode if connection to a server is unavailable or if client security and privacy are not high concerns such as when the host and client are used by the same person.
  • The system is composed of three main parts: The software application, the web server and associated web site and specialist network services such as streaming and VOIP which are provided by other parties.
  • The link functions include:
      • 1. Download of software.
      • 2. Installation of software.
      • 3. Updating of software.
      • 4. Registration of the user to the service.
      • 5. Testing the system.
      • 6. Location of another wireless node or enabled device.
      • 7. Backup location of any Node. IrDA, wired, dialer . . . .
      • 8. Determination of payment conditions: cooperative free, cooperative with cost, commercial.
      • 9. Determining whether the user permission matches the link available.
      • 10. If it does, establishing the link.
      • 11. If it does not, notifying the user of the availability and giving them the option to accept or reject plus update their user profile.
      • 12. Provide voice over IP.
      • 13. Call handover to cellular network.
      • 14. Data handover to cellular network.
      • 15. Encrypt J Encode data for safe sending to the remote web server.
      • 16. Location of VOIP network nodes (Akamai™, Lipstream™ et al.) and direct communication with streaming servers.
      • 17. Billing, most recent call information.
      • 18. Fault logging and diagnostics.
  • The tunneling functions include:
      • 1. Identify fixed line connection or another wireless node.
      • 2. Connect to cooperative server and register.
      • 3. Activate and monitor cooperative connection and enumerate service.
      • 4. Negotiate link with request from cooperative member.
      • 5. Provide secure link (tunnel) to Internet.
      • 6. Handover to alternate link upon request or change in network status.
  • The server functions include:
      • 1. Registration of users.
      • 2. User preference setup.
      • 3. Service list/Portal to customer services.
      • 4. Decocting/De-encrypting transmission and forwarding to web.
      • 5. Provide an Internet store and forward.
      • 6. Negotiation of streaming links.
      • 7. Negotiation of VOIP link.
      • 8. Allow registration to partner services.
      • 9. Negotiate handover upon network status change.
  • Third party functions that may be linked to include:
      • I. Provide VOIP service (Lipstream™, Net2phone™, Akamai™)
      • 2. Provide: Streaming service (RealNetworks™, Akamai™, Microsoft™, QuickTime™)
  • The software application runs on both the client and the host, varying its mode of operation depending on its function in the network. (It is possible for the software to run within a browser thus giving a ‘software-less’ mode of operation. Is will be obvious however that software is indeed running in this instance.) The web server provides the user interface to the service, allowing people to register and also the configuration software to correctly set up each machine and ensure that the software application which runs on the client's and host's is up-to-date and correctly configured.
  • In the case of multi-media and voice these IP packets may not be routed to the server but may travel via a third party routing service for optimum performance.
  • The preferred embodiment of the Invention will now be described with the aid of figures. The embodiment assumes that a short-range wireless link such as Bluetooth™ will be available, and the reader is directed to the Bluetooth specification for further implementation detail. In addition a user skilled in the art should be able to translate the flowcharts into useable code by reference to examples provided in the literature, for example the Microsoft Developer Network™ for the Windows™ operating systems.
  • FIG. 1 illustrates the general layout of the network. A roaming device, 106, which might be a mobile computer, PDA, cellular telephone or home appliance, comes within range of the fixed wireless link of a member, circles 107-110. The mobile device determines the connection methodologies available to it and their relative merits and then connects to the host using the best available standards.
  • Once the link has been established the cooperative tunneling agent examines the preferences of the roaming member and the fixed member and compares these with a database stored on the server. If the comparison generates a match then standard IP packets are encrypted and sent from the roaming device 106, thru the fixed device 104 or 105 thru any present firewall 103 thru the Internet 102 to our server via a link to the Internet 111. Our server 101 decrypts the packets and sends them onto the Internet via the link. Return packets from the Internet are passed back to the server and are similarly routed back to the member via the encrypted links.
  • There are two scenarios; corporate and home users. A home user depicted as PC labeled 104 typically makes a direct connection to the Internet 102 without the benefit of a firewall 103. A corporate user connects to the Internet thru a proxy server and firewall 103. These two functions are shown as a single block but may be comprised of several physical units; a router, a server, a proxy server, a firewall and a security monitoring computer. For our purposes it is not important how many physical or logical blocks are involved merely that there is a Firewall function that we need to negotiate. Firewalls provide a range of services. Primarily they block all ports except the commonly used business ports such as http port 80. This stops hackers accessing systems using older methodologies that often grant considerable powers to a user. In addition the firewall may block specific web sites thru the exclusion of certain IP address lists—‘black list’.
  • These preferences may be appropriate for the corporation but wholly inappropriate for the member requesting the tunnel. Therefore the tunneling agent can encode all packets and sends them thru port 80 bypassing any corporate specific snooping of the data. If the UDP (“user datagram protocol”) port is available this may be preferentially used for sending VOIP and other real time packets.
  • References to the server in this description may apply to any server providing our service. There may be more than one server on the network. Accesses may be cached at any point in the network. There may be several synchronized servers located geographically to improve throughput and efficiency of the system. The actions of the server may be split across several logical or physical devices so as to optimize performance. In addition some specialized tasks may be offloaded to third party servers. The server may be the computer of another member such that there are no specialist servers in the system and all tasks are distributed. In such a case the members database might be duplicated and distributed thru the network to provide security and redundancy and a VOIP a single point of failure.
  • FIG. 2 is a flowchart giving the steps required to establish a link and obtain access to the Internet. The tunneling agent running on the client computer sits in a loop attempting to find a network node 201. The polling rate can be set by user preference or turned off and re started by user command at a later stage. In the case of a Bluetooth™ radio link the link protocol will find a network node and establish the physical link in step 202. At this point a physical link exists between the two devices but no services are yet available. The host computer has been pre-configured to direct all physical links to the CTA (cooperative tunneling agent) which acts as a gate keeper for all network access thus the logical link 203 is set up to point only to the CTA. The client then sends the client ID and associated information to the CTA. If this is the first access by a user to the host system the local match step 205 will always fail. However the match can fail for two reasons. Firstly that the preferences don't match immediate failure can be notified to the client without reference to the server. If the preferences match but insufficient information is held to determine whether a complete link can be made the host will contact the server. (In certain circumstances such as the request for a non-client-secure link the client and host can operated independently of a server.) The client and host information is sent to the server in step 206 and the server attempts to make a match in 207. If the match fails a link is not made and the user is notified and given options to modify their preferences and start again. If the match is successful the link is made and link information is cached on the host machine. This information can be used to reestablish the link without reference to the server if the link is broken. A mobile user who is on the edge of range may be constantly moving in an out of range so caching the link information allows the link to be made and broken quickly without a server request being required every time.
  • FIG. 3 is an excerpt of a member record showing the important elements in creating; a match between cooperative members. A person skilled in the art will appreciate that there will be other fields required to fully describe the customer and log historical information but these are generic to all ISP (Internet Service Provider) customer records. Remembering that every user can be a host or client, the record is appropriate for all members. The record is divided into three main sections: general data 301, tunnel provision 302 and tunnel request 303. In simple terms the member agrees to grant access to the Internet on certain terms to other members. Members define the parameters on which they will accept access. If two parties come into range and the granting and accepting criterion match, a link is enabled. The most common link is a fixed member (host) connected to the Internet by an always-on connection, such as an ADSL modem, granting free access to a mobile member. Another common connection occurs where the host is connected by metered access. The host can inform the client of the cost prior to making a connection to the network. The process by which this information is used to establish a link is detailed in FIG. 8.
  • FIG. 4 is the flow diagram by which cooperative networking capability is enabled. In step 401 the user logs onto the website to requests the service. In step 402 software is downloaded to the member device. In step 403 the software scans the members system and determines the connection methodologies available, sets parameters and directs the flow of data from those methods to a secure piece of software. In step 404 the user sets the tunneling preferences that they wish to grant to other members along with their personal details. In step 405 the user sets the access provision preferences they would like when they use the network. In step 406 the system summarizes the preferences and confirms they meet the customer policies pertaining at the time. These preferences are stored on the host client with the associated user ID. Confirmation of credit approval can be given at this point.
  • One skilled in the art would appreciate that the software could be provided by other means such as a floppy disk or CD-ROM.
  • Rather than downloading and running the software on the client system, the software could run on the server and client system using a method such as Active Java™ Pages. However in order to configure the client system the software will need to undertake a number of low level tasks which might be protected from modification by a Java program and downloadable program elements are generally required.
  • Some operating systems, when connected to a new network, automatically log onto a default network specific web page upon boot-up. This feature can be readily provided so that a client system has only to connect their computer and turn it on and the host node will automate steps 401 and 402.
  • In the absence of a network connection the host computer may store a copy of the installation and registration software so that the registration and setting of preferences can be performed off-line and then uploaded to the server upon next connection.
  • The configuration software may be ‘beamed’ from one user to another or transferred over the link to user who does not yet have the service by a push or pull methodology.
  • FIG. 5 illustrates recursive service discovery. In this specification we have generally discussed systems where there is one fixed node connected to the Internet providing one or more Internet connections to mobile nodes. However it may often happen that a mobile node is not within range of a fixed node but is within range of another mobile node that is itself within range of a fixed node: a two hop connection. In this figure we show a three-hop connection. A mobile user 505 wants to gain access to the Internet. Thru the wireless network it connects to another mobile user 504 and requests a tunnel to the Internet. This unit is not connected to the Internet thru a wired connection and so itself makes a request to another unit 503. This unit, although fixed, has no hardwired Internet connection and so connects another Computer 502, which does have a connection to the Internet 501, and a link is made. In this example the link is established on a request basis as it is undesirable to establish a permanent link for power conservation: a pull system. However the link between 502 and 503 can be established once and be substantially permanent as both units have mains power supplies: a push system Thus the network can spread out to all permanently powered computers that are within range of each other and can be further increased in size on an ad hoc basis by requests from mobile units. The scope of the network may be pushed outwards to encompass all available nodes or pulled outward by devices wanting connection to the fixed network.
  • In order to save power it may be necessary for systems to synchronize their waking by registering a time pulse from the server and waking at predetermined times. (Packet delay time must be measured and added to the time synchronization pulse to ensure accurate synchronization of the servers.) Thus all the components in a system may wake at a predetermined time to attempt to push the network outwards.
  • FIG. 6 illustrates in block diagram form the elements of a system. The client Browser 602 is pointed at the cooperative network website. It downloads and runs a program that sets up the computer. (This set-up was described in detail in association with FIG. 4.) The set-up means ensures that the correct drivers are installed on the computer to physically utilize the ports of the computer and that the IP stack and network resources are available and can be intercepted. Depending on the exact OIS, the CTA cooperative tunneling agent will either redirect all network calls thru its routines or provide a simple means for switching itself in when needed. The best method is usually described with examples in the documentation of the operating system. The software for the client is the same as that of a host system but the CTA on a host system only needs to talk to the uplink as there is no further downlink to manage. That said the downlink must be left in a state awaiting connection so that a multi-hop request can be made.
  • The host computer runs two IP stacks and two sets of network drivers. The first set 606 and 609 are used to communicate with the client. The second set 608 and 610 are used to talk to the Internet. The CTA 607 provides a low level link between the two. The host browser and applications are generally unaware of the presence of the link unless the host desires to know, in which case it can either run a utility, point to a predefined web page or enable a status notification. The host applications utilize the IP stack and drivers 608 and 610 in the normal way. The server comprises a server engine 617 that performs all the tasks of linking with the Internet and decrypting and re-routing; packets. A store containing the latest configuration software 615. The matching rule file 616. The member database 614 and the web pages which together form the web site 613. A packet from the client takes the following path. In the case where the client makes a web page request the browser routes the call to the IP stack in the client computer. The CTA intercepts the request, encrypts it and encapsulates the packet in a new packet, which is routed to the host. The host picks up the packet and routes it thru the CTA to the outgoing stack, adjusting the IP address appropriately. The server receives the packet, de-encapsulates it, decrypts it and sends it onto the web. When a reply packet arrives, it is encrypted, encapsulated and sent to the client. Further details on implementation of tunneling protocols can be found in the literature.
  • FIG. 7 is a table describing one potential typical day for a mobile Internet user and illustrates the complex options available for connection and the many hand offs between systems. Starting in the home 701 the user has a cable modem giving access to the Internet at 500K bytes per second. Walking to the train 702 potential access speed drops to 9.6 Kbps using their mobile phone. On the fast moving transport mode of a train 703 the potential connection speed is limited, even in the new 3G networks that are being proposed. Once at work a free connection is available to the Internet using the office LAN 704. When the user goes to a meeting they disconnect from their LAN and move either to a different LAN node or a mobile network provided by the IEEE 802.11 standard 705. As they go out to lunch in a local coffee bar Starbucks™ they have access to a public Bluetooth node 706. Back in the office 707 LAN access is again available. Cell phone is available as they walk to their car 708 and drive in their car 709. At a gas station where they stop, a Bluetooth link is again available for high speed access 710. At a friend's house an ADSL link is available 711, but connecting to that LAN could be by a variety of means, including Bluetooth link or network cable. After leaving their friends house our user goes via Taxi 712 to a Hotel where a high speed Internet link kit is available in the closet of their room 713. It is an object of our Invention to make such mobile use simpler by provision of means to mediate the handoffs between these systems, store user and network data centrally and to provide common access links to all these different networks.
  • FIG. 8 is a flowchart illustrating the matching process. The matching process obtains the host 801 and client ID 802 and looks up the record on the database 803. It then attempts to match the access permission with the desired access 804/805. If this fails the client is asked whether it wants to change preferences 806. (Typically the failure will occur because the client has no settings for obtaining a paid link to the Internet if the host is a commercial link or a cooperative link with non-zero incremental cost for access. The host will want to pass this cost onto the client.) This will require the client to amend their record 807 to provide billing info and to set the maximum connection charge and per minute charge that they are prepared to pay for an Internet connection. In the case of a paid link they can further set a budget for link costs.
  • FIG. 9 illustrates handoff between a fixed wireless, Internet based, VOIP system and the cellular system. A mobile user 907 is within range of two methods for placing a call; a PC running our cooperative networking service and a cellular tower. The call might be preferentially placed to either unit based on the users pre-set preferences or based on the current situation. Both links could be made or broken independently and exist simultaneously. In the case of connection made over the Internet voice packets are sent over the air using a wireless link such as Bluetooth or IEEE802. I to the host 905 These packets are routed thru the Internet 901 to a VOIP server 903. The VOIP server converts IP packets to a form suitable for use over the PSTN and handles making and breaking the connection to users. There are many VOIP servers, two are shown here, located in each region such that the call is placed at a local rate. If the user moves away from the fixed wireless link 905 or the Internet becomes congested such that call is no longer of sufficient quality, a factor that can be determined either automatically or by the user the call can be dialed on the cellular link. There are a number of methods that handoff could take. Firstly the call could be dropped by the VOIP server and a new call initiated end-to-end thru the cellular network to the destination 908. This would result in a break in the call. More suitably the mobile device would call a VOIP, either the existing server 903 or a server located near to the caller 910. The VOIP server would take information from the cooperative network server and route the call to the already established PSTN link and then to the destination 908 thus maintaining the call. A benefit of this is that the call is not dropped, interrupted or reinitialized. A further benefit is that mobile device can place a call to a local VOIP server 910 which forwards the information to a VOIP server local to the receiving party thus saving cost. The call routing between the two VOIP servers can be via the public Internet (dashed line) or thru a proprietary network.
  • The host node may send data using IP over the air or it can emulated the Bluetooth™ air interface and appear as a cordless telephone base station for the client device. By this method no specialist software needs to run on the client device if that device is a handheld phone or similar. Security can be preserves by not decrypting the air interface on the host system and passing the un-decrypted information onto the server.
  • Ramifications
  • The use of this technology will enable a number of commercial services that have hitherto been prohibitively expensive or complex.
  • Roaming users will be able to get automatic high bandwidth connections to the Internet wherever there is another member present. Since members can be commercial or cooperative in their action this will allow ubiquity of service.
  • One can envisage a member parking their car outside their home. The CTA connecting automatically to their home computer and synchronizing their MP3 music collection with their on board hard drive.
  • One can envisage a member driving into a gas station, purchasing a movie for their children using the onboard computer and while gas is being pumped and paid for the movie is downloaded to the on-board entertainment system.
  • FIG. 10 illustrates a wireless VoIP system for a wireless enabled home, office or public environment using commonly available systems such as GSM, SIP and UMTS (3G) but other similar systems might be used in substantially the same way for example CDMA (Code Division Multiple Access) and the H323 protocol. A mobile phone 1001 is present in the environment of a PC 1013, a wireless LAN access point 1002, GSM network 1004 and 3G network 1003. Each system is connected to the PSTN 1012 by differing routes.
  • A call may be made via the PC 1013 or WLAN AP 1002 by way of one or more switches (or routers) 1005 connected to the Internet 1008 and through a SIP proxy server 1009 a SIP server 1010 and a media gateway 1011. For the 3G network 1003, packets must transit the telco packet switch network 1006 prior to reaching the Internet 1008, while the GSM network 1004 is connected via the telco circuit switch infrastructure 1007 directly to the PSTN 1012. The range may be extended and the protocols translated by a repeater 1014.
  • With the exception of the GSM network 1004 shown, the other routes will utilize the Internet 1008. In those cases, the SIP proxy server 1009 provides media transcoding functions, the SIP server 1010 provides call management and mobility management functions while the media gateway 1011 translates media and signaling for the PSTN 1012 so that a call can be made to a general number, for example a telco circuit switch network 1007.
  • As described later in reference to FIG. 11, the phone can be modified to include a SIP stack or Micro stack (that is simply a functional subset of SIP) for signaling. Enabling the WWAN (typically UMTS) layer is done by issuing an attach command. Enabling the WLAN connection is done by issuing a pairing and connect command to the Bluetooth subsystem or the equivalent for a Wi-Fi enabled device. Both WWAN and WLAN connections may be made simultaneously providing multiple IP connectivity paths to the same point.
  • Once a SIP (Session Initiation Protocol) connection has been made, the low level DSP (Digital Signal Processing) subsystem of the phone provides its audio streams to the high level multimedia subsystem within the phone which encodes the voice into RTP (Real-time Transport Protocol) packets. VoIP data (RTP stream plus signaling) is sent over the Bluetooth data link to an access point (AP), for example WLAN AP 1002, which routes the VoIP packets to a SIP server through the Internet 1008.
  • If the packets are destined for a party that does not support VoIP they are sent to a media gateway that transcodes the packets into Common Channel Signaling System No. 7 (SS7) data for onward transmission to the Public Switched Telephone Network (PSTN) or a private branch exchange (PBX). The process operates in reverse for the return leg of the call. However, if the call is destined for another VoIP enabled party they are routed to that party over IP (if no transcoding is needed, and NAT (Network Address Translation) traversal is not an issue, then the RTP streams will be sent directly peer to peer).
  • In one embodiment of the proposed system the phones have two numbers—a conventional WWAN phone number and a ‘native’ number. The owner can choose to use either or both of these numbers in various ways as described. The owner need not be aware of this as the initial configuration on purchase can map the two numbers together for all practical purposes. If the network provider had both an IP and a mobile range within their switching infrastructure the two numbers can be completely hidden. If the system is deployed by a network carrier who has number processing capability then one number can be issued to a customer and the number processed to route calls, however if deployment is required in the telephone system by a non carrier then the following description illustrates how the incoming number routing problems are solved:
  • Calls made between this embodiment of the present invention system and a landline or mobile number require two types of servers:
  • Servers capable of call forwarding and proxying. Typically these would be Session Initiation Protocol (SIP) Servers or Common Channel Signaling System No. 7 (SS7) servers.
      • 1) Media gateways which can translate VoIP traffic into PSTN (SS7) traffic or analogue voice traffic and vice versa.
  • Calling scenarios (the handset of which is hereafter referred to as a ‘Truphone’ for brevity) in the home and connected via WLAN (Bluetooth or Wi-Fi) are shown in the table below: The existence of a SIP server and media gateway operated by the provider of the Truphone service is referred to as the ‘system SIP server’.
  • TABLE 4
    From To Call route
    Truphone Landline VoIP call converted by media gateway to analogue
    voice locally to the receiving number and routed to
    landline by SS7 or SIP server.
    Truphone Mobile VoIP call converted by media gateway to PSTN
    data locally to the receiving number and routed to
    landline by SS7 or SIP server.
    Optionally, the Truphone can identify whether the
    recipient is on the same network and in the same
    country as its own connection, and if so places a
    conventional phone call.
    Landline TruPhone Call passes through SS7 or SIP server, which will
    native or first identify whether the call can be routed as VoIP,
    PSTN and if so route the call via the media gateway for
    number format translation and forward the data to the
    Truphone IP address. The initial data packets are
    specially formatted to cause the Truphone to ring
    (SIP invite packets), and also cause the Truphone to
    wake as described. If not, hand the call on to the
    phone network.
    Landline Truphone Handle call pursuant to conventional mobile call
    GSM procedures.
    number
    WWAN Truphone If the mobile operator has a suitably configured
    GSM (or GSM SS7/SIP server, then the call can be routed to
    UMTS number Truphone VoIP or Mobile connection according to
    voice) user preference, otherwise a conventional mobile
    Mobile call is made.
    WWAN Truphone If the mobile operator has a suitably configured
    GSM (or native SS7/SIP server, then the call can be routed to
    UMTS number Truphone VoIP
    voice)
    Mobile
    Truphone Truphone End to end VoIP call, route established by P2P
    discovery techniques, if possible
  • When placing an outbound call in range of an IP network (e.g. Bluetooth, UMTS, or Wi-Fi), the phone will search in layers in a sequence as follows:
      • 1) Peer-to-peer (P2P) radio connection via Bluetooth—i.e. call recipient has a Truphone in the same or a nearby room
      • 2) Mediated P2P radio connection via the repeater, or home hub (i.e. WLAN)—i.e. call recipient has a Truphone in the same building
      • 3) P2P connection via internet WAN connection—i.e. call recipient has a Truphone in range of an IP-enabled network anywhere in the world
      • 4) SIP proxy-ed call, where one SIP server passes the call to a second SIP server that then terminates the call or itself passes the call on again.
      • 5) IP routed to a local node and then call termination to a landline or mobile—i.e. recipient has a conventional landline or mobile phone anywhere in the world.
  • Some of these layers may be skipped for an individual call, based on configuration information or previously discovered location/available connection information. If the phone cannot reach an IP network it will place a conventional mobile call.
  • Many mobile subscribers have poor or no mobile network coverage at home, and this is a significant cause of subscriber chum for mobile operators. One of the benefits of the phone is to solve this problem. The subscriber in this scenario needs both incoming and outgoing calls, regardless of origin or destination, to be routed over the VoIP radio link (initially Bluetooth). The following scenarios apply:
  • TABLE 5
    Scenario What happens
    outgoing calls routing is under the control of the Truphone
    Incoming calls placed The server will route and translate appropriately.
    to the Truphone GSM The subscriber can choose at the initial
    number where the configuration stage whether calls that are not
    mobile operator has a answered should be forwarded to the normal
    suitably configured GSM voicemail service, or to some other
    SIP & media server. answering service.
    Incoming calls placed When the phone connects to the home WLAN, it
    to the Truphone GSM automatically uses DTMF to connect to the mobile
    number where the providers configuration service and change the call
    mobile operator does divert rule so that incoming calls are routed to the
    not have a suitably Truphone native number (or this rule could be left
    configured SIP & permanently in place). The subscriber would,
    media server. however, in many cases have to pay for each
    diverted incoming call.
  • FIG. 11 is a functional block diagram for the phone 1100 and PC 1127 when using a Bluetooth and/or Wi-Fi and data enabled phone as the radio transport mechanism and a PC with Bluetooth and/or Wi-Fi connectivity: The PC is configured as a bridge. Full duplex, bi-directional audio is implemented using the multi-media record 1102 and play 1103 systems that are resident within the phone. Multi-media record system 1102, play system 1103, CODECS 1104, and 1105 can all be implemented using a Digital Signal Processor. A short or long echo cancel 1106 system may be implemented by subtracting a proportion of the play stream from the record stream with an appropriate time delay—such systems may be fixed or adaptive. Comfort noise may be added by noise module 1107 so that the user is not disconcerted during quiet periods. SIP authentication module 1108 is implemented by the user inputting their SIP user ID and password (which can alternatively be auto provisioned) and then placing a call by typing the phone number on the phone keypad or selecting it from the phonebook 1101.
  • Once the SIP call is set up, audio is sent via the RAW/RTP module 1109 into the socket interface 1110 on the phone which is then connected either to the Bluetooth subsystem over RFCOMM (Radio Frequency Communications Protocol) module 1111, or directly to L2CAP (Logical Link Controller and Adaptation Protocol) module 1112 or directly to the HCI (Host Controller Interface) 1115, or in a Wi-Fi system to the MAC (Medium Access Control) and PHY (Physical) layers 1114, 1117, or in a 3G system to the 3G and hardware layers 1115 & 1116. L2CAP communicates using HCI commands over a UART (Universal Asynchronous Receiver/Transmitter) connection to the Bluetooth ‘below HCI’ hardware 1118 which implements a radio connection to the PC 1127 hardware Bluetooth element 1119 which reverses the radio packetisation and delivers the packet to the HCI 1120, L2CAP 1121 and RFCOMM 1122 layers and then onto a socket 1123 on the PC 1127. For a PC with Wi-Fi, communication is made over the MAC 1118 and PHY layers of the Wi-Fi card directly to the Socket subsystem 1123 on the PC. For a PC with 3G capability, communication is made over the 3G and Hardware layers on the 3G card 1131 & 1130.
  • A protocol stack on the PC then performs any SIP conversion necessary through SIP converter 1124, bridges to external IP (using an IP or MAC bridge or Bluetooth to IP conversion) and sends the date to the Internet via the PC's Internet connection. The PC may implement an authentication layer 1126 itself by way of a cooperative tunneling agent (CTA) or other means 1126 so that the server knows whose PC the call was routed through for billing and logging purposes. The on-going Ethernet link 1134, 1135 may itself be a wireless link. In this way, the PC has been configured as a Bluetooth to Wi-Fi repeater.
  • An important element of the stack organization is that the socket interface is multi-homed and connects to more than one transport layer simultaneously and the SIP/RTP interfaces can connect across the socket layer to multiple lower layers simultaneously.
  • An optional SIP conversion by module 1124 implements a subset of full SIP when talking to the phone so as to minimize code complexity and processor load in the phone. This penultimate device in the IP routing chain is either a PC 1127 or an access point (not illustrated) and runs the MicroSIP to SIP translation function as follows. The PC device is programmed to implement fully compliant SIP, RTP, RTSP while the phone 1100 can then implement a subset. For example, it can assume that all the packets are transmitted in order with no duplications, that the RTP headers have already been processed and removed leaving raw audio packets and that only the subset of SIP commands that it is programmed to deal with will be transmitted (the PC or access point will intercept and deal with all other protocol elements).
  • Once the SIP conversion has been done the PC forwards the stream to the Internet by way of its network controller MAC and PHY 1134, 1135. Once in the Internet the data will be routed to the proxy server or another client within the system. We also show that the 3G (UMTS) path from the phone 1115, 1116 reaches the Internet 1128. This happens by way of the 3G Network which is not illustrated. Once here packets may route anywhere on the Internet. It is worth pointing out that because of this connection point via the Internet 1128 the phone is connected by two routes to the Internet and the PC is potentially connected to the phone by at least two routes: The WWAN route via the Internet and one or more WLAN routes through the radio layers 1132 and 1119. This allows the PC to perform all the functions of a server if server code is placed within the PC 1127. This allows the invented system to operate in a pure Peer-to-peer mode without the presence of a server and server code can be placed in the handset(s) to perform pure peer-to-peer operation.
  • The path between the phone and PC in our preferred embodiment when operating over Bluetooth and connecting from a Nokia™ phone to a Microsoft Windows XP™ PC is the Serial Port Profile (SPP): This is the only Bluetooth profile that the two share. In other embodiments of the invented system, PAN profile or LAN access profile would preferably be used with BNEP protocol or RFCOMM.
  • FIG. 13 compares and contrasts the typical configurations of the three main forms of converged phone solution; UMA, the proposed Invention, and CTP.
  • a) In a UMA system the mobile subscriber (MS) 1308 connects over WLAN 1309 through an IP broadband system 1310 to the UMA Network Controller (UNC) controller 1302, 1311 using the Ub protocol specification. This UNC controller performs the job of a base station controller (BSC) in a cellular system, handling the de-encapsulation of protocols and managing mobility and handoff in conjunction with the cellular core network. The UMA controller 1302 interfaces with a set of subsystems within the core network HPLMN/VPLMN 1301 a to provide cellular coverage over WLAN. Roaming authentication is handled by way of an AAA proxy call between 1313, 1316 to the home location register (HLR) 1315 a of a roaming subscriber in their HPLMN 1314. If successful in authentication the UNC handles the signaling required to achieve handoff. In order to make a call outside the core cellular network, for example to another cellular network or a fixed line subscriber, a gateway to the mobile subscriber controller (GMSC) 1305 is used to communicate either over SS7 1303 or SIP 1306 to other subscribers. The subscriber mobile location controller (SMLC) 1300 can provide valuable information regarding customer location to aid in discovery of WLAN connectivity and provide mobility and location services. The interfaces between the UNC and core network are:
      • A-interface, circuit Switch
      • Gb-interface, packet switch
      • Lb-interface, locations services
  • b) In the proposed invention packets initially take the same path as in a UMA solution, originating from an MS 1319, traveling over a WLAN router 1320 via an IP connection 421, but then arriving first at our server that supports SIP 1318. The packets themselves are simpler in format (see FIG. 26) than in a UMA system as less protocol encapsulation is required. The SIP server is the main centralized control element in our system, interfacing with all the other systems and managing roaming, handoff and location management, but the handset can take control in a number of cases and obviate the necessity for a server, providing peer-to-peer capabilities that are not envisaged by UMA.
  • The SIP server in the invented system performs a number of tasks which are more fully described later in FIG. 15. To make a call the SIP server communicates via a media gateway function 1317 over SS7 or if the other system supports a SIP interface directly using SIP. A SIP connection to a cellular core network GMSC (Gateway Mobile Switching Centre) 1326 is shown for example. Authentication is provided using RADIUS (Remote Authentication Dial-In User Service) to ANY AAA (Access, Authorization, and Accounting) server and might include RADIUS proxy authentication calls to the cellular core network 1330, 1333 or any other AAA server that the user specifies (including one that is part of the SIP server 1318). The core network VPLMN (Visited Public Land Mobile Network) 1323 pictured is out of scope for our system, as is the UMA 1324, UNC 1329 block, so these are not further described. The WLAN router 1320 may contain a subset of the SIP server 1318 and media gateway 1317, such that it is able to route calls directly to the PSTN locally.
  • c) In a CTP system the MS 1335 must support CTP and the WLAN device 1336 must also support CTP—a standard Bluetooth profile. This Bluetooth device must be paired with a transcoder 1337, able to convert the Bluetooth CTP protocol either into SIP protocol or telephone system (POTS/ISDN) signals for carrying down regular telephone lines to the PSTN 1339. The WLAN Bluetooth transcoder may convert to SIP and route over an IP broadband connection 1338 to a SIP server 1334 which can terminate calls to the PSTN via a gateway or proxy SIP calls to further SIP servers. However this SIP server does not have end-to-end SIP connectivity with the MS 1335 which limits the call scenarios that may be handled.
  • One of the problems that have to be accommodated when utilizing both WWAN and WLAN networks is the problem of handing off the call between the networks. With regard to FIG. 14, handoff cases will now be described with reference to a state diagram but firstly we should define what handoff and handover are and the different forms that they take. Handoff involves passing the user to a different network. Handover involves passing the user to a different radio antenna on the same network.
  • Seamless handoff is where:
      • I. The user does not have to do anything
      • II. There is no break in the call
        • You can also have seamless handoff with the audio visual warnings but without requiring the user to actually press a button to choose what they want to do unless they choose not to handoff.
  • Non-seamless handoff is where:
      • I. Where user has to make a decision and take some action—such as to walk back into WLAN coverage.
      • II. Where there is an appreciable break in the call
  • Make-before-break is where packet streams are sent via two paths during handoff/over. Break-before-make is where there is a pause in packet sending as handoff is made. Break & Make is where there is such a short time between the break and make that the user does not notice it even though it is technically a break before make event. Pre-buffering and rate conversion techniques can be used to smooth over a break-before-make handoff so that the listeners do not hear an interruption, however there is a transitory increase and then decrease in latency which might be noticed by some users.
  • Handoff Cases
  • TABLE 6
    Case Handoff from Handoff to Arrow Typical use case
    Case Voice call on Voice call 1460 Walk away from Wi-Fi
    1 WLAN on WWAN AP where 3G is
    (IP Circuit) (IP Circuit) available, picks up
    UMTS data connection.
    Case Voice call on Voice call 1459 Walk into Wi-Fi
    2 WWAN- on WLAN coverage area call is
    Audio Circuit (IP Circuit) diverted to Wi-Fi and
    GSM call drops.
    Case Voice call on Voice call 1458 Walk away from Wi-Fi
    3 WLAN on WWAN- AP, (no 3G) reverts back
    (IP Circuit) Audio to GSM call via
    Circuit conference feature.
    Case Voice call on Voice call 1454 Voice call on GSM
    4 WWAN- on WWAN switches to voice call on
    Audio Circuit (IP Circuit) UMTS-VoIP
    Case Voice call on Voice call 1457 Voice call on UMTS-
    5 WWAN on WWAN- VoIP switches to voice
    (IP Circuit) Audio Circuit call on GSM
    Case Voice call on Voice call 1464 WLAN becomes
    6 WWAN on WLAN available again and call is
    (IP Circuit) (IP Circuit) switched back to use it.
  • Discover Case
  • TABLE 7
    Case From To Arrow Notes
    Discover Case WLAN off WLAN 1453 Discovers and connects to
    1 connect WLAN
  • Case 1: WLAN to WWAN-IP (UMTS, EDGE, GPRS and others)
  • In a case where a call is currently progressing over WLAN via an access point and the user moves out of range the phone will switch to transmitting the packets via WWAN. Prior to handoff, the mobile device will have communicated with the SIP Micro-Proxy in the Access Point or server to ensure that both WLAN and mobile data paths have connectivity, at least during the discovery and authentication process 1453 and probably from time to time due to handover or polling events, 1462, 1463. (A SIP Micro-Proxy supports a subset of SIP such that it can provide similar functionality to that of a full SIP server as now described.) The phone will be known to the server by two IP addresses which are resolved in the SIP server or SIP Proxy by a Network Address Processor (NAP). In some cases the phones IP address may remain the same via both paths even though the paths differ and ports may be used to distinguish the two streams. If neither the ports nor IP address differ the RTP systems should still cope with the packet duplication as this is a standard feature of the SIP/RTP protocol.
  • As edge of range is detected by way of either, Receive Signal Strength Indication (RSSI), Bit Error Rate (BER) or Network Location Services (NLS), the phone will initiate handoff using either a seamless or non-seamless method.
      • a) Seamless handoff is achieved by either rapidly switching the IP stream from the WLAN socket to the WWAN socket connection ‘break-before-make’ OR, copying the IP stream to two sockets and once end-to-end connectivity is proven stopping the stream to the WLAN socket ‘make-before-break’.
      • b) A non seamless handoff is achieved by using ‘break-before-make’ handoff and notifying the user using some form of audio or visual indication that the WLAN connection is becoming or has become unavailable and giving them the option to either move back into coverage, accept the handoff, or terminate the call. This allows the user to move back into coverage and deliberately avoid handoff. Users rapidly learn the limits of range within their environment.
  • The benefit of non-seamless handoff is that the costs associated with the new mobile data link may be higher and notification of the user is desired. FIG. 12. is a call flow diagram showing one embodiment for handing off a call that was initiated as a WLAN call and will be switched to a WWAN-audio protocol call. The SIP server supports conference calling function. At the starting point a call is in progress 1205 (the set up of which is not shown) between the mobile phone and the fixed phone: The mobile phone 1201 is connected to the SIP server 1203 via an access point 1202 which is in communication with a PSTN phone 1204. All calls in the system are setup as a conference call so that when the SIP call is broken because the user moves away from the WLAN access point the onward call is held 1207 awaiting further parties to join. This call is held for a programmable time period, typically 10 seconds, and a notification is made to the user that the call is handing off if handoff has not been made within 1.5 seconds. Greater than 1.5 seconds being an arbitrary definition of the boundary between seamless and non-seamless handoff that can be varied as required.
  • The WLAN 1215 and WWAN 1214 control, C and media, M channels are shown to the left of the mobile phone 1201. The mobile now sets up a call by one of two mechanisms. If a WWAN channel 1214 is available then using a SIP call method with invite 1208 acknowledge 1209, 1210 mechanism the phone re-joins the conference call 1212. The media stream is re-made 1213 and a handoff between WLAN-VoIP and WWAN-VoIP is effected.
  • Alternately, if a WWAN-IP connection is not available, under control of the handset software client, the phone dials using the native voice calling capabilities of the phone (WWAN-Audio) and joins the conference via the PSTN. The media stream is transcoded from the PSTN and re-joined to the conference bridge. In general the dial up procedure takes 2-7 seconds and so will rarely be seamless but in some networks high speed connection is available and seamless connection can be achieved.
  • There are many other call cases and handoff cases that this technique can be applied to.
  • A make before break alternative can be used where WWAN-IP is available such as in UMTS. A duplicate audio path to/from the proxy via another IP route is created when hand-off is looking likely, then when hand-off is confirmed, the handset switches over to the new audio-path and disconnects the old one. This does not require any re-invites or conferencing as the proxy is the client as far as the server is concerned and so never changes its IP address.
  • Referring back to FIG. 14, Case 2 depicts the scenario of handing off from a WWAN-Audio to WLAN. A call is proceeding over the WWAN-Audio circuit typically a GSM call. The first step in handling this handoff is to determine the availability of a WLAN AP. There are two possibilities here depending on the availability of a WWAN data path. If no WWAN data path is available at this time because the call takes precedence, then the phone may pick up the availability of WLAN through its regular timed mechanism where it searches for potential availability of a WLAN connection as illustrated in FIG. 29. If a data path is available, then location based messages can be received to indicate a WLAN resource is available.
  • In either case the phone will acquire a WLAN resource through the discovery procedure. Transferring the call to WLAN will depend on the nature of the two phones involved in the call and the nature of the carrier network that started the call.
      • a) Call originator—the operator originating the phone call—has a programmable phone routing table.
        • In this case a signal can be sent by the server to the originators call center using SS7 or SIP to request the call media be re-routed to our server or directly to the phone end point.
      • b) Call terminator—the operator receiving the phone call for termination—has a programmable phone routing table. In this case a signal can be sent by the server to the call termination center using SS7 or SIP to request the call media be re-routed to our server or directly to the phone end point.
      • c) The call was made to an intermediate one number service prior to routing to the call terminator. This allows the call to be unhooked at this intermediate point by sending a message to the intermediate point using SS7 or SIP.
      • d) If both handset ends support our system then a message can be sent to the originating phone client to switch call methods to VoIP and obviate the need to signal to any call routing servers.
  • Case 3: WLAN to WWAN-Audio
  • Although handoff to WLAN-IP 1460 allows for the simplest architecture it is not always available. In particular WWAN-IP connections such as UMTS are only available in a limited number of countries and areas within those countries. Other WWAN-IP technologies such as EDGE do have coverage but data rate and latency are not useful for making a voice call on presently deployed systems. To solve this, the SIP server is used as a conference bridge to mediate handoff to a WWAN-Audio-only technology, such as GSM:
  • There are 3 methods of doing this:
      • a) Handset initiated handoff with the server.
      • b) Server initiates handoff with the handset
      • c) Handset takes over and bypasses the server.
  • a) Handset initiates handoff to WWAN-AUDIO: While making a VoIP WLAN call the signal conditions for data transmission become unacceptable. The SIP server is programmed to hold all calls for a predetermined time limit if streaming is interrupted and to allow all calls to be conference calls. (A SIP server consumes almost no resource to allow a call to be a conference call but there is a statistical calculation required of the media gateways to determine the number of PSTN/PBX connections that might be active at any time.) The phone application optionally reads the GSM RSSI to determine whether a handoff is possible, if not simply terminating the call. Once the phone determines that a handoff is possible it calls the conference call phone number, and the user is automatically connected to the other party in the call. (This is the same party with whom they are already in communication.) A smart phone is capable of calling a conference number and entering a DTMF password without user intervention and indeed totally silently so as to give the impression of an automatic relatively or totally seamless handover. In this case it should be noted that although there is a conference call function being used there are in fact only two parties: the caller and the receiver.
  • Note that it is not necessary for every user to have a unique conference number. A bank of numbers can be used and a specific number reserved only while the VoIP call is in progress. Once the call is over the number can be reused (with a different passcode) for other users—the number range only needs to be large enough to cope with the maximum number of active users plus a margin of safety. In addition the use of passcodes can be obviated if the caller line identification (CLI) from the handing off caller matches that stored in the user's record. This speeds the conference set up and improves user experience.
  • ‘Call-in handoff’ (where the GSM call to the conference bridge is initiated by the handset) is particularly attractive from a commercial point of view as the calling leg is initiated by the calling party using their normal mobile phone account and will be billed to their regular phone bill. There is therefore no additional cost incurred by the conference bridge owner. (In fact they will generally receive a call termination fee.) There is still an attractive price benefit for the user as the conference call number will generally be a local number chosen from a small table of least cost routes and the outward leg from the conference bridge will still be using VoIP call. The conference bridge is implemented by the SIP server so that an appropriate billing record can be generated for either the call as a whole, or the non-GSM portion of the call—the remainder being handled by the customer's normal billing mechanism.
  • There are a number of methods for implementing hand-back if the data channel recovers.
      • i) User initiated hand-back where a visual display of RSSI tells the user that signal is available on WLAN and the user simply presses a button to indicate hand back is desired. The conference bridge handoff is used executed in reverse.
      • ii) Phone initiated hand back where the RSSI for WLAN indicates good signal has been recovered and the phone initiates connection.
  • On today's devices the GSM call must then in general be dropped prior to reconnection of the VoIP call as the GSM subsystem must release resources to the VoIP system. In future phones it is expected that WLAN, UMTS and GSM could have simultaneous use of the phone's resources: the described scheme caters for both.
    • a) In Call-back handoff the conference bridge initiates the call to the mobile device when the VoIP call becomes untenable. This can be a benefit for phones with less scope for programmability and the user experience can be better with perceived lower handoff time but the financial implications are that the conference bridge makes an outward call which will incur a charge. If the SIP conference bridge is owned by the same organization as the customer's network provider then this is an internal charge and can be catered for by internal commercial arrangements
    • b) Handset takes over and bypasses the server: In this form of handoff, which can be viewed as a peer-to-peer handoff, the caller detects a loss of data signal as before and automatically initiates a regular GSM call directly to the called party. That party's handset recognizes the CLI (Calling Line Identity) of the caller's handset, knows that the VoIP call is having trouble (due to RSSI or error rate measure), accepts the GSM call, and simultaneously drops the VoIP call, presenting a near-seamless handover as the call control is automated by the Smartphone client software so that it is substantially invisible to the user. The benefit of this method is that no additional network resources are required for creating conference bridges but the VoIP service provider loses control of the call when this happens and both users must have a Truphone client to implement this method. The phones can still log call information for preparation of CDRs (Call Detail Records) and post them back to the VoIP provider SIP server at next reconnection. This is only possible where the destination caller can support two calls at once—one using the VoIP session and the other direct through a cellular network or PSTN—to perform the “make-before-break”. If this is not the case then the VoIP call must be dropped first and the PSTN call made immediately afterwards to perform a “break-before-make” handoff.
  • Case 4: This case is conceptually similar to case 2. A user on an audio call will switch to VoIP using the same mechanisms as explained in case 2 are available with of course the proviso that the call is re-routing to WWAN-IP not WLAN-IP.
  • Case 5: This case is conceptually similar in operation to case 3, in that a handoff is made between a VoIP call and a voice call with the same techniques being applicable. However in this case the phone needs to make a regular WWAN-Audio call, for example a GSM call in order to rejoin the conference bridge and maintain the call.
  • Case 6: is the inverse of case 1. A user making a call over WLAN-IP moves out of range and the handset switched to WWAN-IP. This is a straightforward switch as authentication remains valid and the call path in the higher level stack needs no change. In fact, in case 1 and case 6, the units can flip back and forth freely between the cases and the Network Address Processing element in the server (or the access point or repeater if implemented there) will ensure that the user appears to the rest of the world as if they are not moving between networks. Make before break, or make and break can be implemented to make the user experience optimal and indeed both paths may be used in poor signal conditions as a form of multi-bearer diversity signaling.
  • Handover Cases: WLAN→WLAN (Wi-Fi/Bluetooth)
  • TABLE 8
    Case From To Link Num Example use case
    Case A Bluetooth Bluetooth 1463, 1462 Moving around your home
    Case B Wi- Fi Bluetooth 1463, 1462 Approaching a Bluetooth
    capable AP and selecting it
    for lower power operation
    Case C Bluetooth Wi- Fi 1463, 1462 Leaving the Bluetooth zone
    Case D Wi-Fi Wi- Fi 1463, 1462 Moving around an office
  • The above handover cases are all capabilities of the invented system and allow the user to walk through a large space where a single access point can not provide complete coverage. Since the protocol stack is ‘all IP’ and communicates over a general socket layer, a handover between Bluetooth and Wi-Fi is possible. Once again, the SIP proxy can cope with two IP addresses or endpoints connecting to the same caller and handoff is a matter of beginning, sending packets on one bearer, and ceasing on the other. Packets can be sent over both bearers to give diversity reception implemented at the IP level and in devices that can connect to more than one AP, either Bluetooth or Wi-Fi then multiple packet streams can be sent to multiple AP's if desired. Another benefit of being able to switch from Bluetooth to Wi-Fi is to use the extremely low power capabilities of Bluetooth to preserve battery life.
  • With both Wi-Fi and Bluetooth in normal operation, standard discovery, pairing and authentication need to be executed as mobile devices move from AP to AP. Bluetooth reconnect takes 1.2-3 seconds if the devices have been pre-paired and up to 30 seconds if not.
  • FIG. 15 shows one or more servers within the system providing a range of telecommunications functions including call handling and termination. A call originates on the mobile phone 1512 and connects to the server 1500 via wireless connections WLAN 1509 and WWAN 1519 and an Internet connection 1510. The system comprises three main parts: a Media Gateway 1522 that handles the real time elements of media streams, a server 1521 that handles signaling commands, and an application 1511 that contains the logic and communicates with databases 1505, 1506, 1507 and other external sources of information. The signaling and streams are handled by the server as follows.
  • Authentication (Roaming):
  • The phone 1512 initiates a search for WLAN resources 1519 and locates them. Some resources ‘cloak’ and so the phone may probe using a system ID such as an SSID from its access rights table, other resources broadcast their availability publicly, for example by broadcasting their SSID in a Wi-Fi system. Once located the phone checks its local table of access rights and uses the appropriate logon authentication for this AP. The table is maintained in least cost order by updating from time to time from the LCR (least Cost Routing) data store 1507. For Bluetooth, access generally involves pairing with the device using a PIN although the AP's can be set in open mode: The link encryption key is automatically generated. For Wi-Fi either or both the SSID and WEP (Wired Equivalent Privacy) keys form keys for access to the system and these are provided automatically by the system—Advanced Encryption Standard (AES) and Temporal Key Integrity Protocol (TKIP) may be used in place of WEP.
  • At this point the user has achieved local connection to radio resources and a local IP domain. For connection to the Internet a user name and password must be sent to an appropriate domain controller with an optional affiliation. This is then authenticated directly or via Radius proxy authentication for which an affiliation is usually required. This process is generally automated by roaming software located in the LAN that will attempt an authentication against a broad range of possible service providers but may also be provided by the cooperative tunneling agent described in above.
  • TABLE 10
    Access Right Table
    Generic Bluetooth Wi-Fi
    Hardware ID Bluetooth Address MAC Address
    System ID Name SSID
    Name Name SSID
    Access key PIN or open SSID or WEP key or open
    Security Key Self setting WEP key or self setting
    Affiliation Affiliation Affiliation
    User Name User Name User Name
    Password Password Password
  • This table of access rights is updated from time to time with information that is relevant to the approximate location of the user and their behavior pattern so that only a subset of access rights needs to be stored at any one time in the mobile device. If the access rights table does not include the WLAN access point in its table then the phone sends a request via WWAN for an updated access rights entry for that resource giving as much information as possible to narrow the request and minimize the data sent. If no access information is available then a service ticket is generated according to the distributed discovery description below.
  • Distributed discovery is enacted when a radio resource has been located but no authentication was achieved. A service ticket is automatically sent to the Access Point Location register 1505 with as much detail as possible, ideally using WWAN network location services or global positioning system (GPS) location information to exactly pinpoint the AP. The central server can then take a variety of actions to contact the radio resource and recruit them to the system. An automated method is available by creating and publishing a naming specification that the AP resources may use that allows owners of AP's to give the AP a unique address that can be resolved to the email address of the owner. The distributed discovery method is an automatic system for users to cooperate to grow the network and is akin to other distributed computing methods. For cooperative access points that want to ensure security using link keys those keys are provided over the WWAN encrypted connection to authenticated users.
  • For some systems access to the Internet is much simpler than the above general process as the AP and IP systems are configured for public access directly to the Internet. Further Truphone Zones systems are configured to allow free access to the IP address of a Truphone server on the understanding that revenue is derived by the AP owner from a share of calls rather for timed access to the network resource. The Truphone server logs the IP of the access point from which the call packets originated and the client may give the IP address and system ID of the system that allowed it access for added security.
  • At this point the user has been authenticated to the radio resource, encrypted that link if desired and achieved access to network resources, either the Internet or a restricted subset of address ranges or a local address range for corporate users residing within their offices. The user desires to make a call and the mobile device signals to the application server. The application server checks its active subscriber register to determine if the user is in good standing (no blocks on accounts, credit available or credit worthiness still active), again Radius proxy authentication may be enacted for users that are not ‘home’ on this server and whose primary records are held elsewhere. The least cost route database will then use available information from the Access Point Register, Location information provided by the phone and IP address range information to form a least cost path. The priority for routing is:
      • a. signaling the phones to route VoIP media data locally at the radio layer,
      • b. to route within their LAN,
      • c. via the optimum path in the Intranet,
      • d. via the optimum path on the Internet,
      • e. via the optimum path over PSTN having routed through an appropriately located media gateway. Either the local gateway 623 or one located on another SIP server in closer proximity to the PSTN end point.
  • The Media Gateway 1523 is involved in a number of scenarios:
      • i) When the call must be terminated to the PSTN 1517 and therefore converted to the right media, typically G.711 and signaling format such as SS7 and POTS.
      • ii) When the call must be forwarded to another server for example using the SIP server proxy functions 1504, and that further SIP server does not support the CODEC used by the phone.
      • iii) When mobility management requires network address translation to ‘fix-up’ the addresses of all incoming packets so that they appear not to change IP addresses as the user moves between different networks.
  • This fix-up of addresses deserves further description which is done later in FIG. 14. Mobility Management (Handoff, handover) is handled in the Application Server 1511 which controls the Network Address Translation and mapping functions 1523 and possibly other functions such as codec conversion, echo and noise cancellation and packet repair as needed.
  • The CODEC conversion module 1524, allows real time conversion of packet streams from one CODEC such as AMR-WB to another such as G.711.
  • TABLE 11
    CODEC Rate Notes Trade names
    G. 711     64 kbit/s Fixed Line
    A-law/mu-
    Law
    G. 723.1 6.3 kbit/s 5.3 kbit/s VoIP ‘True Speech’
    G. 729   8 kbit/s or 6.4 kbit/s & VoIP
    11.8 kbit/s
    AMR 4.75 kbit/s to 12.2 kbit/s Cellular calls
    AMR-WB  6.6 kbit/s to 23.8 kbit/s Cellular talk
    radio
    AMR-WB+ Stereo and 23. kbit/s+ Cellular music
    GSM   13 kbit/s Older GSM
    GSM ½  5.6 kbit/s Newer GSM
    rate
  • The Packet Repair module 1526 provides for jitter buffering, duplicate packet removal, missing packet re-request or masking, and packet re-ordering. Duplicate packet removal is particularly important when make before break seamless handoff is used where the packets must be de-duplicated in conjunction with the NAP function as duplicate packets may not have the same IP address and port.
  • AMR (Adaptive Multi-Rate) CODECs are especially used in such systems as they have very good packet loss masking characteristics and good quality over lossy radio systems. In addition in lossy radio systems that suffer burst noise such as WLAN but where bandwidth is otherwise high such as our system, packets can be interleaved and transmitted multiple times to extend range while minimizing interference. In a Wi-Fi based system turning off the auto re-try mechanism for VoIP packets and relying on AMR interleaved over transmission can improve Quality of Service (QoS). For Bluetooth based systems, moving from CTP to AMR over ACL can extend practical ranges by a factor of 3 or greater in noisy scenarios.
  • Echo and noise cancellation module 1525 is often implemented in the end points but in circumstances where the handsets do not have this function or have a limited function it may be an advantage to implement a short and particularly long echo cancel function in the Media Gateway.
  • TABLE 12
    CODEC Type Time Notes
    G. 167 Acoustic echo 50 ms To stop handset microphone
    feedback
    G. 168 Long Echo  3 seconds To stop echo in the network due
    Cancel depending on to impedance mismatch or a
    process power lack of far end acoustic echo
    cancellation
  • CODECs may be renegotiated during a call if bandwidth conditions change but a benefit of this invention is that a low data rate CODEC is chosen initially and so CODEC renegotiation is minimized.
  • The SIP server can implement a range of added value voice and data services once the basic link has been established. By using the access table method described in FIG. 6 and background pre-pairing we ensure that the most handovers are pre-paired unless there is a system failure in which case an automated trouble ticket will be created. Buffers and rate converters can ensure no voice is lost in these circumstances by temporarily buffering a large amount of data. Any ‘catching up’ required can be implemented using a speech rate converter. (A speech rate converter allows 5 seconds of speech to be played in 4 seconds of time without changing the pitch of the voice. It does this in simple form by throwing away a percentage of the waveforms while maintaining continuity at the zero crossing. Improved versions are described in the literature and are common components of media gateways.) An improvement to make the handoff apparently more seamless when there is a substantial break in this 1.2-3 second range is made by sending an ‘about to handoff’ command and then a ‘handoff’ command. The about to handoff command indicates to the server that it should temporarily increase its voice buffer and increased voice delay (which requires a non audible rate conversion to slow the output of speech packets) once the handoff occurs the delay must be clawed back by the ‘catch up’ mechanism.
  • Using the access table and a context translation mechanism allows Wi-Fi to handoff quickly even when there are different makes of Wi-Fi controller involved in the system.
  • International Roaming
  • The handoff/handover cases apply in a broadly similar manner to the situation where a person has traveled internationally but there are some subtleties in the current UMTS system there are some caused by this.
  • WLAN connections when roaming internationally work in the same way as in your home country. Essentially the roaming principles that would be applied if a person traveled from New York to Boston are the same as if that person travel from New York to London. The IP network is homogenous internationally. That person will have a source IP address in a number range that is associated with the place you have traveled to. (IP address location can be ignored but may be used as a cross check for fraud.)
  • WWAN data in current schemes is carried by the roamed to network internally but transited back to your home network for termination. The person's IP packets will exit from a GGSN in the person's home country and will have an IP address in a number range that is associate with that person's home network.
  • WWAN audio will be carried and terminated in the network that is roamed to. Therefore it will not travel through home networks audio gateway. Any SS7 signaling to control handoff between WWAN-AUDIO when traveling internationally will need to be sent to and accepted by the network that has been roamed to. Any least cost routing tables and methods must take into account the International charging issues.
  • Further improvements can be achieved by providing fast handover methods that allow context to be transmitted from one WLAN AP to the next. These context switching methods include LAPP within Wi-Fi or the equivalent within Bluetooth. Further improvements on these can be done by allowing this context switching to be transmitted over the air either on the same protocol or via an alternated protocol. One example would be the sending of Bluetooth context data over the Wi-Fi or UMTS network to assist in handover.
  • The state table in FIG. 14 represents the in call handover and handoff states. A more complete list of the states is shown below:
  • TABLE 9
    State Table
    Phone off
    Phone on
    Discovered WWAN
    Authenticated to WWAN
    Connected WWAN-Audio
    Connected WWAN-DATA
    Discovering WLAN
    Connected to WLAN
    Authenticated WLAN-IP
    Authenticated WLAN-VoIP
    In call incoming WWAN-Audio
    In call incoming WWAN-VoIP
    In call incoming WLAN-VoIP
    In call outgoing WWAN-Audio
    In call outgoing WWAN-VoIP
    In call outgoing WLAN-VoIP
    Handing off
    Handing over
  • SS7 Signaling
  • In several cases above a message needs to be sent to the SS7 system of the originating or terminating telco server to indicate that it should reroute the call to the invented proxy SIP server to implement roaming. These commands can use standard follow-me methods that are more fully described in the literature and will not be described here. If the 3rd party telco server has a SIP interface then this may be used in preference.
  • FIG. 16 shows different scenarios for usage of the invented system in the home. In the simplest scenario (e.g. for a small flat/apartment) the Truphone enabled phone 1602 connects directly to a Bluetooth dongle 1603, which is connected to the study PC 1606, which in turn is connected by Ethernet or USB to an ADSL modem (not shown). In this scenario the PC must be turned on for the Truphone to work, range is not optimal, but the cost is minimized. Phones 1607 and 1609 may be out of range of the dongle, and would be limited to making a conventional GSM call, or a UMTS VoIP call.
  • For a larger dwelling a more extensive setup is illustrated. In this case the study PC 1606 is connected to an access point 1605. This may either be a conventional Wi-Fi enabled ADSL or cable modem, or a specifically Truphone compatible device with additional Bluetooth and mesh networking capabilities. In the descriptions below, the latter is assumed. The PC does not have to be switched on in these scenarios.
  • In this example:
      • the kitchen phone 1601 is a conventional landline phone and is unaffected by the Truphone equipment in the home.
      • Truphone 1602 is currently in the kitchen which is sufficiently close to the study that it can connect directly through Bluetooth to the access point 1605.
      • Truphones 1609 and 1607 connect via Bluetooth to the repeater 1608, which connects via WiFi to the access point 1605, which connects to an ISP and the Truphone server.
      • Additional repeaters could be located elsewhere in the house and would link together using mesh networking techniques to extend the coverage area.
      • Phone 1607 and 1609 are sufficiently close together that they could communicate directly with each other. This capability is more relevant when used between, say, a living room and a child's bedroom in an intercom or baby monitor mode
      • There is no telephone socket in the Living Room, but the conventional analogue telephone 1610 connects into the repeater, and can be used to make and receive VoIP calls. This is useful because, unlike a mobile handset, it can neither be lost nor run out of batteries.
      • The study phone 1604 is plugged into the access point 1605, which in turn is plugged into the telephone socket 1611. This phone can be used to make VoIP calls, but if the access point or network connection fail or are switched off, the lines are automatically connected so that calls are made directly through the telecom socket in the conventional way as a fail-safe measure
  • The table below summarizes some of the potential routings for calls out of the home:
  • TABLE 13
    Truphone  
    Figure US20160037389A1-20160204-P00001
     Truphone
    Truphone  
    Figure US20160037389A1-20160204-P00001
     Bluetooth dongle  
    Figure US20160037389A1-20160204-P00001
     PC  
    Figure US20160037389A1-20160204-P00001
     ADSL/cable modem  
    Figure US20160037389A1-20160204-P00001
     Truphone server
    Truphone  
    Figure US20160037389A1-20160204-P00001
     Access point  
    Figure US20160037389A1-20160204-P00001
     Truphone server
    Truphone  
    Figure US20160037389A1-20160204-P00001
     Repeater  
    Figure US20160037389A1-20160204-P00001
     Access point  
    Figure US20160037389A1-20160204-P00001
     Truphone server
    Truphone  
    Figure US20160037389A1-20160204-P00001
     Repeater  
    Figure US20160037389A1-20160204-P00001
    Repeater 2  
    Figure US20160037389A1-20160204-P00001
     Access point  
    Figure US20160037389A1-20160204-P00001
     Truphone server
    Landline phone  
    Figure US20160037389A1-20160204-P00001
     Access point  
    Figure US20160037389A1-20160204-P00001
     Truphone server
    Landline phone  
    Figure US20160037389A1-20160204-P00001
     Repeater  
    Figure US20160037389A1-20160204-P00001
     Access point  
    Figure US20160037389A1-20160204-P00001
     Truphone server
    Landline phone  
    Figure US20160037389A1-20160204-P00001
     BT socket  
    Figure US20160037389A1-20160204-P00001
     SIP Server
  • Note that the Study PC 1606 would normally be connected to either a Bluetooth dongle 1603 or to an access point 1605, although for completeness both are shown in this diagram. The device can be the first hop on a multi-hop or subsequently star network topology and can provide mobile IP fix up at the radio level or the IP level or implement mobile IP as per any one of the IETF RFCs.
  • FIGS. 17 and 18 illustrate a repeater in isometric and orthogonal projections. FIG. 21 illustrates the repeater in exploded view showing the attachment of a cable, interchangeable plugs and a wall mounting bracket. In one embodiment, the repeater is approximately the size of a UK mains adapter in width (2 inches, 50 mm) and the length of a PCMCIA card (4 inches, 100 mm) with a depth in the predominately flat section approximating that of PCMCIA card (¼ inch, 5 mm) and then increasing to accommodate the connectors and main plug unit. The optional extender cable length is approximately the head height of a human being (5 feet, 1.5 meters) and the wall bracket is sized to sit discreetly behind the unit when wall mounted.
  • The device comprises a mains plug plus a rectangular form that houses the PCB(s) with Antenna mounting and one or more connectors. The form factor of the device solves several problems:
      • i) Permitting easy and discreet fitting in the home.
      • ii) Allowing the easy substitution of a range of mains adapters and extender cables.
      • iii) Locating the antennas a suitable distance from the mains input and achieving a good ground plane.
      • iv) Presenting an aesthetically pleasing design.
      • v) Provides diversity enabled Wi-Fi and potentially diversity enabled Bluetooth with hi-sensitivity that gives considerable repeat range.
      • vi) By using Network Address Processing can handle mobile IP scenarios so that a user may move between different repeaters without switching IP address.
      • vii) Translates between Bluetooth and Wi-Fi to allow a Bluetooth enabled device to connect to the repeater which connects back to the WLAN router using Wi-Fi.
      • viii) Provides optional connectors including
        • a. A POTS (Plain old telephone system) port—typically RJ45 or BT socket—to allow wired devices to connect into the wireless VoIP system thus simplifying wiring.
        • b. A USB connector allowing the device to connect to and control or communicate with range of other devices.
        • c. A 10-Base-T connector to provide wireless capability to ADSL base stations.
  • FIGS. 19 and 20 illustrate a set top box in isometric projection. FIG. 22 illustrates the set top box in exploded view showing the internal arrangement of components and the attachment of antennae. In one embodiment, the set top box fits within a rectangle that is approximately the same size as a regular full size hi-fi unit. (12 inch wide, 8 inches deep and 4 inches high, 300 mm×200 mm×100 mm). The device form factor design to solve several problems.
      • i) Stopping people putting items on top of it that would detune the antennas.
      • ii) Allowing either low cost ‘rubber duck’ antennas to be used or advanced chip antennas or connection of directional antennas.
      • iii) while presenting an attractive outward appearance that would be appropriate in the home.
      • iv) The casing may be mounted either horizontally or vertically.
      • v) Provides a range of connectors including HDMI, digital audio to allow the system to connect to an audio visual system and provide video on demand and other similar services wirelessly.
  • FIG. 23 is an electronic block diagram of a series of components that would form a system that allows voice, video and data wiring for the home, an office or a hotspot. Subsets of this block diagram can be implemented to provide a low cost repeater function, a low cost home wiring function, a set top box or a wireless Internet access point with ADSL connection.
  • Repeater Version
  • The minimal repeater contains a Bluetooth radio transceiver system 2310 and Wi-Fi radio transceiver system 2312 with co-existence interface between them to reduce interference and de-sensitization issues to a minimum. The systems have a direct interface to Flash 2314 or similar memory that contains their program and settings and may also route out their internal USB ports to an external connector.
  • More complex repeaters are possible which incorporate a Host Transceiver 2315 element that includes a Microprocessor, Flash ROM and RAM 2314 for program storage and execution and provides Ethernet 100-Base-T capability 2316. (The device pictured has 100-Base-T and ADSL but the ADSL may not be used in lower cost implementations of the repeater or a simpler chip may be substituted).
  • Further components may be added in each case giving additional interface capabilities. Optional SLIC (Subscriber Line Interface Circuit) 2338 with POTS connector for POTS interface telephone device can be added in conjunction with a Voice processing DSP so that DECT (Digital Enhanced Cordless Technology) handsets or traditional wired telephones can be included within the system.
  • The repeaters most complex version envisages is a version supporting 802.11, Bluetooth, USB, 100-Base-T, POTS. Providing translation and bridging between these interfaces. This product would enable a home, office or hotspot to be enabled for wireless VoIP in the vast majority of scenarios. The repeater could either be used as the primary access point device—as a wired to wireless repeater—with wired connection to incoming data connection, or as range extending repeater that forms a backbone network over Wi-Fi back to the primary connection point and connects to local devices such as handsets, PDAs and laptop computers that use either Bluetooth, Wi-Fi or both.
  • Multi-country PSU module with optional cable extension, driver disks and packaging are not pictured but would be included within a compete package. The wall mounting bracket providing optimal wall mounting or it may itself be bolted to a universal joint mounted on the wall to provide an ability to move the antenna direction.
  • Access Point
  • APs contain all the blocks and components from the repeater above plus the addition of ADSL Host Transceiver 2315 with ADSL line interface hybrid 2321, ADSL micro-filter 2329, diversity antenna configurations, external antenna connectors, DAA (Data Access Arrangement) 2336, emergency service power fail fallback routing for POTS 2341, SIP proxy, firewall, AntiVirus and standard home SOHO features. Used in the primary data connection position in the home or SOHO network, it provides for wireless connections to devices (handsets, PDAs laptop PCs) or to repeaters as described above. A VoIP client and server could be introduced that would allow for direct termination to the PSTN or inclusion of the POTS telephones into the system.
  • Set-Top Box or Media Centre.
  • Set-Top Box or Media Centre includes all features of the Access point plus digital audio and video send and receive for home media networking with appropriate connectors for linking to common AV components. IRDA transceiver for remote control extension. Commonly available components could be added, such as hard disk drives and CD and DVD drives to offer complete home multi-media centre features.
  • A Phone may be Built Using the WiFi/Bluetooth Coexistent System Described.
  • This has Bluetooth and Wi-Fi cordless phone capability and remote control function capable of interfacing with and programming other elements within the system. A CODEC chip, speaker and microphone must be added to the bill of material. The benefit of having a cordless phone incorporated into the system that includes coexistence is to further maximize system capacity while keeping to absolute minimum power consumption.
  • FIG. 24 illustrates the Network Address Processing required to process IP v4 RTP datagrams for the mobile roaming, handoff and handover. For this discussion, we will talk about RTP packets but a similar process is needed for the SIP and other packets. The RTP datagram 2400 is constructed in the normal way with IP, UDP, RTP and Data headers, hereafter referred to as an RTP packet. As can be seen each RTP packet contains source and destination information for both IP address and port—together known as a socket. The phone sends RTP packets to one or more sockets during handoff, handover and other events and these packets may travel over WWAN 2402 or WLAN 2404 infrastructure prior to reaching the Internet and our server. RTP packets 2404 and 2406 may arrive from two different sockets and these need to be processes and de-duplicated into one stream prior to traveling on to the media gateway 2408. An important factor is that both the WLAN and WWAN paths will need authentication to allow streams to enter the SIP server and in addition the user name password SIP address should be authenticated against the SIM address in the phone.
  • FIG. 25 shows configuration of a basic product. A user can enable their home PC(s) 2506, 2507 as ‘micro-cells’ capable of connecting to their mobile phone 2505 to the telephone system (PSTN or SIP network or Proprietary Networks) by way of the Internet 2508. The kit comes in a blister pack and contains:
  • TABLE 14
    Basic Product Part List 1601
    Blister Pack, transparent plastic (not shown)
    0.5 m-1.0 m Cable 1602
    Bluetooth Class I high sensitivity USB Dongle with BT1.2 or above. 1601
    Card inner printed in 2 color with appropriate graphics (not shown)
    Software Disk, CD ROM 1604
    CD ROM graphics 2 color 1604
    Manual 8 page full color not shown
    CD ROM contents
    PC installer
    Bluetooth Redirector
    Wi-Fi Bridge-Redirector
    Manual in PDF
    Bluetooth Driver & Bluetooth software
    Proprietary Interconnect plug-ins
    Symbian OS 8.0a and above compatible Truphone VoIP software.
  • FIG. 26 shows microSIP to SIP translation. In the case where the handset does not implement SIP, or implements a subset of SIP (eg. MicroSIP) the AP may need to implement a transcoding function to:
      • i) Provide Mobile IP mapping to allow multiple IP addresses from the different connection paths to be represented as a single IP end point to the SIP server.
      • ii) Provide transcoding to the media streams so that any limitations in the media gateway or with the end point device associated with the SIP server can be mitigated.
      • iii) Map audio data and subset of SIP/IP to full SIP/RTP for any endpoint device that does not support full SIP.
      • iv) Provide IP routing and tunneling functions such as NAT traversal and VPN functions.
  • FIG. 27 represents a state diagram and physical schematic for power management and service discovery in a WLAN, WWAN system. The handset can be in one of three coverage zones: WWAN only 2705, WLAN 2707 only or an overlap zone 2706. Power Management involves cycling between the different discovery and active states. If a handset comes into an overlap zone it will look for resources due to three possible stimuli; a timer, location information received from the WWAN system (or local GPS data although no phones currently support this), or any touch by the user on the UI provided that an update has not recently been undertaken. The phone then moves into discovery mode 2709 where it will first use information provided by any location message, such as cell ID or latitude and longitude, then search for known devices based on location information and any movement vector information it has, and finally go through a full unknown device scan. At the end of this phase it will either succeed and move to 2710 ‘ready’ or fail and return to sleep until next woken. If the phone has good battery it may continue with further searches once the first WLAN AP has been acquired so that it can populate its WLAN access table with a complete map. This search does not have to be exhaustive as it is likely to be undertaken reasonably regularly so eventually a full picture will be built up. Any discovered APs are notified to the home server to keep the map up to date. Also other phones will be searching and cooperatively building the map.
  • If the AP is lost the handset returns to its search pattern in 2709. After a period of time the handset may return to sleep state 2708 but it now remembers its AP table and can quickly wake and re-acquire the AP. It is undefined currently whether the WLAN RF circuitry can be woken from sleep state by a message or whether the AP receive RF is fully off. A deep sleep state 2710 can be entered where the unit no longer searches for WLAN, but can be woken by receiving a message or a UI command.
  • FIGS. 28 a-e illustrate the procedures carried out in both the handset and AP when making a call for different scenarios. These diagrams are representative of all the calling procedures possible and are by no means exhaustive. In particular, FIG. 28 a and b show the instance where the SIP and RTP clients are both implemented in full on the AP. FIGS. 28 c and 28 d show the situation where the SIP and RTP clients are both implemented in full on the handset.
  • It is clear that some parts of the SIP and/or RTP functionality can be moved to the “other” device in both of these cases without substantially altering the calling procedure. As such, these two pairs of diagrams should be understood as the two endpoints of a series of diagrams (not shown) where various parts of the SIP and/or RTP procedures are implemented on the handset with the rest being done on the AP. All communication between the handset and the AP may be done via a repeater and all communication between the AP and the SIP/RTP servers may be done via a proxy. These are not shown for the sake of clarity. Conversion to and from PCM/RTP may optionally include encoding and decoding.
  • FIG. 28 a illustrates the calling procedure using a very simple system on the handset, with the more complicated procedures of SIP and RTP being carried out wholly on the AP (see FIG. 28 b). The process starts when the user selects the number that they wish to call, for example, by entering it manually 2802 or selecting it from the phonebook of the handset 2801. The phone number then needs to be passed to the AP to make the call but this can only be done once a connection to the AP has been established. It is therefore necessary to check which AP the user wishes to connect to so, if they have not selected one before, they must do so now before a call can be made. This is done by searching for all available APs in the vicinity in step 2804, displaying a list to the user, and waiting for them to select their preferred AP in step 2803. If the user does not select an AP then the call is cancelled and the process starts again. Once the user has selected an AP then they will not need to do so again unless they wish to. The user can also be allowed to change their AP selection between calls, or the system may automatically choose one from a list of pre-known preferred APs, but this does not affect the calling procedure and is therefore again for the sake of clarity, not shown in the diagram. The handset connects to the AP in step 2806 and sends it the phone number that the user wishes to call in step 2807. Once the call is connected, the handset begins to send PCM audio data from its audio in stream (usually from a microphone) to the AP in step 2815 and to play PCM audio data received from the AP to the audio out stream (usually an earpiece or headset) in steps 2812 and 2814. This continues until the call is hung up, either by the user 2810 or the AP in step 2813, when the streams will be stopped and the connection with the AP dropped.
  • FIG. 28 b illustrates the procedure on the AP that corresponds to the handset procedure in FIG. 28 a. The process starts when the handset has connected to the AP and sent the phone number that the user wishes to call in step 2822. The AP then connects to, and authenticates with, a SIP server using the settings for the AP in step 2823 or, if the system allows various users to connect via any AP, settings it receives as part of the connection procedure with the phone (for clarity, not shown). The AP will then convert the phone number into a SIP INVITE command and negotiate with the SIP server to get an endpoint (usually a media gateway connected to the PSTN) for sending and receiving VoIP RTP packets in step 2824. Once the RTP endpoint is known a connection is established in step 2825 and the call can proceed. The AP takes the PCM data from the handset in step 2828 and converts it to RTP packets in step 2831 before sending it on to the RTP endpoint in step 2836. Audio is simultaneously received from the RTP endpoint in step 2827 and converted in the reverse manner in step 2832 before being sent to the handset in step 2835. This exchange of audio/RTP data continues until the call is hung up, either by the handset in step 2829 or by either of the SIP or RTP endpoints sending a SIP BYE command in step 2830, and the connection to the handset is dropped.
  • FIG. 28 c illustrates the procedure on the handset where SIP and RTP are both done wholly on the handset. This is a similar procedure to that in FIG. 28 a, but all of the SIP negotiation and RTP (de)packetisation from FIG. 28 b are moved from the AP to the handset. The diagram should be self-explanatory with reference to the explanations of FIGS. 28 a and b.
  • FIG. 28 d illustrates the procedure on the AP that corresponds to the handset procedure in FIG. 28 c. With all of the SIP and RTP functionality on the handset the AP is now a simple pass-through server—effectively a proxy. It performs IP packet “fix-up”, until the call is hung up, by changing the source and destination addresses in order that any messages sent to it may be forwarded between the handset and the SIP/RTP endpoints
  • FIG. 28 e illustrated the peer-to-peer discovery process by which a handset attempting to make a call first determines whether it can connect directly to another handset at the radio layer 2868, if this is not possible it determines whether a connection on the LAN 2869 is possible, then checks whether the other party can be connected by an all IP SIP routing 2870 and if these all fail terminates the call via the PSTN 2871. In this way the client always attempts to make a peer-to-peer connection if possible. In particular when checking on the LAN segment a check of each cooperative PC is also made to see if it has a bridge to a 3rd party VoIP service such as SKYPE or MSN.
  • FIG. 29 illustrates the security and authentication procedure for a wireless LAN connection to the system. A phone 2900 connects to a WLAN AP 2901 to a broadband router 2902 that contains a firewall and access control system, then via broadband connection to our SIP server 2903 which may authenticate directly or via a proxy 2904. A gateway to the PSTN 2905 is provided allowing calls to be made to the PSTN 2906.
  • The phone looks for a WLAN AP resource using its radio search capability and making use of any access permission information stored in its memory. If access is allowed the phone will authenticate to the AP and obtain a local IP connection. The radio layer connection may be protected by WEP for Wi-Fi APs and Bluetooth Encryption for Bluetooth APs. The IP segment of the connection is only physically protected by default.
  • The phone will then request external access from the router at the edge of the LAN. This may either ask the SIP server 2903 which may proxy the authentication to one ore more chained AAA servers, may grant the request itself from its local authentication table or the phone may bypass the SIP server and request IP access directly from a AAA authority. In this case two authorizations will be required: one to the Internet access and one to the SIP access. These authentication messages use MD5 encryption and security is provided at a transaction level.
  • The system may then optionally use encryption on either or both the SIP message 2909 and the RTP VoIP streams 2910. To make a call, the phone sends a SIP Invite message to the SIP server which may check on a transaction by transaction basis with an external AAA server 2904 that the person is in good standing to make a call. If call rights are granted then VoIP call is initiated. Note that the final leg of the call 2911 on the PSTN circuit is only protected through physical security.
  • The at risk elements in the system are as follows.
  • TABLE 15
    Activity Security Code
    Radio authentication Key exchange security Bluetooth pairing or Wi-Fi
    WEP/WEP2
    Authentication to IP transactional security Radius, MD5
    Access
    Authentication to SIP transactional security Radius, MD5
    Server
    AIR
    SIP & RTP Encryption of link WEP or Bluetooth
    Encryption
    LAN
    SIP & RTP None normally
    Or Secure SIP Transactional or IPSec or SecSIP
    Encryption
    And/or Secure VoIP Encryption IPSec or VoSIP
  • The greatest security concern in these systems is attacks to the LAN segment. Both session and stream are available at this point and physical security may be low particularly if the wireless router is in a public hot spot such as a café. Although all the authentications are made using MD5 challenge-response secure methods, once the user had authenticated another person would be able to insert a listening device between the WLAN AP and the router and eavesdrop or attempt to take over the connection. Such attacks are not simple. Eavesdropping is very easy and would not disrupt the system. Masquerading and take-over attacks would be detectable as the WLAN router would likely lose its connectivity to the Internet in the process. Therefore several levels of defence could be used:
      • a) Weakly encrypt the RTP stream to avoid casual eavesdropping. This can be effected with a simple substitution cipher.
      • b) Strongly encrypt the RTP stream. This would make the link secure.
      • c) Strongly encrypt the SIP messages
      • d) Encrypt the entire channel using IPSec, VoSIP or similar methods.
  • The authentication interchanges have been illustrated in the diagram with a simple request/acknowledge transaction. In some known systems, a challenge response mechanism such as MD5 is used. In these schemes, the mobile subscriber requests access, receives a challenge message, responds to this message and then receives an authentication message. The challenge and response are matched using public key encryption techniques to prove that both parties have a shared secret (username/password) without transmitting that secret password over the link.
  • Phone based authentication may use the Subscriber Identity Module SIM to provide authentication either by performing the authentication using the SIM ID transported over WLAN layers or by requesting username password using the SIM ID as authentication for an initial transaction and thereafter using the user name password combination.
  • Referring back to FIG. 11, in order to work with 3rd party VoIP systems that are resident on the PC, the 3rd Party Authentication 1136 and SIP translation (control and media) 1137 are used. These provide a method for interconnecting at the PC level with services such as MSN™ or SKYPE™. In each case the 3rd party interoperability element receive the data and control streams from the phone and perform further authentication and media translation. Additionally this PC 3rd party interoperability may implement the session bonding roaming and handoff protocols described in FIG. 24 and the cooperative tunneling agent which is described above.
  • FIG. 30 shows that the range of WLAN systems and indeed all radio systems depends on the link budget and the attenuation caused by intervening materials. The following link budget and sensitivity calculations are given for Bluetooth devices but very similar calculations apply to WLAN devices. The maximum sensitivity achieved by Bluetooth devices today is:
      • −86 dBm older CMOS chips
      • 88 dBm newer CMOS chips
      • Additional −3 dBm Low Noise Amplifier
      • Additional −2 dBm Antenna Gain
  • The best products on the market today achieve −90 dBM sensitivity by using newer CMOS chips with high quality antennas. In an improved design we have proposed to use new CMOS with low noise amplifiers and high quality antennas to achieve −93 dBm. This would provide further theoretical range for Bluetooth and is nearing the noise floor for the radio spectrum in question.
  • An improvement in link budget (difference between transmit power and receive power) of 6 dBm will double the effective range in free space. A rough estimate is that an increase of 10 dBm in-building will double the range. This is a rough estimate as factors unrelated to basic special geometry come in to play, primarily fringing and multi-path problems: Effectively some proportion of the signal is translated into noise within buildings. If good diversity receiving schemes are used that can select and reject this noise then the 6 dB for double the range would apply in buildings as well. Achieving this selectivity is a purpose of this invention.
  • To assess the link quality one must look at both the Transmit Link Budget and the Receive Link Budget. In each case the noise present at the receive end from other in band noise generators (such as Bluetooth for Wi-Fi and Wi-Fi for Bluetooth) must be considered.
  • There is interplay between data rate, symbol rate and signal to noise within these systems. Ranges within WLAN are generally quoted at 1 bit in 100 error rate (10−2). The error rate rises with range as the signal to noise ratio drops. (A square law for free space and a power of 3.3 for in building.) The audible perception of this error rate will depend on the probability of packet loss due to this bit error rate, the redundancy level of packets and the audible perception of a lost VoIP packet given the ability of CODECs to mask lost packets.
  • There are a number of practical limits to improving the link budget: Due to interference considerations and battery consumption within handsets output power is often set quite low. It is difficult to find enough room in a handset to put two high quality antennas for diversity reception. The combination of these factors limits the range capacity of mass produced handsets. A repeater is a good solution in these situations.
  • The proposed repeater is constructed to optimally use 802.11 g with advanced diversity reception to maximize in building transmit range and act as a backbone link so that Bluetooth can be used to make the final short hop to the handsets. This obviates the need to use Bluetooth to repeat itself as it is complicated because of the master/slave role switching that would be needed. The function of this repeater is to translate packets from one protocol into the other and is more fully described in FIG. 22.
  • To maximize system efficiency within the invented system, it employs:
  • Multiple interleaved VoIP packets.
  • VoIP original RTP1 RTP2 RTP3
    FEC
    RTP1 RTP1 RTP2 RTP2 RTP3 RTP3
    Interleaved
    RTP1 RTP2 RTP1 RTP3 RTP2 RTP3

    FEC (Forward Error Correction) at the radio layer by setting the appropriate Bluetooth or Wi-Fi FEC parameters. Ensuring that the packets match the Bluetooth and Wi-Fi MTU so that there are no empty packets and so that an error in a radio layer packet does not damage two RTP packets.
  • Encoding Audio using AMR CODECs that have missing packet masking capability. Encoding audio using small AMR codec so that VoIP packets can be transmitted with multiple copies without overloading the radio channel. Connected using UART giving theoretical 961 kbaud an ACL link is nominal 721 kbps. VoIP using AMR 4.85 can use all 7 channels while still using less than 10% of the link budget thus giving better range and or more channels.
  • A side effect of using AMR to encode voice is that few packets are sent for a given call. Each Bluetooth packet represents a potential inference event for Wi-Fi and reducing these events helps with co-existence. Finally using these digital methods with error correction and detection allows little or no interference to breakthrough into the perceived audio signal as compared with high bit rate CODECs that do not have error correction such as Bluetooth SCO.
  • VoIP Packet Redundancy Scheme
  • Bluetooth chips that have been created with coexistence capability toggle their coexistence pins for each packet they transmit. Full Diversity schemes for Bluetooth can be achieved but are complex. A simple scheme that will increase the effective range of VoIP calls is as follows: Transmit each VoIP packet in a packet that fits exactly inside one Bluetooth air interface packet. Transmit multiple but odd-numbered (e.g. 3,5,7) copies of each VoIP packet,and toggle the antenna switch for each Bluetooth packet transmit signal. You are then guaranteed that each VoIP packet will be transmitted at least once on two different antennas in the diversity scheme.
  • Packet Redundancy Scheme
  • An alternate way to do this is set the Bluetooth hardware Forward Error Correction to transmit 3 Bluetooth packets for every data packet and toggle the antenna as above. Again this will have the effect that at least one copy of each packet will go by an alternate antenna
  • Receive Signal to Noise Level Diversity
  • The can be achieved by measuring the Signal to Noise ratio (RSSI, BER) on the air interface packet pre-amble by switching antennas and choosing the best signal.
  • In the Bluetooth implementation of the present invention VoIP using AMR 4.85 is implemented so that all 7 channels can be used while still using less than 10% of the link budget thus giving better range and more channels from a given Bluetooth access device. It is advantages that this CODEC is used end to end in the system to provide a high MOS. This compares favourably with the current situation where the audio link is at 50% utilisation (721 kbps) using 2 Bluetooth SCO links giving little headroom for error tolerance.
  • FIG. 31 illustrates the system elements to permit co-existence between Bluetooth and Wi-Fi systems. WLAN systems in the unlicensed bands have traditionally been free to choose their coding schemes. This has resulted in the two main schemes, Bluetooth and 802.11 having poor intrinsic coexistence features. Bluetooth works by frequency hoping across the entire ICM band. While 802.11 divides the ICM band into 14 sections and picks one particular band for its spread spectrum coding. Thus each time a Bluetooth frequency hop lands in the chosen 802.11 band both systems suffer interference and loose data. Coexistence can be achieved by adaptive methods and proactive methods. The adaptive method used today is for Bluetooth to sense the interference levels on each of its 79 channels and pick those channels on which there is no interference for its hopping sequence. Approximately 1/14 of the total frequencies are therefore excluded (because the 802.11 specification allows for overlapping bands the calculation is not precise). However in this scheme the Bluetooth device has to learn the sequence which takes time. An improvement can be achieved by sending a signal from the 802.11 hardware to the Bluetooth system to tell it actively what frequency band the 802.11 has chosen. This has the advantage that interference avoidance is immediate. A further improvement can be achieved by actively signaling Bluetooth activity to the Wi-Fi subsystem. This scheme provides considerable interference immunity but further benefits can be achieved in our system as the repeater device has knowledge of both Bluetooth and Wi-Fi timing. The power saving beacon schema of 802.11 allows the repeater device to know when the next transmission from a remote device will be received. This time can be signaled to the Bluetooth subsystem to instruct it not to transmit during this time slot and so avoiding interference with remote 802.11 APs as well. This gives further improvements in interference rejection which translate into increased range or increased capacity for the system as a whole. A subtlety is required to implement this. The beacon time wake up is intended to give the system enough time to start up from its low power state, we want to ensure that the system does not start transmitting in the beacon time.
  • FIG. 31 illustrates the stack and timing arrangements for this system. Beacon wake events 3115, 3116 occur with an interval between them where the AP can indicate that it has queued data for the mobile device. The mobile device is programmed to wake prior to the beacon time slot 3117, 3118, at time W and begin listening, time W+T for signals from the AP. At the end of this time interval the mobile device either takes action based on some information it received during the beacon or sleeps again after shutting down its systems, time S. The beacon time hold off when Bluetooth may not transmit is the TX time indicated in the diagram and so the system needs to keep track of time W and S so that it may transmit in this time. Time W=wake, TX=beacon transmit, S=going to sleep, Interval=sleep, power down.
  • The repeater functionality is as follows. The 802.11 subsystem 3107 and the Bluetooth Subsystem 3108 interface to the higher levels within the repeater and to a coexistence means 3104 that uses channel information, Bluetooth activity information and the beacon time (Along with an assessment of the startup time) to holdoff Bluetooth transmissions and so avoid interference with the AP. The AP is not shown in this diagram but would be any standard 802.11 access point: The repeater is located within its coverage. The lower level stacks for 802.11, MAC 2212 and PHY 2213 are explained previously within the patent and have the same function. The Bluetooth stack elements, shown in schematic form 3109, 3110, 3111, 3114 are also explained mode fully elsewhere. The upper level functions of the repeater are to communicate with the subsystems using a driver 3103, control the hardware 3102, extract the data to the IP level 3101 and bridge the data streams together 3100. Further control functions such as setup and configuration may also be provided but are not illustrated.
  • While the invention has been described in detail with reference to preferred embodiments thereof, it will be apparent to one skilled in the art that various changes can be made, and equivalents employed, without departing from the scope of the invention.
  • In particular, mobile devices, mobile subscriber and endpoints are used interchangeably and usually refer to a mobile phones with WLAN capability: A general purpose computing device that has been modified to implement a phone function using wireless WAN or wireless LAN protocol can be substituted. An access point (AP) or access node or PC that has radio connectivity and appropriate software to allow it to act as an access point may be substituted for each other. WLAN is used to generically describe any wireless local area network including, but not limited to, Bluetooth, 802.11, DECT and Zigbee. For descriptions of mobile WWAN data usage, UMTS is referred to in the description, but any wide area mobile data might be substituted such as GPRS, EDGE, TETRA et. al.
  • Smartphones allow complex reprogramming of their functions using downloadable software: It is perfectly possible to use the aforementioned techniques in general purpose mobile phones by reprogramming their firmware or implementing the features in hardware in each case achieving an improvement in performance while reducing flexibility. Although this means a degree of integration and test is required the integration is less onerous as it occurs at a higher level within the stack.
  • In many examples above it is assumed that the caller is the party that does authentication or roaming but it should be noted that since the system can accept incoming calls the receiver may be the active party and indeed if two members are both using the system both the caller and the receiver may handoff, roam and authenticate.
  • One possible system has a Bluetooth enabled mobile phone connected by way of a Bluetooth enabled laptop computer to the public Internet terminating at a SIP server which is able to make calls to the PSTN via a media gateway. All IP and protocol translation is handled within the PC making a server based SIP proxy unnecessary. All handoff and handover may be executed by placing SIP server capability in the handset and PC.
  • The use of the term a SIP server describes a general purpose Session Initiation Protocol servers which might be a SIP server as defined by the IETF or in implementation by JSR116 but substitution of an alternative SIP server such as one based on Global IP (a proprietary specification) or even the older H323 protocol are all possible. Such substitutions and the necessary modification of software would be possible for one skilled in the art who had understood our description based on IETF SIP.
  • Throughout the patent The Internet is used. For business purposes it is possible to place the servers inside an Intranet which creates a private system. This might either be protected by physical barriers such as the walls of the building and firewalls on any network connections which leave the building or by making a Virtual Private Network (VPN). In these cases a further connection to other private or public systems may be made by configuring SIP proxy and AAA proxy components within the private system to route to the public system when an address can not resolved internally.

Claims (45)

We claim:
1. A telecommunications system capable of sending data from a mobile unit to an intended recipient comprising:
a mobile unit; said mobile unit being capable of transmitting a communication to said intended recipient using a WLAN and a WWAN;
an access point capable of receiving said communication from said mobile unit; said access point being connected to a communication network; said communication network being capable of transmitting said communication to the intended recipient;
wherein said communication is transmitted to said access point from said mobile unit to be transmitted to said intended recipient through a communication path on said communication network; said communication being encoded into IP before being transmitted to said communication network when said communication path comprises a WLAN.
2. A telecommunications system as recited in claim 1, wherein said communication is encoded into IP before being transmitted to said communication network when said communication path comprises a WWAN and said WWAN is capable of transmitting data using a separate data channel.
3. A telecommunications system as recited in claim 1, wherein said communication is not encoded into IP before being transmitted to said communication network when said communication path comprises a WWAN and said WWAN is not capable of transmitting data using a separate data channel.
4. A telecommunications system as recited in claim 1, wherein said communication is a person's voice and said IP is VoIP.
5. A telecommunications system as recited in claim 3 wherein said system determines whether said communication path comprises said WLAN or said WWAN based on least cost routing algorithms.
6. A telecommunications system as recited in claim 5 wherein said least cost algorithm is computed to minimize the inter-network transcoding steps.
7. A telecommunications system as recited in claim 5 wherein said system is capable of handing off the transmission of said communication between different communication paths seamlessly.
8. A telecommunications system as recited in claim 5 wherein said system is capable of handing off the transmission of said communication between different communication paths in a manner to appear seamless.
9. A telecommunications system as recited in claim 5, wherein said mobile unit further comprises an audio processing layer that is independent of, and capable of interacting with, multiple radio communication paths to maintain consistent audio quality.
10. A telecommunications system as recited in claim 9, wherein said handoff is accomplished by maintaining at least two radio links simultaneously.
11. A telecommunications system as recited in claim 9, wherein handoff is between a WLAN and a WWAN.
12. A telecommunications system as recited in claim 5, wherein said mobile unit makes said determination.
13. A telecommunications system as recited in claim 1, wherein said access point is a PC.
14. A telecommunications system as recited in claim 1, wherein said transmission between said mobile unit and said access point can utilize a Bluetooth data channel to improve error correction and increase range.
15. A telecommunications system as recited in claim 1, wherein said mobile unit is capable of transmitting data to said access point using Bluetooth and wi-fi; said system determining which one to use based on considerations of power consumption and quality of service.
16. A telecommunications system as recited in claim 5, wherein said handoff is controlled by said mobile unit.
17. A telecommunications system as recited in claim 5, wherein said handoff is accomplished by using a conference bridge.
18. A telecommunications system as recited in claim 17, wherein said mobile unit initiates a connection to the conference bridge.
19. A telecommunications system as recited in claim 5, wherein said system is capable of performing authentication based on the communication path used.
20. A telecommunications system comprising:
a mobile unit; said mobile unit having a transmitter;
an access point, in radio communication with said mobile unit; said access point having a data receiver to receive data from said mobile unit and a data transmitter to transmit data to a communication network; said communication network being capable of communicating with an intended recipient;
wherein a communication is received by said mobile unit and is transmitted to a session initiation server to be communicated to said intended recipient through a communication path on said communication network when said communication path comprises a WLAN.
21. A telecommunications system as recited in claim 20, wherein said session initiation server is based on the SIP standard.
22. A telecommunications system as recited in claim 20, wherein said communication is transmitted to said session initiation server when said communication path comprises a WWAN and said WWAN is capable of transmitting data using a separate data channel
23. A telecommunications system as recited in claim 20, wherein said communication is not transmitted to a session initiation server when said communication path comprises a WWAN and said WWAN is not capable of transmitting data using a separate data channel.
24. A telecommunications system as recited in claim 20, wherein said session initiation server is located on said mobile unit.
25. A telecommunications system as recited in claim 20, wherein said access point is in radio communication with said mobile unit via a repeater.
26. A telecommunications system as recited in claim 25, wherein said repeater comprises two or more WLANs configured to minimize interference.
27. A telecommunications system as recited in claim 25, wherein said repeater can interconnect between WLANs.
28. A telecommunications system as recited in claim 25, wherein said repeater utilizes diversity.
29. A telecommunications system as recited in claim 25, wherein said repeater may connect to a wired phone system.
30. A telecommunications system as recited in claim 25, wherein said repeater maintains contact with said session initiation server allowing incoming calls.
31. A telecommunications system as recited in claim 20, wherein said system is capable of discovering the communication paths that are available between said mobile unit and said intended recipient.
32. A telecommunications system as recited in claim 20, wherein the parameters of the communication paths discovered for a location are stored in said session initiation server.
33. A telecommunications system as recited in claim 20, wherein the mobile unit and Access Point respond to a discovery request with its identity and routing parameters.
34. A telecommunications system as recited in claim 32, wherein said mobile unit senses the resources available at a particular location to determine the available communication paths for said location and said available communication paths are stored in said session initiation server for that location.
35. A telecommunications system as recited in claim 20, wherein the mobile unit is capable of entering a sleep mode when not connected to a WLAN; said mobile unit being capable of exiting said sleep mode to receive a communication from a WLAN in response to a signal received by said mobile unit through WWAN.
36. A telecommunications system as recited in claim 20, wherein the session initiation server can emulate the UMA protocol.
37. A telecommunications system as recited in claim 20, wherein the Access Point can transcode to a different protocol.
38. A telecommunications system as recited in claim 20, wherein the mobile unit is capable of playing games while simultaneously communicating to said session initiation server.
39. A telecommunications system as recited in claim 20, wherein the mobile unit is capable of playing music under control of said session initiation server.
40. A telecommunications system as recited in claim 20, wherein said mobile unit further comprises a digital signal processor capable of processing digital signals within said mobile unit.
41. A telecommunications system as recited in claim 40, wherein said digital signal processor is utilized in encoding said communication into IP.
42. A telecommunications system as recited in claim 20, wherein said mobile unit is programmable.
43. A telecommunications system as recited in claim 20, wherein said radio communication may be via an unmodified WLAN Access Point.
44. A telecommunications system as recited in claim 20, wherein said mobile unit compresses the audio prior to transmission over the radio network.
45. A method for sending data from a mobile unit to an intended recipient, comprising the steps of:
receiving a person's communication in a mobile unit;
transmitting said communication to an access point that is connected to a network; said network being in communication with said intended recipient;
transmitting said communication over a path on said network to the intended recipient; said communication being encoded into IP when said path comprises a WLAN; said communication being encoded into IP when said path comprises a WWAN that is capable of sending data over a separate data channel; said communication being not encoded into IP when said path comprises a WWAN that is not capable of sending data over a separate data channel; and
determining whether said path comprises said WLAN or said WWAN based on least cost routing algorithms.
US14/722,561 2000-11-03 2015-05-27 System for Providing Mobile VoIP Abandoned US20160037389A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US14/722,561 US20160037389A1 (en) 2000-11-03 2015-05-27 System for Providing Mobile VoIP

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US09/706,406 US8996698B1 (en) 2000-11-03 2000-11-03 Cooperative network for mobile internet access
US11/129,184 US9049042B2 (en) 2000-11-03 2005-05-12 System for providing mobile VoIP
US14/722,561 US20160037389A1 (en) 2000-11-03 2015-05-27 System for Providing Mobile VoIP

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US11/129,184 Continuation US9049042B2 (en) 2000-11-03 2005-05-12 System for providing mobile VoIP

Publications (1)

Publication Number Publication Date
US20160037389A1 true US20160037389A1 (en) 2016-02-04

Family

ID=24837410

Family Applications (6)

Application Number Title Priority Date Filing Date
US09/706,406 Active 2024-04-24 US8996698B1 (en) 2000-11-03 2000-11-03 Cooperative network for mobile internet access
US11/129,184 Active 2025-09-23 US9049042B2 (en) 2000-11-03 2005-05-12 System for providing mobile VoIP
US12/684,365 Expired - Fee Related US8862736B2 (en) 2000-11-03 2010-01-08 Cooperative network for mobile internet access
US12/684,348 Expired - Fee Related US8935326B2 (en) 2000-11-03 2010-01-08 Cooperative network for mobile internet access
US14/672,826 Abandoned US20150207885A1 (en) 2000-11-03 2015-03-30 Cooperative network for mobile internet access
US14/722,561 Abandoned US20160037389A1 (en) 2000-11-03 2015-05-27 System for Providing Mobile VoIP

Family Applications Before (5)

Application Number Title Priority Date Filing Date
US09/706,406 Active 2024-04-24 US8996698B1 (en) 2000-11-03 2000-11-03 Cooperative network for mobile internet access
US11/129,184 Active 2025-09-23 US9049042B2 (en) 2000-11-03 2005-05-12 System for providing mobile VoIP
US12/684,365 Expired - Fee Related US8862736B2 (en) 2000-11-03 2010-01-08 Cooperative network for mobile internet access
US12/684,348 Expired - Fee Related US8935326B2 (en) 2000-11-03 2010-01-08 Cooperative network for mobile internet access
US14/672,826 Abandoned US20150207885A1 (en) 2000-11-03 2015-03-30 Cooperative network for mobile internet access

Country Status (8)

Country Link
US (6) US8996698B1 (en)
EP (2) EP1344143B1 (en)
AU (1) AU2002246586A1 (en)
CY (1) CY1114391T1 (en)
DK (1) DK1344143T3 (en)
ES (1) ES2426670T3 (en)
PT (1) PT1344143E (en)
WO (1) WO2002057869A2 (en)

Cited By (53)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140192681A1 (en) * 2013-01-09 2014-07-10 Samsung Electronics Co., Ltd. Apparatus and method for providing integrated device information
US20150381698A1 (en) * 2015-05-08 2015-12-31 Bandwidth.Com, Inc. Bonding of Multiple Concurrent Data Streams Among Multiple Devices
US20170366923A1 (en) * 2016-06-16 2017-12-21 I/O Interconnect, Ltd. Method for making a host personal computer act as an accessory in bluetooth piconet
US20180324048A1 (en) * 2017-05-08 2018-11-08 Sk Planet Co., Ltd. Smart order apparatus, operation method thereof, and terminal
US10154033B2 (en) * 2016-06-16 2018-12-11 Ambit Microsystems (Shanghai) Ltd. Electronic device and method for establishing wireless connection
US10165612B2 (en) * 2016-06-16 2018-12-25 I/O Interconnected, Ltd. Wireless connecting method, computer, and non-transitory computer-readable storage medium
CN109922490A (en) * 2019-01-28 2019-06-21 行目数据科技有限公司 A kind of anti-interruption continuous transmission management system of data
CN111065137A (en) * 2019-12-17 2020-04-24 海信集团有限公司 Method for accessing intelligent equipment to network based on Bluetooth and wireless network
US10650621B1 (en) 2016-09-13 2020-05-12 Iocurrents, Inc. Interfacing with a vehicular controller area network
US11343380B2 (en) 2004-03-16 2022-05-24 Icontrol Networks, Inc. Premises system automation
US11341840B2 (en) 2010-12-17 2022-05-24 Icontrol Networks, Inc. Method and system for processing security event data
US11367340B2 (en) 2005-03-16 2022-06-21 Icontrol Networks, Inc. Premise management systems and methods
US11368327B2 (en) 2008-08-11 2022-06-21 Icontrol Networks, Inc. Integrated cloud system for premises automation
US11368429B2 (en) 2004-03-16 2022-06-21 Icontrol Networks, Inc. Premises management configuration and control
US11378922B2 (en) 2004-03-16 2022-07-05 Icontrol Networks, Inc. Automation system with mobile interface
US11398147B2 (en) 2010-09-28 2022-07-26 Icontrol Networks, Inc. Method, system and apparatus for automated reporting of account and sensor zone information to a central station
US11405463B2 (en) 2014-03-03 2022-08-02 Icontrol Networks, Inc. Media content management
US11412027B2 (en) 2007-01-24 2022-08-09 Icontrol Networks, Inc. Methods and systems for data communication
US11410531B2 (en) 2004-03-16 2022-08-09 Icontrol Networks, Inc. Automation system user interface with three-dimensional display
US11418518B2 (en) 2006-06-12 2022-08-16 Icontrol Networks, Inc. Activation of gateway device
US11423756B2 (en) 2007-06-12 2022-08-23 Icontrol Networks, Inc. Communication protocols in integrated systems
US11424980B2 (en) * 2005-03-16 2022-08-23 Icontrol Networks, Inc. Forming a security network including integrated security system components
US11489812B2 (en) 2004-03-16 2022-11-01 Icontrol Networks, Inc. Forming a security network including integrated security system components and network devices
US11496568B2 (en) 2005-03-16 2022-11-08 Icontrol Networks, Inc. Security system with networked touchscreen
US11537186B2 (en) 2004-03-16 2022-12-27 Icontrol Networks, Inc. Integrated security system with parallel processing architecture
US11553399B2 (en) 2009-04-30 2023-01-10 Icontrol Networks, Inc. Custom content for premises management
US11582065B2 (en) 2007-06-12 2023-02-14 Icontrol Networks, Inc. Systems and methods for device communication
US11595364B2 (en) 2005-03-16 2023-02-28 Icontrol Networks, Inc. System for data routing in networks
US11601810B2 (en) 2007-06-12 2023-03-07 Icontrol Networks, Inc. Communication protocols in integrated systems
US11611568B2 (en) 2007-06-12 2023-03-21 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US11615697B2 (en) 2005-03-16 2023-03-28 Icontrol Networks, Inc. Premise management systems and methods
US11626006B2 (en) 2004-03-16 2023-04-11 Icontrol Networks, Inc. Management of a security system at a premises
US11632308B2 (en) 2007-06-12 2023-04-18 Icontrol Networks, Inc. Communication protocols in integrated systems
US11641391B2 (en) 2008-08-11 2023-05-02 Icontrol Networks Inc. Integrated cloud system with lightweight gateway for premises automation
US11646907B2 (en) 2007-06-12 2023-05-09 Icontrol Networks, Inc. Communication protocols in integrated systems
US11663902B2 (en) 2007-04-23 2023-05-30 Icontrol Networks, Inc. Method and system for providing alternate network access
US11677577B2 (en) 2004-03-16 2023-06-13 Icontrol Networks, Inc. Premises system management using status signal
US11700142B2 (en) 2005-03-16 2023-07-11 Icontrol Networks, Inc. Security network integrating security system and network devices
US11706279B2 (en) 2007-01-24 2023-07-18 Icontrol Networks, Inc. Methods and systems for data communication
US11722896B2 (en) 2007-06-12 2023-08-08 Icontrol Networks, Inc. Communication protocols in integrated systems
US11729255B2 (en) 2008-08-11 2023-08-15 Icontrol Networks, Inc. Integrated cloud system with lightweight gateway for premises automation
US11757834B2 (en) 2004-03-16 2023-09-12 Icontrol Networks, Inc. Communication protocols in integrated systems
US11758026B2 (en) 2008-08-11 2023-09-12 Icontrol Networks, Inc. Virtual device systems and methods
US11792036B2 (en) 2008-08-11 2023-10-17 Icontrol Networks, Inc. Mobile premises automation platform
US11792330B2 (en) 2005-03-16 2023-10-17 Icontrol Networks, Inc. Communication and automation in a premises management system
US11809174B2 (en) 2007-02-28 2023-11-07 Icontrol Networks, Inc. Method and system for managing communication connectivity
US11811845B2 (en) 2004-03-16 2023-11-07 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US11816323B2 (en) 2008-06-25 2023-11-14 Icontrol Networks, Inc. Automation system user interface
US11824675B2 (en) 2005-03-16 2023-11-21 Icontrol Networks, Inc. Networked touchscreen with integrated interfaces
US11831462B2 (en) 2007-08-24 2023-11-28 Icontrol Networks, Inc. Controlling data routing in premises management systems
US11894986B2 (en) 2007-06-12 2024-02-06 Icontrol Networks, Inc. Communication protocols in integrated systems
US11916928B2 (en) 2008-01-24 2024-02-27 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US11916870B2 (en) 2004-03-16 2024-02-27 Icontrol Networks, Inc. Gateway registry methods and systems

Families Citing this family (450)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8996698B1 (en) * 2000-11-03 2015-03-31 Truphone Limited Cooperative network for mobile internet access
US6760772B2 (en) 2000-12-15 2004-07-06 Qualcomm, Inc. Generating and implementing a communication protocol and interface for high data rate signal transfer
US7302634B2 (en) 2001-03-14 2007-11-27 Microsoft Corporation Schema-based services for identity-based data access
US7024662B2 (en) 2001-03-14 2006-04-04 Microsoft Corporation Executing dynamically assigned functions while providing services
US20050198379A1 (en) 2001-06-13 2005-09-08 Citrix Systems, Inc. Automatically reconnecting a client across reliable and persistent communication sessions
EP2432190A3 (en) 2001-06-27 2014-02-19 SKKY Incorporated Improved media delivery platform
KR100407571B1 (en) * 2001-06-29 2003-12-01 삼성전자주식회사 Method for using user data in a bluetooth device without user interface
US8812706B1 (en) 2001-09-06 2014-08-19 Qualcomm Incorporated Method and apparatus for compensating for mismatched delays in signals of a mobile display interface (MDDI) system
US7149196B1 (en) 2002-01-11 2006-12-12 Broadcom Corporation Location tracking in a wireless communication system using power levels of packets received by repeaters
US7876704B1 (en) 2002-01-11 2011-01-25 Broadcom Corporation Tunneling protocols for wireless communications
US7515557B1 (en) * 2002-01-11 2009-04-07 Broadcom Corporation Reconfiguration of a communication system
US7672274B2 (en) 2002-01-11 2010-03-02 Broadcom Corporation Mobility support via routing
US7661129B2 (en) 2002-02-26 2010-02-09 Citrix Systems, Inc. Secure traversal of network components
US20030224788A1 (en) * 2002-03-05 2003-12-04 Cisco Technology, Inc. Mobile IP roaming between internal and external networks
US8090828B2 (en) * 2002-03-05 2012-01-03 Cisco Technology, Inc. Method and apparatus for reusing DHCP addresses in home addresses of mobile IP clients
US7461169B2 (en) * 2002-03-05 2008-12-02 Cisco Technology, Inc. DHCP based home address management of mobile IP clients
US7447162B1 (en) 2002-03-05 2008-11-04 Cisco Technology, Inc. Methods and apparatus for anchoring of mobile nodes using DNS
US7426380B2 (en) 2002-03-28 2008-09-16 Telecommunication Systems, Inc. Location derived presence information
US9154906B2 (en) 2002-03-28 2015-10-06 Telecommunication Systems, Inc. Area watcher for wireless network
US20030185184A1 (en) * 2002-04-02 2003-10-02 Roger Wu Processor device for coupling to various facilities
KR100876780B1 (en) * 2002-06-05 2009-01-07 삼성전자주식회사 Method and apparatus for sharing a single internet protocol address, without converting network address in an internet access gateway for local network
US7113498B2 (en) 2002-06-05 2006-09-26 Broadcom Corporation Virtual switch
US9886309B2 (en) * 2002-06-28 2018-02-06 Microsoft Technology Licensing, Llc Identity-based distributed computing for device resources
US7295540B2 (en) * 2002-08-23 2007-11-13 Telefonaktiebolaget L M Ericsson (Publ) Signaling wireless wide area network mechanism for a terminal located in a wireless local area network
US7606190B2 (en) 2002-10-18 2009-10-20 Kineto Wireless, Inc. Apparatus and messages for interworking between unlicensed access network and GPRS network for data services
CN101715193A (en) 2002-10-18 2010-05-26 卡耐特无线有限公司 Apparatus and method for extending the coverage area of a licensed wireless communication system
US7266100B2 (en) * 2002-11-01 2007-09-04 Nokia Corporation Session updating procedure for authentication, authorization and accounting
US7974237B2 (en) * 2003-12-08 2011-07-05 Bryan Kattwinkel Cost efficient spectral-reuse transceiver
EP1588525B1 (en) * 2003-01-23 2009-07-08 Research In Motion Limited Methods and apparatus for re-establishing communication for a wireless communication device after a communication loss in a wireless communication network
WO2004075582A1 (en) 2003-02-21 2004-09-02 Nortel Networks Limited Data communication apparatus and method for establishing a codec-bypass connection
JP2004258780A (en) * 2003-02-24 2004-09-16 Seiko Epson Corp Printer
US8014339B1 (en) * 2003-02-25 2011-09-06 Hewlett-Packard Company Methods for providing universal network access within a wireless communication system
US7620027B2 (en) * 2003-03-14 2009-11-17 Canon Kabushiki Kaisha Communication system, information processing device, connection device, and connection device designation method for designating connection device for communication device to connect to
JP4102692B2 (en) * 2003-03-25 2008-06-18 富士通株式会社 Radio base station apparatus and base station control apparatus
WO2004107131A2 (en) 2003-05-28 2004-12-09 Caymas Systems, Inc. Policy based network address translation
EP2001192B1 (en) 2003-06-02 2011-05-11 Qualcomm Incorporated Generating and implementing a signal protocol and interface for higher data rates
US20040264410A1 (en) * 2003-06-30 2004-12-30 Motorola, Inc. Method and apparatus for providing a communication unit with a handoff between networks
US7643442B1 (en) * 2003-06-30 2010-01-05 Cisco Systems, Inc. Dynamic QoS configuration based on transparent processing of session initiation messages
EP2363989B1 (en) 2003-08-13 2018-09-19 Qualcomm Incorporated A signal interface for higher data rates
KR100951158B1 (en) * 2003-09-10 2010-04-06 콸콤 인코포레이티드 High data rate interface
CA2542649A1 (en) 2003-10-15 2005-04-28 Qualcomm Incorporated High data rate interface
US6940844B2 (en) * 2003-10-17 2005-09-06 Interdigital Technology Corporation Method and apparatus for reporting WLAN capabilities of a dual mode GPRS/WLAN or UMTS/WLAN WTRU
AU2004307162A1 (en) 2003-10-29 2005-05-12 Qualcomm Incorporated High data rate interface
US7978716B2 (en) 2003-11-24 2011-07-12 Citrix Systems, Inc. Systems and methods for providing a VPN solution
CN1902886B (en) 2003-11-12 2011-02-23 高通股份有限公司 High data rate interface with improved link control
EP1695589A4 (en) * 2003-11-20 2007-04-18 Research In Motion Ltd Seamless call switching in a dual mode environment
KR20060096161A (en) 2003-11-25 2006-09-07 콸콤 인코포레이티드 High data rate interface with improved link synchronization
MXPA06006452A (en) 2003-12-08 2006-08-31 Qualcomm Inc High data rate interface with improved link synchronization.
US20050122984A1 (en) * 2003-12-09 2005-06-09 Heng-Chien Chen Roaming communication system over internet
US7694127B2 (en) * 2003-12-11 2010-04-06 Tandberg Telecom As Communication systems for traversing firewalls and network address translation (NAT) installations
US7260186B2 (en) 2004-03-23 2007-08-21 Telecommunication Systems, Inc. Solutions for voice over internet protocol (VoIP) 911 location services
US7903791B2 (en) 2005-06-13 2011-03-08 Telecommunication Systems, Inc. Enhanced E911 location information using voice over internet protocol (VoIP)
US7113779B1 (en) * 2004-01-08 2006-09-26 Iwao Fujisaki Carrier
KR100657065B1 (en) * 2004-01-29 2006-12-13 삼성전자주식회사 Device and method for character processing in wireless terminal
JP2005222261A (en) * 2004-02-05 2005-08-18 Nec Corp In-train network connection service operation method, communication system using the method, and service operation system
US7890996B1 (en) 2004-02-18 2011-02-15 Teros, Inc. Using statistical analysis to generate exception rules that allow legitimate messages to pass through application proxies and gateways
US7774834B1 (en) 2004-02-18 2010-08-10 Citrix Systems, Inc. Rule generalization for web application entry point modeling
US7656895B2 (en) * 2004-03-04 2010-02-02 Wiline Networks, Inc. Method and device for coupling a POTS terminal to a non-PSTN communications network
EP2375677B1 (en) 2004-03-10 2013-05-29 Qualcomm Incorporated High data rate interface apparatus and method
US7814153B2 (en) * 2004-03-12 2010-10-12 Prototerra, Inc. System and method for client side managed data prioritization and connections
AU2005223960B2 (en) 2004-03-17 2009-04-09 Qualcomm Incorporated High data rate interface apparatus and method
US8027265B2 (en) 2004-03-19 2011-09-27 Genband Us Llc Providing a capability list of a predefined format in a communications network
WO2005089055A2 (en) 2004-03-19 2005-09-29 Nortel Networks Limited Communicating processing capabilites along a communications path
US7827139B2 (en) 2004-04-15 2010-11-02 Citrix Systems, Inc. Methods and apparatus for sharing graphical screen data in a bandwidth-adaptive manner
US7680885B2 (en) 2004-04-15 2010-03-16 Citrix Systems, Inc. Methods and apparatus for synchronization of data set representations in a bandwidth-adaptive manner
US8972576B2 (en) 2004-04-28 2015-03-03 Kdl Scan Designs Llc Establishing a home relationship between a wireless device and a server in a wireless network
US9008055B2 (en) * 2004-04-28 2015-04-14 Kdl Scan Designs Llc Automatic remote services provided by a home relationship between a device and a server
DE102004023803B4 (en) * 2004-05-13 2009-01-02 Siemens Ag communication terminal
US8650304B2 (en) 2004-06-04 2014-02-11 Qualcomm Incorporated Determining a pre skew and post skew calibration data rate in a mobile display digital interface (MDDI) communication system
WO2005122509A1 (en) 2004-06-04 2005-12-22 Qualcomm Incorporated High data rate interface apparatus and method
US7505443B2 (en) * 2004-06-24 2009-03-17 Kapsch Trafficcom Inc. System and method for broadcasting application-specific information in wireless local area networks
US8739274B2 (en) 2004-06-30 2014-05-27 Citrix Systems, Inc. Method and device for performing integrated caching in a data communication network
US8495305B2 (en) 2004-06-30 2013-07-23 Citrix Systems, Inc. Method and device for performing caching of dynamically generated objects in a data communication network
US7757074B2 (en) 2004-06-30 2010-07-13 Citrix Application Networking, Llc System and method for establishing a virtual private network
EP1771998B1 (en) 2004-07-23 2015-04-15 Citrix Systems, Inc. Systems and methods for optimizing communications between network nodes
EP1771979B1 (en) 2004-07-23 2011-11-23 Citrix Systems, Inc. A method and systems for securing remote access to private networks
US7657657B2 (en) 2004-08-13 2010-02-02 Citrix Systems, Inc. Method for maintaining transaction integrity across multiple remote access servers
US8688150B2 (en) * 2004-08-14 2014-04-01 Kirusa Inc. Methods for identifying messages and communicating with users of a multimodal message service
US7940746B2 (en) 2004-08-24 2011-05-10 Comcast Cable Holdings, Llc Method and system for locating a voice over internet protocol (VoIP) device connected to a network
US9232338B1 (en) 2004-09-09 2016-01-05 At&T Intellectual Property Ii, L.P. Server-paid internet access service
US8976767B2 (en) 2004-09-24 2015-03-10 Simple Works, Inc. System and method for communicating over an 802.15.4 network
US7636340B2 (en) * 2004-09-24 2009-12-22 Simple Works, Inc. System and method for communicating over an 802.15.4 network
US7702750B2 (en) 2004-09-29 2010-04-20 Citrix Systems, Inc. System and method for event detection and re-direction over a network using a presentation level protocol
US8069226B2 (en) 2004-09-30 2011-11-29 Citrix Systems, Inc. System and method for data synchronization over a network using a presentation level protocol
US7451486B2 (en) * 2004-09-30 2008-11-11 Avaya Inc. Stateful and cross-protocol intrusion detection for voice over IP
US8699330B2 (en) 2004-11-24 2014-04-15 Qualcomm Incorporated Systems and methods for digital data transmission rate control
US8667363B2 (en) 2004-11-24 2014-03-04 Qualcomm Incorporated Systems and methods for implementing cyclic redundancy checks
US8539119B2 (en) 2004-11-24 2013-09-17 Qualcomm Incorporated Methods and apparatus for exchanging messages having a digital data interface device message format
US8873584B2 (en) 2004-11-24 2014-10-28 Qualcomm Incorporated Digital data interface device
US8692838B2 (en) 2004-11-24 2014-04-08 Qualcomm Incorporated Methods and systems for updating a buffer
US8723705B2 (en) 2004-11-24 2014-05-13 Qualcomm Incorporated Low output skew double data rate serial encoder
US7489698B2 (en) * 2004-12-16 2009-02-10 International Business Machines Corporation Mediator based architecture for first responder interoperability systems (FRIS)
US8954595B2 (en) 2004-12-30 2015-02-10 Citrix Systems, Inc. Systems and methods for providing client-side accelerated access to remote applications via TCP buffering
US8706877B2 (en) 2004-12-30 2014-04-22 Citrix Systems, Inc. Systems and methods for providing client-side dynamic redirection to bypass an intermediary
US8700695B2 (en) 2004-12-30 2014-04-15 Citrix Systems, Inc. Systems and methods for providing client-side accelerated access to remote applications via TCP pooling
US7810089B2 (en) 2004-12-30 2010-10-05 Citrix Systems, Inc. Systems and methods for automatic installation and execution of a client-side acceleration program
US8549149B2 (en) 2004-12-30 2013-10-01 Citrix Systems, Inc. Systems and methods for providing client-side accelerated access to remote applications via TCP multiplexing
JP5183214B2 (en) 2005-01-24 2013-04-17 サイトリックス システムズ,インコーポレイテッド System and method for performing caching of dynamically generated objects in a network
US8255456B2 (en) 2005-12-30 2012-08-28 Citrix Systems, Inc. System and method for performing flash caching of dynamically generated objects in a data communication network
US7594252B2 (en) * 2005-03-01 2009-09-22 Time Warner Cable, Inc. Early warning fault identification and isolation system for a two-way cable network
US20060218612A1 (en) * 2005-03-01 2006-09-28 Keith Johnson Fault detection and isolation system for an HFC cable network and method therefor
US20060205449A1 (en) * 2005-03-08 2006-09-14 Broadcom Corporation Mechanism for improved interoperability when content protection is used with an audio stream
US20060205349A1 (en) * 2005-03-08 2006-09-14 Enq Semiconductor, Inc. Apparatus and method for wireless audio network management
US20070121561A1 (en) * 2005-03-09 2007-05-31 Haim Yashar Wlan mobile phone and wireless network
DE112006000618T5 (en) 2005-03-15 2008-02-07 Trapeze Networks, Inc., Pleasanton System and method for distributing keys in a wireless network
US8565721B2 (en) 2006-10-20 2013-10-22 T-Mobile Usa, Inc. System and method for rating an IP-based wireless telecommunications based on access point
US7505433B2 (en) * 2005-04-01 2009-03-17 Toshiba America Research, Inc. Autonomous and heterogeneous network discovery and reuse
US8989813B2 (en) 2005-04-06 2015-03-24 Qwest Communications International Inc. Handset registration in a dual-mode environment
US9363384B2 (en) * 2005-04-06 2016-06-07 Qwest Communications International Inc. Systems for delivering calls on dual-mode wireless handsets
US9363370B2 (en) * 2005-04-06 2016-06-07 Qwest Communications International Inc. Methods of delivering calls on dual-mode wireless handsets
US8825108B2 (en) 2005-04-06 2014-09-02 Qwest Communications International Inc. Call handling on dual-mode wireless handsets
WO2006122213A2 (en) 2005-05-10 2006-11-16 Network Equipment Technologies, Inc. Lan-based uma network controller with aggregated transport
CN100488111C (en) * 2005-05-15 2009-05-13 华为技术有限公司 Method for implementing WIMAX dynamic QQS based on terminal perception service
US20060262758A1 (en) * 2005-05-17 2006-11-23 Sumeet Sandhu Distributed communications for wireless networks
US20060268902A1 (en) * 2005-05-24 2006-11-30 Cingular Wireless Ii, Llc Dynamic dual-mode service access control, location-based billing, and e911 mechanisms
US8443040B2 (en) 2005-05-26 2013-05-14 Citrix Systems Inc. Method and system for synchronizing presentation of a dynamic data set to a plurality of nodes
US7466991B2 (en) * 2005-05-26 2008-12-16 Sprint Spectrum L.P. Method and system using a conference bridge for handoff of a multi-mode mobile station
US8483173B2 (en) 2005-05-31 2013-07-09 Genband Us Llc Methods and systems for unlicensed mobile access realization in a media gateway
US8805370B1 (en) * 2005-06-21 2014-08-12 Taqua Wireless, Llc Hand-out and hand-in support for legacy mobiles serviced by a femtocell attached to an IMS network
US20090067417A1 (en) * 2007-07-14 2009-03-12 Tatara Systems, Inc. Method and apparatus for supporting SIP/IMS-based femtocells
JP4197692B2 (en) * 2005-07-07 2008-12-17 株式会社東芝 Handover processing method for mobile communication system
WO2007011861A2 (en) * 2005-07-18 2007-01-25 Telecommunication Systems, Inc. Integrated services user part (isup)/session initiation protocol (sip) gateway for unlicensed mobile access (uma) emergency services call flow
US8660573B2 (en) * 2005-07-19 2014-02-25 Telecommunications Systems, Inc. Location service requests throttling
US7706252B2 (en) * 2005-07-21 2010-04-27 Time Warner Cable, Inc. System and method for locating faults in a hybrid fiber coax (HFC) cable network
US8947542B2 (en) * 2005-07-26 2015-02-03 Alex Is The Best, Llc Integrated internet camera system and method
DE202005021930U1 (en) 2005-08-01 2011-08-08 Corning Cable Systems Llc Fiber optic decoupling cables and pre-connected assemblies with toning parts
US7792150B2 (en) 2005-08-19 2010-09-07 Genband Us Llc Methods, systems, and computer program products for supporting transcoder-free operation in media gateway
US7706822B2 (en) * 2005-08-24 2010-04-27 Motorola, Inc. Timing synchronization and beacon generation for mesh points operating in a wireless mesh network
US7810127B2 (en) * 2005-08-31 2010-10-05 Time Warner Cable, Inc. System and method for evaluating the operational status of a STB in a cable network
US7596800B2 (en) * 2005-08-31 2009-09-29 Time Warner Cable, Inc. System and method for assigning and verifying CPE service calls in a cable network
US7599300B2 (en) * 2005-08-31 2009-10-06 Time Warner Cable, Inc. Cable modem analysis system and method therefor for an HFC cable network
US7509669B2 (en) * 2005-08-31 2009-03-24 Time Warner Cable, Inc. VOD transaction error correlator
US7506354B2 (en) 2005-08-31 2009-03-17 Time Warner Cable, Inc. VOD transaction error correlator
US7974270B2 (en) * 2005-09-09 2011-07-05 Kineto Wireless, Inc. Media route optimization in network communications
US8873548B1 (en) 2005-09-22 2014-10-28 Verizon Patent And Licensing Inc. Method and system for providing call-forwarding status indications in a packet-switched network
WO2007033485A2 (en) * 2005-09-23 2007-03-29 Research In Motion Limited Conferencing pstn gateway methods and apparatus to facilitate heterogeneous wireless network handovers for mobile communication devices
US7536184B2 (en) * 2005-09-29 2009-05-19 Sun Microsystems, Inc. Seamless mobility management with service detail records
US7756992B1 (en) * 2005-09-30 2010-07-13 Trend Micro Incorporated Reliable delivery of updates for antivirus programs
US8634341B1 (en) * 2005-10-11 2014-01-21 Atmel Corporation Method and apparatus for iterative synchronization of two or more electronic devices
US8145190B2 (en) * 2005-10-12 2012-03-27 T-Mobile Usa, Inc. System and method for billing IP-based wireless telecommunications in a converged network
US8638762B2 (en) 2005-10-13 2014-01-28 Trapeze Networks, Inc. System and method for network integrity
WO2007044986A2 (en) 2005-10-13 2007-04-19 Trapeze Networks, Inc. System and method for remote monitoring in a wireless network
US7573859B2 (en) 2005-10-13 2009-08-11 Trapeze Networks, Inc. System and method for remote monitoring in a wireless network
US7724703B2 (en) 2005-10-13 2010-05-25 Belden, Inc. System and method for wireless network monitoring
CA2619642C (en) 2005-10-21 2014-07-29 T-Mobile Usa, Inc. System and method for determining device location in an ip-based wireless telecommunications network
US7447196B2 (en) * 2005-10-25 2008-11-04 Kinghood Technology Co., Ltd. Wireless networking communication system and communicating method for VOIP
US8692839B2 (en) 2005-11-23 2014-04-08 Qualcomm Incorporated Methods and systems for updating a buffer
US8730069B2 (en) 2005-11-23 2014-05-20 Qualcomm Incorporated Double data rate serial encoder
US8301839B2 (en) 2005-12-30 2012-10-30 Citrix Systems, Inc. System and method for performing granular invalidation of cached dynamically generated objects in a data communication network
US7921184B2 (en) 2005-12-30 2011-04-05 Citrix Systems, Inc. System and method for performing flash crowd caching of dynamically generated objects in a data communication network
US7835346B2 (en) * 2006-01-17 2010-11-16 Genband Us Llc Methods, systems, and computer program products for providing transcoder free operation (TrFO) and interworking between unlicensed mobile access (UMA) and universal mobile telecommunications system (UMTS) call legs using a media gateway
US20070178939A1 (en) * 2006-01-31 2007-08-02 Sbc Knowledge Ventures Lp Method for reducing radio interference between wireless access points
US8116769B2 (en) * 2006-02-03 2012-02-14 Cisco Technology, Inc. Anchoring a communication session in a multiple mode system
EP1816845B1 (en) * 2006-02-06 2020-03-04 Swisscom AG Method and system for location dependent charging of services
KR101276821B1 (en) 2006-02-06 2013-06-18 엘지전자 주식회사 Multiple network connection method and communication device thereof
US20070183406A1 (en) * 2006-02-07 2007-08-09 Bennett James D Digital cable network telephone service provider supporting premises wireless networks
ATE434359T1 (en) * 2006-02-10 2009-07-15 Research In Motion Ltd METHOD AND SYSTEM FOR SIGNALING THE FORWARDING OF VOICE CONNECTIONS BETWEEN ACCESS POINTS IN A WIRELESS LOCAL NETWORK
US8433820B2 (en) * 2006-02-10 2013-04-30 Research In Motion Limited Method and system for conserving battery power in wireless devices operating in a wireless local area network
US8165137B2 (en) * 2006-02-27 2012-04-24 Alcatel Lucent Fast database migration
US8279850B2 (en) 2006-03-06 2012-10-02 At&T Intellectual Property I, Lp Methods and apparatus to implement voice over internet protocol (VoIP) phones
GB0604537D0 (en) * 2006-03-07 2006-04-12 Ghost Telecom Ltd Method and apparatus of interfacing and connecting a wireless device(s) and specific application server(s) for location update(s), in-and out-going call(s)...
US20070237338A1 (en) * 2006-04-11 2007-10-11 Alon Konchitsky Method and apparatus to improve voice quality of cellular calls by noise reduction using a microphone receiving noise and speech from two air pipes
US20070211909A1 (en) * 2006-03-13 2007-09-13 Microlink Communications Inc. Echo cancellation method in wireless headset communication system
EP1838121A1 (en) * 2006-03-22 2007-09-26 BRITISH TELECOMMUNICATIONS public limited company Method and apparatus for re-establishing wireless communication sessions
US9100407B2 (en) * 2006-03-23 2015-08-04 Cisco Technology, Inc. Method and system to enhance performance of a session initiation protocol network and its elements
KR100759438B1 (en) * 2006-03-29 2007-09-20 엠피에스리서치(주) High speed intra-domain mobility management method using dual interfaces in wireless lan/man system
US8151323B2 (en) 2006-04-12 2012-04-03 Citrix Systems, Inc. Systems and methods for providing levels of access and action control via an SSL VPN appliance
CA2619648C (en) 2006-04-13 2013-12-31 T-Mobile Usa, Inc. Mobile computing device geographic location determination
US8165086B2 (en) * 2006-04-18 2012-04-24 Kineto Wireless, Inc. Method of providing improved integrated communication system data service
US9021027B2 (en) * 2006-04-20 2015-04-28 Cisco Technology, Inc. Techniques for alerting a user of unchecked messages before communication with a contact
CA2649866A1 (en) * 2006-04-28 2007-11-08 Research In Motion Limited Wlan and wwan connection migration methods and apparatus
EP1850618A1 (en) * 2006-04-28 2007-10-31 Alcatel Lucent A method for access by a mobile station to a core network via an unlicensed mobile access network
US7558266B2 (en) 2006-05-03 2009-07-07 Trapeze Networks, Inc. System and method for restricting network access using forwarding databases
EP2021731A4 (en) 2006-05-08 2010-07-21 Telecomm Systems Inc Location input mistake correction
US20070270190A1 (en) * 2006-05-17 2007-11-22 Motorola, Inc. Method and system for suppressing echo during a handover
US20070271453A1 (en) * 2006-05-19 2007-11-22 Nikia Corporation Identity based flow control of IP traffic
US8966018B2 (en) 2006-05-19 2015-02-24 Trapeze Networks, Inc. Automated network device configuration and network deployment
US20070280200A1 (en) * 2006-05-31 2007-12-06 Patel Mehul B System and method for controlling a voip client using a wireless personal-area-network enabled device
WO2008049132A2 (en) 2006-10-20 2008-04-24 T-Mobile Usa, Inc. System and method for determining a subscriber's zone information
US8121099B2 (en) * 2006-06-04 2012-02-21 Asustek Computer Inc. Voice over internet protocol system and related wireless local area network device
US9191799B2 (en) 2006-06-09 2015-11-17 Juniper Networks, Inc. Sharing data between wireless switches system and method
US9258702B2 (en) 2006-06-09 2016-02-09 Trapeze Networks, Inc. AP-local dynamic switching
US8818322B2 (en) 2006-06-09 2014-08-26 Trapeze Networks, Inc. Untethered access point mesh system and method
CN100571206C (en) * 2006-06-19 2009-12-16 上海贝尔阿尔卡特股份有限公司 Base station system and call setup thereof, switching and release processing method in the mixed networking
US7825793B1 (en) 2006-06-21 2010-11-02 Sunrise Technologies, Inc. Remote monitoring and control system
US9137388B2 (en) * 2006-06-23 2015-09-15 Tp Lab, Inc. Telephone with card-reader
US20080039070A1 (en) * 2006-06-29 2008-02-14 Amnon Ptashek Remote mobile testing probe
US7970401B2 (en) * 2006-07-05 2011-06-28 Cisco Technology, Inc. Associating a handoff address to a communication session
NO325083B1 (en) * 2006-07-07 2008-01-28 Tandberg Telecom As Method and System for Establishing a Video Conference Call Between a Remote and a Local Endpoint
US8064401B2 (en) 2006-07-14 2011-11-22 Qualcomm Incorporated Expedited handoff
US20080076425A1 (en) 2006-09-22 2008-03-27 Amit Khetawat Method and apparatus for resource management
US7693108B2 (en) * 2006-08-01 2010-04-06 Intel Corporation Methods and apparatus for providing a handover control system associated with a wireless communication network
US8677007B2 (en) 2006-08-03 2014-03-18 Citrix Systems, Inc. Systems and methods for bypassing an appliance
US7953889B2 (en) 2006-08-03 2011-05-31 Citrix Systems, Inc. Systems and methods for routing VPN traffic around network disruption
US8135342B1 (en) 2006-09-15 2012-03-13 Harold Michael D System, method and apparatus for using a wireless cell phone device to create a desktop computer and media center
US20080051131A1 (en) * 2006-08-23 2008-02-28 Brima Ibrahim Method and system for transporting FM data over a Bluetooth HCI link
US8503431B2 (en) * 2006-08-25 2013-08-06 Wireless Wonders Ltd. Mobile phone related indirect communication system and method
US9270799B2 (en) 2006-08-25 2016-02-23 Wireless Wonders Ltd. Using indirect communication to provide a solution to use international dialing convention and incorporating phone numbers for non-phone devices
KR100817594B1 (en) * 2006-09-05 2008-03-27 삼성전자주식회사 Method And Apparatus For Auto Pairing Between the other Bluetooths And Bluetooth Apparatus
US8054241B2 (en) 2006-09-14 2011-11-08 Citrix Systems, Inc. Systems and methods for multiple display support in remote access software
US7791559B2 (en) 2006-09-14 2010-09-07 Citrix Systems, Inc. System and method for multiple display support in remote access software
US7898968B2 (en) * 2006-09-15 2011-03-01 Citrix Systems, Inc. Systems and methods for selecting efficient connection paths between computing devices
US8340110B2 (en) 2006-09-15 2012-12-25 Trapeze Networks, Inc. Quality of service provisioning for wireless networks
DE102006045298A1 (en) * 2006-09-26 2008-03-27 Siemens Ag Method for data transmission in a communications network
US20080084869A1 (en) * 2006-09-27 2008-04-10 Level 3 Communications, Inc. Using Registration State to Determine Potential Change in User Location
US20080074993A1 (en) * 2006-09-27 2008-03-27 Kati Vainola UMA classmark information
US20080080692A1 (en) * 2006-09-28 2008-04-03 Nortel Networks Limited System and method for joining a conference call or multimedia conference
US8090366B2 (en) * 2006-10-19 2012-01-03 At&T Mobility Ii Llc Systems and methods for file sharing through mobile devices
US8199697B2 (en) * 2006-10-19 2012-06-12 At&T Mobility Ii Llc Sharing data with an emergency response service over a mobile network
US8095124B2 (en) * 2006-10-20 2012-01-10 Verizon Patent And Licensing Inc. Systems and methods for managing and monitoring mobile data, content, access, and usage
US8369266B2 (en) 2006-10-20 2013-02-05 T-Mobile Usa, Inc. Two stage mobile device geographic location determination
WO2008051929A2 (en) * 2006-10-20 2008-05-02 T-Mobile Usa, Inc. System and method for utilizing ip-based wireless telecommunications client location data
US20080222294A1 (en) * 2006-10-21 2008-09-11 Paragon Wireless, Inc. Managing Communications Using a Mobile Device
US8351420B2 (en) 2006-10-23 2013-01-08 T-Mobile Usa, Inc. Maintenance of subscriber history for service support applications in an IP-based telecommunications system
US8095175B2 (en) * 2006-10-26 2012-01-10 Mcmaster University WLAN-to-WWAN handover methods and apparatus using a WLAN support node having a WWAN interface
US8923852B2 (en) * 2006-11-01 2014-12-30 Seven Networks, Inc. System, method, and computer-readable medium for user equipment decision-making criteria for connectivity and handover
EP1918794B1 (en) * 2006-11-01 2010-09-01 ABB Research Ltd. Method for utilisation of a simulation tool for communication systems
US20080108351A1 (en) * 2006-11-06 2008-05-08 Ut Starcom, Inc. Seamless transmission of media traffic for roaming mobile terminals during handoffs
US8781089B2 (en) * 2006-11-09 2014-07-15 Shai Haim Gilboa System, method and device for managing VOIP telecommunications
WO2008056251A2 (en) 2006-11-10 2008-05-15 Audiogate Technologies Ltd. System and method for providing advertisement based on speech recognition
WO2008056249A1 (en) * 2006-11-10 2008-05-15 Audiogate Technologies Ltd. Method and device for providing mobile voip
US20080132279A1 (en) * 2006-12-04 2008-06-05 Blumenthal Steven H Unlicensed mobile access
CA2705379C (en) * 2006-12-04 2016-08-30 Commvault Systems, Inc. Systems and methods for creating copies of data, such as archive copies
US8284740B2 (en) * 2006-12-11 2012-10-09 Intel Corporation Techniques to share multimedia and enable cellular phone conference calling using ad-hoc wireless networks
JP4657197B2 (en) * 2006-12-19 2011-03-23 富士通株式会社 Wireless communication connection destination selection method and apparatus
WO2008074366A1 (en) 2006-12-19 2008-06-26 Telefonaktiebolaget Lm Ericsson (Publ) Managing user access in a communications network
US8599747B1 (en) * 2006-12-20 2013-12-03 Radisys Canada Inc. Lawful interception of real time packet data
US8412207B2 (en) * 2006-12-21 2013-04-02 Core Wireless Licensing S.A.R.L. Method of providing a mobility service
US7840537B2 (en) 2006-12-22 2010-11-23 Commvault Systems, Inc. System and method for storing redundant information
US8346239B2 (en) 2006-12-28 2013-01-01 Genband Us Llc Methods, systems, and computer program products for silence insertion descriptor (SID) conversion
US7873061B2 (en) 2006-12-28 2011-01-18 Trapeze Networks, Inc. System and method for aggregation and queuing in a wireless network
US9569587B2 (en) 2006-12-29 2017-02-14 Kip Prod Pi Lp Multi-services application gateway and system employing the same
US11783925B2 (en) 2006-12-29 2023-10-10 Kip Prod P1 Lp Multi-services application gateway and system employing the same
US8281010B2 (en) 2006-12-29 2012-10-02 Prodea Systems, Inc. System and method for providing network support services and premises gateway support infrastructure
US9602880B2 (en) 2006-12-29 2017-03-21 Kip Prod P1 Lp Display inserts, overlays, and graphical user interfaces for multimedia systems
US11316688B2 (en) 2006-12-29 2022-04-26 Kip Prod P1 Lp Multi-services application gateway and system employing the same
US20170344703A1 (en) 2006-12-29 2017-11-30 Kip Prod P1 Lp Multi-services application gateway and system employing the same
KR100800822B1 (en) * 2007-01-03 2008-02-04 삼성전자주식회사 Method for processing handover in bridge-based cellular ethernet network
US20080175225A1 (en) * 2007-01-18 2008-07-24 Lon-Chan Chu Just-in-time call registration for mobile call to voip device
US8301189B1 (en) * 2007-01-23 2012-10-30 Marvell International Ltd. Method and apparatus for reducing power consumption in a multimode terminal when performing IP communications
US20080188250A1 (en) * 2007-02-05 2008-08-07 Utstarcom, Inc. Delivering a radio phone short messaging service message format within an application layer internet protocol message
US8855637B2 (en) * 2007-03-21 2014-10-07 Wi-Lan, Inc. Methods and apparatus for performing handoff based on the mobility of a subscriber station
US8270965B2 (en) * 2007-04-05 2012-09-18 Microsoft Corporation Signaling over cellular networks to reduce the Wi-Fi energy consumption of mobile devices
US7848293B2 (en) * 2007-05-09 2010-12-07 Broadcom Corporation System and method for automatic wireless transport selection for increased performance and reduced power consumption
US8909296B2 (en) * 2007-05-14 2014-12-09 Kopin Corporation Mobile wireless display software platform for controlling other systems and devices
EP2183927A4 (en) * 2007-05-14 2014-12-17 Sigma Group Inc Wireless multimedia system
JP4459253B2 (en) * 2007-05-29 2010-04-28 株式会社東芝 Communication terminal
US7929964B2 (en) * 2007-06-08 2011-04-19 Alcatel-Lucent Usa Inc. Managing mobile station Wi-Fi communications
US8775944B2 (en) 2008-06-26 2014-07-08 Citrix Systems, Inc. Methods and systems for interactive evaluation of policies
US8561148B2 (en) 2008-06-26 2013-10-15 Citrix Systems, Inc. Methods and systems for interactive evaluation using dynamically generated, interactive resultant sets of policies
US8619730B2 (en) 2007-07-20 2013-12-31 Broadcom Corporation Method and system for establishing a connection outside a mesh by including network connectivity information in router configuration messages
US8274957B2 (en) 2007-07-20 2012-09-25 Broadcom Corporation Method and system for dynamically setting up and tearing down connections in mesh networks
US20090046706A1 (en) * 2007-08-16 2009-02-19 Fred Chernow Managed Wireless Mesh Telephone Network And Method For Communicating High Quality Of Service Voice And Data
US8902904B2 (en) 2007-09-07 2014-12-02 Trapeze Networks, Inc. Network assignment based on priority
US8649386B2 (en) * 2007-09-11 2014-02-11 Prodea Systems, Inc Multi-interface wireless adapter and network bridge
KR101424718B1 (en) * 2007-10-17 2014-08-04 삼성전자 주식회사 Apparatus and method for providing accessible home network information in remote access environment
US8238942B2 (en) 2007-11-21 2012-08-07 Trapeze Networks, Inc. Wireless station location detection
DE102007058258A1 (en) * 2007-11-26 2009-06-10 Pilz Gmbh. & Co. Kg Device and method for wireless networking of automation technology devices
GB2455969A (en) * 2007-11-29 2009-07-01 Cvon Innovations Ltd Rerouting data transmissions for a mobile terminal to a recipient's VoIP client
US9130963B2 (en) 2011-04-06 2015-09-08 Telecommunication Systems, Inc. Ancillary data support in session initiation protocol (SIP) messaging
US20090143078A1 (en) * 2007-11-30 2009-06-04 Palm, Inc. Techniques to manage a radio based on location information
WO2009073024A1 (en) * 2007-12-04 2009-06-11 Bridgeport Networks, Inc. Unlicensed mobile access
US8121545B2 (en) * 2007-12-15 2012-02-21 Intel Corporation Wireless network awareness in appliances
TWI410788B (en) * 2007-12-21 2013-10-01 Htc Corp Power management systems and methods of electronic device,and computer readable recording medium thereof
US20090168766A1 (en) * 2007-12-28 2009-07-02 Vedat Eyuboglu Inter-Technology Bridging Over Access Points
WO2009120984A1 (en) 2008-03-28 2009-10-01 Kopin Corporation Handheld wireless display device having high-resolution display suitable for use as a mobile internet device
US8355671B2 (en) * 2008-01-04 2013-01-15 Kopin Corporation Method and apparatus for transporting video signal over Bluetooth wireless interface
US20090215398A1 (en) * 2008-02-25 2009-08-27 Adler Mitchell D Methods and Systems for Establishing Communications Between Devices
US8792940B2 (en) * 2008-02-27 2014-07-29 Mediatek Inc. Methods for handling hands-free device by audio gateway device with subscriber identity cards and systems utilizing the same
DE102008014747A1 (en) * 2008-03-18 2009-10-15 Gigaset Communications Gmbh Method and landline adapter for connecting a mobile terminal to a landline
JP4975672B2 (en) * 2008-03-27 2012-07-11 京セラ株式会社 Wireless communication device
US8150357B2 (en) 2008-03-28 2012-04-03 Trapeze Networks, Inc. Smoothing filter for irregular update intervals
UA99649C2 (en) 2008-04-07 2012-09-10 Косс Корпорейшн Normal;heading 1;WIRELESS EARPHONE THAT TRANSITIONS BETWEEN WIRELESS NETWORKS
EP2265966A4 (en) * 2008-04-08 2014-06-04 Google Inc Modular cell phone for fixed mobile convergence
DK2566198T3 (en) * 2008-05-14 2017-11-13 Nokia Technologies Oy PROCEDURE AND APPARATUS FOR OBTAINING LOCATION SERVICES
US8165090B2 (en) 2008-05-15 2012-04-24 Nix John A Efficient handover of media communications in heterogeneous IP networks
US9363108B2 (en) * 2008-06-05 2016-06-07 Cisco Technology, Inc. System for utilizing identity based on pairing of wireless devices
US8165091B2 (en) * 2008-06-27 2012-04-24 Nix John A Efficient handover of media communications in heterogeneous IP networks using LAN profiles and network handover rules
US9483429B2 (en) * 2008-07-14 2016-11-01 Texas Instruments Incorporated Unified input/output controller for integrated wireless devices
US8978105B2 (en) 2008-07-25 2015-03-10 Trapeze Networks, Inc. Affirming network relationships and resource access via related networks
US20100027524A1 (en) * 2008-07-31 2010-02-04 Nokia Corporation Radio layer emulation of real time protocol sequence number and timestamp
US20100040016A1 (en) * 2008-08-15 2010-02-18 Kar-Wing Edward Lor Wireless Network Handoff Method and Mobile Device Using Same
US8238298B2 (en) 2008-08-29 2012-08-07 Trapeze Networks, Inc. Picking an optimal channel for an access point in a wireless network
US20100054205A1 (en) * 2008-09-02 2010-03-04 Amit Kalhan Handoff management for multimode communication devices based on non-traffic state uplink signals
US8600038B2 (en) * 2008-09-04 2013-12-03 Qualcomm Incorporated System and method for echo cancellation
US8305980B1 (en) 2008-09-12 2012-11-06 Nix John A Efficient handover of media communications in heterogeneous IP networks using handover procedure rules and media handover relays
US9015181B2 (en) 2008-09-26 2015-04-21 Commvault Systems, Inc. Systems and methods for managing single instancing data
WO2010036754A1 (en) 2008-09-26 2010-04-01 Commvault Systems, Inc. Systems and methods for managing single instancing data
US8165077B2 (en) * 2008-09-26 2012-04-24 Microsoft Corporation Delegation of mobile communication to external device
US8335212B2 (en) * 2008-09-26 2012-12-18 Mformation System and method for providing least-cost routing of voice connections between home and foreign networks using voice-over-IP infrastructure
US8634795B2 (en) * 2008-10-21 2014-01-21 Spidercloud Wireless, Inc. Packet routing methods and apparatus for use in a communication system
US8412677B2 (en) 2008-11-26 2013-04-02 Commvault Systems, Inc. Systems and methods for byte-level or quasi byte-level single instancing
US8407721B2 (en) * 2008-12-12 2013-03-26 Microsoft Corporation Communication interface selection on multi-homed devices
JP4775451B2 (en) * 2009-02-04 2011-09-21 ブラザー工業株式会社 Telephone server and computer program
US20100205540A1 (en) * 2009-02-10 2010-08-12 Microsoft Corporation Techniques for providing one-click access to virtual conference events
US8401996B2 (en) 2009-03-30 2013-03-19 Commvault Systems, Inc. Storing a variable number of instances of data objects
US8289365B2 (en) * 2009-03-30 2012-10-16 Alcatel Lucent Method and apparatus for the efficient transmission of multimedia streams for teleconferencing
US20100250722A1 (en) * 2009-03-31 2010-09-30 Nokia Corporation Connectivity management for transport independent architectures
US8254837B2 (en) * 2009-04-23 2012-08-28 Motorola Mobility Llc Establishing full-duplex audio over an asynchronous bluetooth link
WO2010129487A1 (en) 2009-05-02 2010-11-11 Citrix Systems, Inc. Methods and systems for providing a consistent profile to overlapping user sessions
US20100284333A1 (en) * 2009-05-08 2010-11-11 Qualcomm Incorporated Method and apparatus for data session suspend control in a wireless communication system
US8718592B2 (en) 2009-05-15 2014-05-06 T-Mobile Usa, Inc. Mobile device location determination using micronetworks
US8311557B2 (en) * 2009-05-15 2012-11-13 T-Mobile Usa, Inc. Facility for selecting a mobile device location determination technique
US8578120B2 (en) 2009-05-22 2013-11-05 Commvault Systems, Inc. Block-level single instancing
CA2667820C (en) 2009-05-29 2013-10-01 Research In Motion Limited Signal quality determination methods and apparatus suitable for use in wlan-to-wwan transitioning
CN101931716B (en) * 2009-06-18 2012-12-19 国基电子(上海)有限公司 Modem and method for processing talking packet
US20100333175A1 (en) * 2009-06-24 2010-12-30 Auto Electronica Inc Smart Net System and Method of Use
CN101938284B (en) * 2009-06-30 2014-01-01 深圳富泰宏精密工业有限公司 Communication device and communication method thereof
CN101965029B (en) * 2009-07-21 2013-10-02 华为终端有限公司 Processing method supporting switching, communication device and communication system
US8908541B2 (en) 2009-08-04 2014-12-09 Genband Us Llc Methods, systems, and computer readable media for intelligent optimization of digital signal processor (DSP) resource utilization in a media gateway
US9449614B2 (en) * 2009-08-14 2016-09-20 Skype Controlling multi-party communications
US8891483B2 (en) * 2009-08-19 2014-11-18 Comcast Cable Communications, Llc Wireless gateway supporting a plurality of networks
US8599768B2 (en) * 2009-08-24 2013-12-03 Intel Corporation Distributing group size indications to mobile stations
GB0916582D0 (en) 2009-09-22 2009-10-28 Software Cellular Network Ltd Subscriber identification management broker for fixed/mobile networks
US9836376B2 (en) 2009-09-24 2017-12-05 Contec, Llc Method and system for automated test of end-user devices
US8234305B2 (en) 2009-09-30 2012-07-31 Avaya Inc. Method for determining communicative value
JP5434443B2 (en) * 2009-09-30 2014-03-05 富士通株式会社 Route control method, route control system, and route control program
US9531844B2 (en) * 2009-10-01 2016-12-27 Sony Corporation Automatic internet connection sharing among related devices
US8620270B2 (en) 2009-10-06 2013-12-31 Mosaid Technologies Incorporated System and method providing interoperability between cellular and other wireless systems
US8731509B2 (en) 2009-10-23 2014-05-20 Blackberry Limited Methods and apparatus for signal monitoring in a wireless communication network
US8660605B2 (en) 2009-12-10 2014-02-25 Altigen Communications, Inc. Mobile communications device interface device and method
US8925039B2 (en) * 2009-12-14 2014-12-30 At&T Intellectual Property I, L.P. System and method of selectively applying security measures to data services
KR101278351B1 (en) * 2009-12-15 2013-07-05 한국전자통신연구원 System and method for providing on-demand seamless application service using dpi in communication networks
US8750245B2 (en) 2010-02-26 2014-06-10 Blackberry Limited Methods and apparatus for use in initiating vertical handover based on comparative evaluation of WLAN and WWAN signal qualities
US9094927B2 (en) 2010-04-28 2015-07-28 T-Mobile Usa, Inc. Location continuity service for locating mobile devices using multiple access networks including wireless telecommunication networks
US8472974B2 (en) 2010-04-28 2013-06-25 T-Mobile Usa, Inc. Location continuity service for locating mobile devices using multiple access networks including wireless telecommunication networks
US8233903B2 (en) * 2010-06-14 2012-07-31 Avaya Inc. Method for registering communication terminals with base station devices by using virtual appliances
KR20120024247A (en) * 2010-09-06 2012-03-14 삼성전자주식회사 Method for operating a mobile device by recognizing a user gesture and the mobile device thereof
WO2012045023A2 (en) 2010-09-30 2012-04-05 Commvault Systems, Inc. Archiving data objects using secondary copies
US8699456B2 (en) 2010-10-26 2014-04-15 Blackberry Limited Methods and apparatus for use in improving network coverage for voice or data calls
US8655985B2 (en) * 2010-11-15 2014-02-18 International Business Machines Corporation Content delivery using multiple sources over heterogeneous interfaces
KR20120054839A (en) * 2010-11-22 2012-05-31 삼성전자주식회사 Method and apparatus for controlling access to data based on layer
US9077799B2 (en) * 2010-11-30 2015-07-07 International Business Machines Corporation Facilitating context delivery during communication sessions
US8942743B2 (en) 2010-12-17 2015-01-27 Telecommunication Systems, Inc. iALERT enhanced alert manager
US8837652B2 (en) * 2010-12-31 2014-09-16 Raytheon Company Receiver synchronization in radio communication systems employing transmit diversity
US9742891B2 (en) 2011-01-21 2017-08-22 Dell Products, Lp Personal computer and mobile phone communications through peer-to-peer connection
US8593967B2 (en) * 2011-03-08 2013-11-26 Medium Access Systems Private Limited Method and system of intelligently load balancing of Wi-Fi access point apparatus in a WLAN
US9467931B2 (en) * 2011-03-30 2016-10-11 Lg Electronics Inc. Method and device for entering network for client cooperation in wireless communication system
US8743751B2 (en) 2011-04-22 2014-06-03 Qualcomm Incorporated Peer discovery in a wireless wide area network system
US8879438B2 (en) 2011-05-11 2014-11-04 Radisys Corporation Resource efficient acoustic echo cancellation in IP networks
US8886756B2 (en) * 2011-05-13 2014-11-11 Qualcomm Incorporated Exchanging data between a user equipment and an application server
US8396424B2 (en) * 2011-05-26 2013-03-12 Motorola Mobility Llc Method and apparatus for performing role management of short-range wireless connections
US9444903B2 (en) 2011-06-02 2016-09-13 Surfeasy Inc. Proxy based network communications
US9253630B2 (en) 2011-06-02 2016-02-02 Truphone Limited Identity management for mobile devices
US8576756B2 (en) 2011-06-28 2013-11-05 International Business Machines Corporation Continuous cache service in cellular networks
US9603006B2 (en) 2011-09-19 2017-03-21 Truphone Limited Managing mobile device identities
US9019909B2 (en) * 2011-12-06 2015-04-28 Nokia Corporation Method, apparatus, and computer program product for coexistence management
WO2013110254A1 (en) * 2011-12-23 2013-08-01 Appbyyou Gmbh Method for setting up a star-shaped communication network consisting of a central node and peripheral nodes via a web application provided by the central node on the basis of hardware identifiers
US8737225B2 (en) * 2012-02-17 2014-05-27 City University Of Hong Kong Mobile internet service system for long distance trains
EP2823642A1 (en) * 2012-03-09 2015-01-14 Thomson Licensing Distributed control of synchronized content
US9020890B2 (en) 2012-03-30 2015-04-28 Commvault Systems, Inc. Smart archiving and data previewing for mobile devices
BR102012011378A2 (en) * 2012-05-14 2013-12-03 Kelpie Br Gestao Empresarial Ltda FLOW MANAGEMENT SYSTEM AND VISUAL AUDIO DATA RECORDING
US9565622B2 (en) * 2012-07-05 2017-02-07 Qualcomm Incorporated Detecting services provided by a wireless node before device discovery and connection establishment
US10742692B2 (en) * 2012-08-09 2020-08-11 Avaya Inc. Snap-in invocation for call reconstruction
US10601880B2 (en) * 2015-07-17 2020-03-24 Avaya Inc. Conference reconstruction in SIP networks
US9208346B2 (en) 2012-09-05 2015-12-08 Telecommunication Systems, Inc. Persona-notitia intellection codifier
US9532224B2 (en) * 2012-11-05 2016-12-27 Electronics And Telecommunications Research Institute Method of device-to-device discovery and apparatus thereof
US9633022B2 (en) 2012-12-28 2017-04-25 Commvault Systems, Inc. Backup and restoration for a deduplicated file system
KR20140088354A (en) * 2013-01-02 2014-07-10 삼성전자주식회사 Connection Control Method For Access Point And Electronic Device Supporting the same
KR101447438B1 (en) * 2013-02-07 2014-10-08 (주)오픈벡스 Communication system using heterogeneous networks
US9807206B2 (en) * 2013-03-07 2017-10-31 Apple Inc. Aggregating physical network interfaces for peer-to-peer connections
US9704314B2 (en) 2014-08-13 2017-07-11 August Home, Inc. BLE/WiFi bridge that detects signal strength of Bluetooth LE devices at an exterior of a dwelling
US10181232B2 (en) 2013-03-15 2019-01-15 August Home, Inc. Wireless access control system and methods for intelligent door lock system
US10443266B2 (en) 2013-03-15 2019-10-15 August Home, Inc. Intelligent door lock system with manual operation and push notification
US9470018B1 (en) 2013-03-15 2016-10-18 August Home, Inc. Intelligent door lock system with friction detection and deformed door mode operation
US11352812B2 (en) 2013-03-15 2022-06-07 August Home, Inc. Door lock system coupled to an image capture device
US9526074B2 (en) 2013-03-15 2016-12-20 Google Technology Holdings LLC Methods and apparatus for determining a transmit antenna gain and a spatial mode of a device
US9916746B2 (en) 2013-03-15 2018-03-13 August Home, Inc. Security system coupled to a door lock system
US10388094B2 (en) 2013-03-15 2019-08-20 August Home Inc. Intelligent door lock system with notification to user regarding battery status
US11072945B2 (en) 2013-03-15 2021-07-27 August Home, Inc. Video recording triggered by a smart lock device
US11441332B2 (en) 2013-03-15 2022-09-13 August Home, Inc. Mesh of cameras communicating with each other to follow a delivery agent within a dwelling
US10691953B2 (en) 2013-03-15 2020-06-23 August Home, Inc. Door lock system with one or more virtual fences
US11043055B2 (en) 2013-03-15 2021-06-22 August Home, Inc. Door lock system with contact sensor
US10140828B2 (en) 2015-06-04 2018-11-27 August Home, Inc. Intelligent door lock system with camera and motion detector
US11527121B2 (en) 2013-03-15 2022-12-13 August Home, Inc. Door lock system with contact sensor
US9706365B2 (en) * 2013-03-15 2017-07-11 August Home, Inc. BLE/WiFi bridge that detects signal strength of bluetooth LE devices at an interior of a dwelling
US11802422B2 (en) 2013-03-15 2023-10-31 August Home, Inc. Video recording triggered by a smart lock device
US11421445B2 (en) 2013-03-15 2022-08-23 August Home, Inc. Smart lock device with near field communication
WO2014204459A1 (en) 2013-06-20 2014-12-24 Thomson Licensing System and method to assist synchronization of distributed play out of control
CN105580339B (en) 2013-07-25 2019-04-09 康维达无线有限责任公司 Method and apparatus for end-to-end M2M service layer conversation
CN104823485B (en) * 2013-08-07 2019-07-19 华为技术有限公司 Communication means, base station and user equipment under a kind of dual link
US9351203B2 (en) 2013-09-13 2016-05-24 Microsoft Technology Licensing, Llc Voice call continuity in hybrid networks
US9241292B2 (en) * 2013-09-25 2016-01-19 Google Inc. Seamless application connectivity
US20150120929A1 (en) * 2013-10-30 2015-04-30 Sheng-Chun Lin Method for practicing reciprocity of resources
CN103781158A (en) * 2013-11-30 2014-05-07 北京智谷睿拓技术服务有限公司 Wireless network access method and access apparatus
JP2015108970A (en) * 2013-12-04 2015-06-11 ソニー株式会社 Server device and information processing method
US9935787B2 (en) 2013-12-26 2018-04-03 Microsoft Technology Licensing, Llc Tunneling VoIP call control on cellular networks
US9510251B2 (en) 2013-12-31 2016-11-29 Microsoft Technology Licensing, Llc Call handoff initiation in hybrid networks
KR102184488B1 (en) * 2014-01-09 2020-11-30 삼성전자주식회사 Mobile Device and Driving Method Thereof, and Image Display Apparatus and Driving Method Thereof
US10324897B2 (en) 2014-01-27 2019-06-18 Commvault Systems, Inc. Techniques for serving archived electronic mail
US11076301B1 (en) * 2014-02-13 2021-07-27 Marvell Asia Pte, Ltd. Multi-mode network access device
US9560185B2 (en) 2014-03-19 2017-01-31 Microsoft Technology Licensing, Llc Hybrid telecommunications network connection indicator
US9363711B2 (en) 2014-04-07 2016-06-07 Microsoft Technology Licensing, Llc User experiences during call handovers on a hybrid telecommunications network
US9391839B2 (en) * 2014-06-11 2016-07-12 Amplisine Labs, LLC Ad hoc wireless mesh network
US9456333B2 (en) 2014-07-09 2016-09-27 Microsoft Technology Licensing, Llc Centralized routing in hybrid networks
US10148764B2 (en) * 2014-09-30 2018-12-04 Google Llc Backup wide area network connection for access points and routers
US9713018B2 (en) * 2014-10-24 2017-07-18 Qualcomm Incorporated LTE cell search and bluetooth eSCO coexistence using shared antenna
US10033483B2 (en) * 2015-05-18 2018-07-24 Microsoft Technology Licensing, Llc Adjustable interleaving for communication data
US10324914B2 (en) 2015-05-20 2019-06-18 Commvalut Systems, Inc. Handling user queries against production and archive storage systems, such as for enterprise customers having large and/or numerous files
US9756455B2 (en) * 2015-05-28 2017-09-05 Sony Corporation Terminal and method for audio data transmission
US9838108B2 (en) 2015-06-18 2017-12-05 International Business Machines Corporation IP based real-time communications over a mobile network
US9615200B2 (en) 2015-06-18 2017-04-04 International Business Machines Corporation Distributed cellular client tracking
US9648663B2 (en) 2015-06-18 2017-05-09 International Business Machines Corporation Distributed cellular client network
CN105072670B (en) * 2015-08-03 2020-07-10 惠州Tcl移动通信有限公司 WiFi hotspot sharing method and electronic equipment
US10291959B2 (en) 2015-09-25 2019-05-14 Contec, Llc Set top boxes under test
US10122611B2 (en) 2015-09-25 2018-11-06 Contec, Llc Universal device testing interface
US20170126536A1 (en) 2015-10-30 2017-05-04 Contec, Llc Hardware Architecture for Universal Testing System: Cable Modem Test
US9810735B2 (en) 2015-09-25 2017-11-07 Contec, Llc Core testing machine
US10277497B2 (en) 2015-09-25 2019-04-30 Contec, Llc Systems and methods for testing electronic devices using master-slave test architectures
US10320651B2 (en) 2015-10-30 2019-06-11 Contec, Llc Hardware architecture for universal testing system: wireless router test
US9992084B2 (en) 2015-11-20 2018-06-05 Contec, Llc Cable modems/eMTAs under test
US9960989B2 (en) 2015-09-25 2018-05-01 Contec, Llc Universal device testing system
US9838295B2 (en) 2015-11-23 2017-12-05 Contec, Llc Wireless routers under test
US9900116B2 (en) 2016-01-04 2018-02-20 Contec, Llc Test sequences using universal testing system
US20170118707A1 (en) * 2015-10-21 2017-04-27 Qualcomm Incorporated Techniques for achieving optimal power and mean opinion scores for internet protocol multimedia subsystem-based dual connectivity calling
US9900113B2 (en) 2016-02-29 2018-02-20 Contec, Llc Universal tester hardware
WO2017074872A1 (en) * 2015-10-30 2017-05-04 Contec, Llc Universal testing system architecture
US10320616B2 (en) * 2015-12-15 2019-06-11 Wipro Limited Method and a system for sideband server management
US10817593B1 (en) * 2015-12-29 2020-10-27 Wells Fargo Bank, N.A. User information gathering and distribution system
US9992649B1 (en) * 2016-08-23 2018-06-05 Mbit Wireless, Inc. Mobile broadband management
US10805643B2 (en) * 2016-03-30 2020-10-13 Advanced Micro Devices, Inc. Adaptive error-controlled dynamic voltage and frequency scaling for low power video codecs
US10462456B2 (en) 2016-04-14 2019-10-29 Contec, Llc Automated network-based test system for set top box devices
US10779056B2 (en) 2016-04-14 2020-09-15 Contec, Llc Automated network-based test system for set top box devices
SE1650680A1 (en) * 2016-05-19 2017-11-20 Icomera Ab Wireless communication system
CN114727424A (en) 2016-06-15 2022-07-08 康维达无线有限责任公司 Unlicensed uplink transmission for new radio
WO2018009828A1 (en) 2016-07-08 2018-01-11 Vid Scale, Inc. Systems and methods for region-of-interest tone remapping
JP6780357B2 (en) * 2016-08-08 2020-11-04 富士ゼロックス株式会社 Information processing equipment and information processing programs
GB2554671B (en) * 2016-09-30 2019-02-20 British Telecomm WLAN Extender placement
WO2018097947A2 (en) 2016-11-03 2018-05-31 Convida Wireless, Llc Reference signals and control channels in nr
US10284456B2 (en) 2016-11-10 2019-05-07 Contec, Llc Systems and methods for testing electronic devices using master-slave test architectures
CN106507282B (en) * 2016-11-14 2021-06-29 北京小米移动软件有限公司 Wireless connection control method and device
JP6915262B2 (en) * 2016-11-25 2021-08-04 セイコーエプソン株式会社 Wearable devices, information terminal devices, communication systems, electronic devices, and communication control methods
GB201620317D0 (en) * 2016-11-30 2017-01-11 Microsoft Technology Licensing Llc Audio signal processing
WO2018152437A1 (en) 2017-02-17 2018-08-23 Vid Scale, Inc. Systems and methods for selective object-of-interest zooming in streaming video
US10536853B2 (en) 2017-03-03 2020-01-14 Texas Instruments Incorporated Secure network authentication at a gateway for non-internet protocol enabled devices
US11122480B2 (en) * 2017-06-02 2021-09-14 Qualcomm Incorporated Multimedia session continuity and domain selection based on user equipment learning and history
US10772052B2 (en) * 2017-06-16 2020-09-08 Qualcomm Incorporated Controlling coexistent radio systems in a wireless device
US10938451B2 (en) * 2017-11-03 2021-03-02 Dell Products, Lp Method and apparatus for operating an antenna co-existence controller
TWI667894B (en) * 2018-03-26 2019-08-01 亞旭電腦股份有限公司 Message transmission apparatus and method thereof
JP2022503848A (en) 2018-09-27 2022-01-12 コンヴィーダ ワイヤレス, エルエルシー Subband operation in the new radio unlicensed spectrum
EP3672292B1 (en) 2018-12-20 2022-10-26 GN Audio A/S Audio communication method and system with a dongle
US11140651B2 (en) * 2018-12-31 2021-10-05 The Regents Of The University Of California Location determination of wireless communications devices
CN109462875B (en) * 2019-01-16 2020-10-27 展讯通信(上海)有限公司 Wireless roaming method, access point device and mobile station
US11792454B2 (en) * 2019-04-01 2023-10-17 World Multicast, Inc. Method using adaptive-bit-rate playlists for dynamic server capacity and broadband handovers
CN110809242B (en) * 2019-10-30 2021-07-30 厦门亿联网络技术股份有限公司 Media interaction method under DECT network cluster
US10997600B1 (en) 2019-12-16 2021-05-04 Microsoft Technology Licensing, Llc Data transaction scheduling using crowd-sourced network data
JP2023510231A (en) 2020-01-02 2023-03-13 ラヴィ,ガブリエル Method and system for supporting communication of multiple client communication devices in a wireless local area network
US11165605B2 (en) 2020-03-09 2021-11-02 International Business Machines Corporation Personalized private roaming service set identifiers
US11330468B2 (en) * 2020-03-27 2022-05-10 Qualcomm Incorporated Low power techniques for bluetooth low energy in scanning state
WO2023200638A2 (en) 2022-04-13 2023-10-19 James Tagg Blockchain-based dynamic cellular network with proof-of-service

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5966657A (en) * 1997-07-24 1999-10-12 Telefonaktiebolaget L M Ericsson (Publ) Method and system for radio frequency measurement and automatic frequency planning in a cellular radio system
US6243581B1 (en) * 1998-12-11 2001-06-05 Nortel Networks Limited Method and system for seamless roaming between wireless communication networks with a mobile terminal
US20020114318A1 (en) * 2001-02-17 2002-08-22 Rines Clark C. Voice over internet protocol
US6512918B1 (en) * 1999-08-19 2003-01-28 Telefonaktiebolaget Lm Ericsson (Publ) Methods and arrangements for transcoder selection and transcoding data within packet-switched communication networks supporting radio interfaces
US6522884B2 (en) * 2000-02-23 2003-02-18 Nexterna, Inc. System and method for dynamically routing messages transmitted from mobile platforms
US20030120826A1 (en) * 2001-12-20 2003-06-26 Amir Shay System and method for building a communication platform for the telematics domain using a distribution of network objects
US20030224795A1 (en) * 2000-12-14 2003-12-04 Bridgeport Networks, Inc. Circuit switched cellular network to internet calling with internet antennas
US6732176B1 (en) * 1999-11-03 2004-05-04 Wayport, Inc. Distributed network communication system which enables multiple network providers to use a common distributed network infrastructure
US20040132452A1 (en) * 2002-12-30 2004-07-08 Dong-Hee Lee Apparatus and method for establishing a session in a radio network organized with mobile nodes
US20050045025A1 (en) * 2003-08-25 2005-03-03 Wells Robert V. Video game system and method
US20050239441A1 (en) * 2004-04-26 2005-10-27 Pasi Eronen Subscriber authentication for unlicensed mobile access signaling
US20070270145A1 (en) * 2003-05-09 2007-11-22 Koninklijke Philips Electronics N.V. Systems and Methods for Seamlessly Roaming Between a Wireless Wide Area Network and a Wireless Local Area Network

Family Cites Families (105)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US691302A (en) * 1901-09-16 1902-01-14 Turner Tanning Machinery Co Leather-working machine.
US5008953A (en) * 1989-06-26 1991-04-16 Telefonaktiebolaget L M Ericsson Mobile station link supervision utilizing digital voice color codes
US6850252B1 (en) * 1999-10-05 2005-02-01 Steven M. Hoffberg Intelligent electronic appliance system and method
FI100075B (en) * 1994-11-11 1997-09-15 Ericsson Telefon Ab L M A system for managing subscriber information in a telephone network
US6112085A (en) * 1995-11-30 2000-08-29 Amsc Subsidiary Corporation Virtual network configuration and management system for satellite communication system
US5842125A (en) * 1995-11-30 1998-11-24 Amsc Subsidiary Corporation Network control center for satellite communication system
US6055575A (en) * 1997-01-28 2000-04-25 Ascend Communications, Inc. Virtual private network system and method
US6091951A (en) * 1997-05-14 2000-07-18 Telxon Corporation Seamless roaming among multiple networks
FI104667B (en) * 1997-07-14 2000-04-14 Nokia Networks Oy Implementation of access service
US6904110B2 (en) * 1997-07-31 2005-06-07 Francois Trans Channel equalization system and method
US6144667A (en) * 1997-08-07 2000-11-07 At&T Corp. Network-based method and apparatus for initiating and completing a telephone call via the internet
US6393015B1 (en) * 1997-09-12 2002-05-21 Genesys Telecommunications Laboratories, Inc. Method and apparatus for automatic network connection between a small business and a client
US6608832B2 (en) * 1997-09-25 2003-08-19 Telefonaktiebolaget Lm Ericsson Common access between a mobile communications network and an external network with selectable packet-switched and circuit-switched and circuit-switched services
USH1837H (en) * 1997-09-26 2000-02-01 Fletcher; Anthony G. Generic telecommunications system and associated call processing architecture
US6377982B1 (en) * 1997-10-14 2002-04-23 Lucent Technologies Inc. Accounting system in a network
GB2334651A (en) * 1998-02-18 1999-08-25 Power X Limited Scheduling means for data switching apparatus
US6005575A (en) * 1998-03-23 1999-12-21 Microsoft Corporation Foreground window determination through process and thread initialization
US6154465A (en) * 1998-10-06 2000-11-28 Vertical Networks, Inc. Systems and methods for multiple mode voice and data communications using intelligenty bridged TDM and packet buses and methods for performing telephony and data functions using the same
US6434619B1 (en) * 1998-04-29 2002-08-13 Alcatel Canada Inc. Internet-enabled service management system and method
US7025209B2 (en) * 1998-05-29 2006-04-11 Palmsource, Inc. Method and apparatus for wireless internet access
EP0986285A2 (en) * 1998-09-10 2000-03-15 Alcatel System and method for implementing a backup line in a telecommunication network
US6487600B1 (en) * 1998-09-12 2002-11-26 Thomas W. Lynch System and method for supporting multimedia communications upon a dynamically configured member network
EP1133878A1 (en) * 1998-09-15 2001-09-19 In Touch Technologies Limited Communication services
US6289462B1 (en) * 1998-09-28 2001-09-11 Argus Systems Group, Inc. Trusted compartmentalized computer operating system
US6128304A (en) * 1998-10-23 2000-10-03 Gte Laboratories Incorporated Network presence for a communications system operating over a computer network
US6446127B1 (en) * 1998-10-30 2002-09-03 3Com Corporation System and method for providing user mobility services on a telephony network
US6651105B1 (en) * 1998-11-12 2003-11-18 International Business Machines Corporation Method for seamless networking support for mobile devices using serial communications
US6496505B2 (en) * 1998-12-11 2002-12-17 Lucent Technologies Inc. Packet tunneling optimization to wireless devices accessing packet-based wired networks
US6791970B1 (en) * 1999-02-11 2004-09-14 Mediaring Ltd. PC-to-phone for least cost routing with user preferences
US6856612B1 (en) * 1999-02-24 2005-02-15 Telefonaktiebolaget Lm Ericsson (Publ) Methods and systems for call routing and codec negotiation in hybrid voice/data/internet/wireless systems
US6405104B1 (en) * 1999-03-24 2002-06-11 General Electric Corporation Fault data synchronization via peer-to-peer communications network
JP3668047B2 (en) * 1999-05-20 2005-07-06 株式会社東芝 Mobile communication method, mobile computer device and encrypted communication device
ATE301895T1 (en) * 1999-06-10 2005-08-15 Alcatel Internetworking Inc SYSTEM AND METHOD FOR AUTOMATIC REACHABILITY UPDATE IN VIRTUAL PRIVATE NETWORKS
US7882247B2 (en) * 1999-06-11 2011-02-01 Netmotion Wireless, Inc. Method and apparatus for providing secure connectivity in mobile and other intermittent computing environments
EP1069500A1 (en) * 1999-07-12 2001-01-17 International Business Machines Corporation Downloadable user-interface
US6587557B1 (en) * 1999-09-07 2003-07-01 Concerto Software, Inc. System and method of distributing outbound telephony services over a computer network
US7457279B1 (en) * 1999-09-10 2008-11-25 Vertical Communications Acquisition Corp. Method, system, and computer program product for managing routing servers and services
US7123608B1 (en) * 1999-09-10 2006-10-17 Array Telecom Corporation Method, system, and computer program product for managing database servers and service
US7904569B1 (en) * 1999-10-06 2011-03-08 Gelvin David C Method for remote access of vehicle components
US6693878B1 (en) * 1999-10-15 2004-02-17 Cisco Technology, Inc. Technique and apparatus for using node ID as virtual private network (VPN) identifiers
US6775657B1 (en) * 1999-12-22 2004-08-10 Cisco Technology, Inc. Multilayered intrusion detection system and method
US6889321B1 (en) * 1999-12-30 2005-05-03 At&T Corp. Protected IP telephony calls using encryption
US20010033554A1 (en) * 2000-02-18 2001-10-25 Arun Ayyagari Proxy-bridge connecting remote users to a limited connectivity network
US6522880B1 (en) * 2000-02-28 2003-02-18 3Com Corporation Method and apparatus for handoff of a connection between network devices
IL151455A0 (en) * 2000-03-03 2003-04-10 Sanctum Ltd System for determining web application vulnerabilities
US7173923B2 (en) * 2000-03-17 2007-02-06 Symbol Technologies, Inc. Security in multiple wireless local area networks
US7814208B2 (en) * 2000-04-11 2010-10-12 Science Applications International Corporation System and method for projecting content beyond firewalls
US6680923B1 (en) * 2000-05-23 2004-01-20 Calypso Wireless, Inc. Communication system and method
US6691302B1 (en) * 2000-05-31 2004-02-10 Siemens Information & Communications Networks, Inc. Interfacing a service component to a native API
AU2001263472A1 (en) * 2000-06-28 2002-01-08 Broadcom Corporation Multi-mode controller
US7103661B2 (en) * 2000-07-12 2006-09-05 John Raymond Klein Auto configuration of portable computers for use in wireless local area networks
US7340048B2 (en) * 2000-07-14 2008-03-04 Context Connect Llc System and method for directory services and e-commerce across multi-provider networks
US6452910B1 (en) * 2000-07-20 2002-09-17 Cadence Design Systems, Inc. Bridging apparatus for interconnecting a wireless PAN and a wireless LAN
WO2002009458A2 (en) * 2000-07-24 2002-01-31 Bluesocket, Inc. Method and system for enabling seamless roaming in a wireless network
US6633761B1 (en) * 2000-08-11 2003-10-14 Reefedge, Inc. Enabling seamless user mobility in a short-range wireless networking environment
US6497412B1 (en) * 2000-09-08 2002-12-24 Peter J. Bramm Method and apparatus for playing a quiz game
US6938087B1 (en) * 2000-09-12 2005-08-30 Hewlett-Packard Development Company, L.P. Distributed universal communication module for facilitating delivery of network services to one or more devices communicating over multiple transport facilities
US6757262B1 (en) * 2000-09-15 2004-06-29 Motorola, Inc. Service framework supporting remote service discovery and connection
US6915345B1 (en) * 2000-10-02 2005-07-05 Nortel Networks Limited AAA broker specification and protocol
JP2002118691A (en) * 2000-10-11 2002-04-19 Nec Corp Internet telephone system and internet telephone connection method
US6542740B1 (en) * 2000-10-24 2003-04-01 Litepoint, Corp. System, method and article of manufacture for utilizing a wireless link in an interface roaming network framework
US7093017B1 (en) * 2000-10-24 2006-08-15 Litepoint, Corp. System, method and article of manufacture for facilitating user interface roaming in an interface roaming network framework
US6965914B2 (en) * 2000-10-27 2005-11-15 Eric Morgan Dowling Negotiated wireless peripheral systems
US8996698B1 (en) * 2000-11-03 2015-03-31 Truphone Limited Cooperative network for mobile internet access
US20020101848A1 (en) * 2000-12-05 2002-08-01 Ivan Lee Systems and methods for on-location, wireless access of web content
EP1344353B1 (en) * 2000-12-22 2014-11-19 BlackBerry Limited Wireless router system and method
US20020131386A1 (en) * 2001-01-26 2002-09-19 Docomo Communications Laboratories Usa, Inc. Mobility prediction in wireless, mobile access digital networks
US6996076B1 (en) * 2001-03-29 2006-02-07 Sonus Networks, Inc. System and method to internetwork wireless telecommunication networks
US6826154B2 (en) * 2001-05-24 2004-11-30 3Com Corporation Method and apparatus for seamless mobility between different access technologies
US20020184299A1 (en) * 2001-06-02 2002-12-05 Kae-Jy Chou Method for enlarging communication range of bluetooth data
US6973058B2 (en) * 2001-07-31 2005-12-06 Broadcom Corporation System and method for accessing a multi-line gateway using cordless telephony terminals
US7292587B2 (en) * 2001-09-27 2007-11-06 Intel Corporation Method and apparatus for enabling connectivity between arbitrary networks using a mobile device
US20030134650A1 (en) * 2002-01-17 2003-07-17 Rangamani Sundar Method, system and apparatus for internetworking a mobile station to operate in a WWAN environment and in a WLAN environment with PBX services
FI116017B (en) * 2002-01-22 2005-08-31 Netseal Mobility Technologies Procedure for sending messages over secure mobile communication links
JP4310193B2 (en) * 2002-01-29 2009-08-05 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ Method and system for connecting a mobile client device to the Internet
US7278157B2 (en) * 2002-03-14 2007-10-02 International Business Machines Corporation Efficient transmission of IP data using multichannel SOCKS server proxy
CN100388816C (en) * 2002-06-06 2008-05-14 汤姆森特许公司 Wlan as a logical support node for hybrid coupling in an interworking between wlan and a mobile communications system
US7574174B2 (en) * 2002-07-10 2009-08-11 Nokia Corporation Apparatus, method and system for a remote-page device
US20040054905A1 (en) * 2002-09-04 2004-03-18 Reader Scot A. Local private authentication for semi-public LAN
JP3831695B2 (en) * 2002-09-11 2006-10-11 株式会社コナミデジタルエンタテインメント GAME SYSTEM AND SERVER DEVICE
US8077681B2 (en) * 2002-10-08 2011-12-13 Nokia Corporation Method and system for establishing a connection via an access network
US7499401B2 (en) * 2002-10-21 2009-03-03 Alcatel-Lucent Usa Inc. Integrated web cache
JP4270888B2 (en) * 2003-01-14 2009-06-03 パナソニック株式会社 Service and address management method in WLAN interconnection
GB2399714B (en) * 2003-03-18 2006-08-30 Inventec Appliances Corp Mobile server for internetworking wpan,wlan,and wwan
US7333799B2 (en) * 2003-08-29 2008-02-19 Microsoft Corporation WAP XML extension to define VPN connections
US7415525B2 (en) * 2003-09-29 2008-08-19 Nokia Corporation USB application adopting bluetooth profile with a sharing implementation
TWI236255B (en) * 2003-12-15 2005-07-11 Ind Tech Res Inst System and method for supporting inter-NAT-domain handoff within a VPN by associating L2TP with mobile IP
EP1551144A1 (en) * 2003-12-31 2005-07-06 France Telecom System, method and apparatus for providing multimedia communications services
CN1271823C (en) * 2004-01-07 2006-08-23 华为技术有限公司 Business tunnel unpack method for wireless LAN
CN1330214C (en) * 2004-02-02 2007-08-01 华为技术有限公司 Interactive method for re-selecting operating network to wireless local network
US8768322B2 (en) * 2004-02-13 2014-07-01 Sprint Spectrum L.P. Method and system for triggering events in a radio network
US8209400B2 (en) * 2005-03-16 2012-06-26 Icontrol Networks, Inc. System for data routing in networks
USRE48758E1 (en) * 2004-06-24 2021-09-28 Intellectual Ventures I Llc Transfer of packet data in system comprising mobile terminal, wireless local network and mobile network
US7570636B2 (en) * 2004-06-29 2009-08-04 Damaka, Inc. System and method for traversing a NAT device for peer-to-peer hybrid communications
US7778187B2 (en) * 2004-06-29 2010-08-17 Damaka, Inc. System and method for dynamic stability in a peer-to-peer hybrid communications network
JP2008507217A (en) * 2004-07-16 2008-03-06 ブリッジポート ネットワークス, インコーポレイテッド Presence detection and handoff for cellular and Internet protocol telephony
US7684374B2 (en) * 2004-07-28 2010-03-23 Broadcom Corporation Handling of multimedia call sessions and attachments using multi-network simulcasting
US7912504B2 (en) * 2004-12-30 2011-03-22 Telepo Ab Alternative routing
US8819178B2 (en) * 2005-03-16 2014-08-26 Icontrol Networks, Inc. Controlling data routing in integrated security systems
US8713132B2 (en) * 2005-03-16 2014-04-29 Icontrol Networks, Inc. Device for data routing in networks
US9059863B2 (en) * 2005-03-16 2015-06-16 Icontrol Networks, Inc. Method for data routing in networks
US8825871B2 (en) * 2005-03-16 2014-09-02 Icontrol Networks, Inc. Controlling data routing among networks
US8477731B2 (en) * 2005-07-25 2013-07-02 Qualcomm Incorporated Method and apparatus for locating a wireless local area network in a wide area network
US8169982B2 (en) * 2005-08-10 2012-05-01 Qualcomm Incorporated Method and apparatus for creating a fingerprint for a wireless network
US8929329B2 (en) * 2007-12-19 2015-01-06 Verizon Patent And Licensing Inc. System and method for dual-mode handoff

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5966657A (en) * 1997-07-24 1999-10-12 Telefonaktiebolaget L M Ericsson (Publ) Method and system for radio frequency measurement and automatic frequency planning in a cellular radio system
US6243581B1 (en) * 1998-12-11 2001-06-05 Nortel Networks Limited Method and system for seamless roaming between wireless communication networks with a mobile terminal
US6512918B1 (en) * 1999-08-19 2003-01-28 Telefonaktiebolaget Lm Ericsson (Publ) Methods and arrangements for transcoder selection and transcoding data within packet-switched communication networks supporting radio interfaces
US6732176B1 (en) * 1999-11-03 2004-05-04 Wayport, Inc. Distributed network communication system which enables multiple network providers to use a common distributed network infrastructure
US6522884B2 (en) * 2000-02-23 2003-02-18 Nexterna, Inc. System and method for dynamically routing messages transmitted from mobile platforms
US20030224795A1 (en) * 2000-12-14 2003-12-04 Bridgeport Networks, Inc. Circuit switched cellular network to internet calling with internet antennas
US20020114318A1 (en) * 2001-02-17 2002-08-22 Rines Clark C. Voice over internet protocol
US20030120826A1 (en) * 2001-12-20 2003-06-26 Amir Shay System and method for building a communication platform for the telematics domain using a distribution of network objects
US20040132452A1 (en) * 2002-12-30 2004-07-08 Dong-Hee Lee Apparatus and method for establishing a session in a radio network organized with mobile nodes
US20070270145A1 (en) * 2003-05-09 2007-11-22 Koninklijke Philips Electronics N.V. Systems and Methods for Seamlessly Roaming Between a Wireless Wide Area Network and a Wireless Local Area Network
US20050045025A1 (en) * 2003-08-25 2005-03-03 Wells Robert V. Video game system and method
US20050239441A1 (en) * 2004-04-26 2005-10-27 Pasi Eronen Subscriber authentication for unlicensed mobile access signaling

Cited By (75)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11656667B2 (en) 2004-03-16 2023-05-23 Icontrol Networks, Inc. Integrated security system with parallel processing architecture
US11757834B2 (en) 2004-03-16 2023-09-12 Icontrol Networks, Inc. Communication protocols in integrated systems
US11893874B2 (en) 2004-03-16 2024-02-06 Icontrol Networks, Inc. Networked touchscreen with integrated interfaces
US11588787B2 (en) 2004-03-16 2023-02-21 Icontrol Networks, Inc. Premises management configuration and control
US11811845B2 (en) 2004-03-16 2023-11-07 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US11810445B2 (en) 2004-03-16 2023-11-07 Icontrol Networks, Inc. Cross-client sensor user interface in an integrated security network
US11601397B2 (en) 2004-03-16 2023-03-07 Icontrol Networks, Inc. Premises management configuration and control
US11368429B2 (en) 2004-03-16 2022-06-21 Icontrol Networks, Inc. Premises management configuration and control
US11782394B2 (en) 2004-03-16 2023-10-10 Icontrol Networks, Inc. Automation system with mobile interface
US11626006B2 (en) 2004-03-16 2023-04-11 Icontrol Networks, Inc. Management of a security system at a premises
US11537186B2 (en) 2004-03-16 2022-12-27 Icontrol Networks, Inc. Integrated security system with parallel processing architecture
US11489812B2 (en) 2004-03-16 2022-11-01 Icontrol Networks, Inc. Forming a security network including integrated security system components and network devices
US11677577B2 (en) 2004-03-16 2023-06-13 Icontrol Networks, Inc. Premises system management using status signal
US11378922B2 (en) 2004-03-16 2022-07-05 Icontrol Networks, Inc. Automation system with mobile interface
US11449012B2 (en) 2004-03-16 2022-09-20 Icontrol Networks, Inc. Premises management networking
US11410531B2 (en) 2004-03-16 2022-08-09 Icontrol Networks, Inc. Automation system user interface with three-dimensional display
US11625008B2 (en) 2004-03-16 2023-04-11 Icontrol Networks, Inc. Premises management networking
US11916870B2 (en) 2004-03-16 2024-02-27 Icontrol Networks, Inc. Gateway registry methods and systems
US11343380B2 (en) 2004-03-16 2022-05-24 Icontrol Networks, Inc. Premises system automation
US11792330B2 (en) 2005-03-16 2023-10-17 Icontrol Networks, Inc. Communication and automation in a premises management system
US11496568B2 (en) 2005-03-16 2022-11-08 Icontrol Networks, Inc. Security system with networked touchscreen
US11595364B2 (en) 2005-03-16 2023-02-28 Icontrol Networks, Inc. System for data routing in networks
US11367340B2 (en) 2005-03-16 2022-06-21 Icontrol Networks, Inc. Premise management systems and methods
US11824675B2 (en) 2005-03-16 2023-11-21 Icontrol Networks, Inc. Networked touchscreen with integrated interfaces
US11700142B2 (en) 2005-03-16 2023-07-11 Icontrol Networks, Inc. Security network integrating security system and network devices
US11615697B2 (en) 2005-03-16 2023-03-28 Icontrol Networks, Inc. Premise management systems and methods
US11424980B2 (en) * 2005-03-16 2022-08-23 Icontrol Networks, Inc. Forming a security network including integrated security system components
US11418518B2 (en) 2006-06-12 2022-08-16 Icontrol Networks, Inc. Activation of gateway device
US11418572B2 (en) 2007-01-24 2022-08-16 Icontrol Networks, Inc. Methods and systems for improved system performance
US11706279B2 (en) 2007-01-24 2023-07-18 Icontrol Networks, Inc. Methods and systems for data communication
US11412027B2 (en) 2007-01-24 2022-08-09 Icontrol Networks, Inc. Methods and systems for data communication
US11809174B2 (en) 2007-02-28 2023-11-07 Icontrol Networks, Inc. Method and system for managing communication connectivity
US11663902B2 (en) 2007-04-23 2023-05-30 Icontrol Networks, Inc. Method and system for providing alternate network access
US11601810B2 (en) 2007-06-12 2023-03-07 Icontrol Networks, Inc. Communication protocols in integrated systems
US11646907B2 (en) 2007-06-12 2023-05-09 Icontrol Networks, Inc. Communication protocols in integrated systems
US11894986B2 (en) 2007-06-12 2024-02-06 Icontrol Networks, Inc. Communication protocols in integrated systems
US11611568B2 (en) 2007-06-12 2023-03-21 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US11423756B2 (en) 2007-06-12 2022-08-23 Icontrol Networks, Inc. Communication protocols in integrated systems
US11722896B2 (en) 2007-06-12 2023-08-08 Icontrol Networks, Inc. Communication protocols in integrated systems
US11632308B2 (en) 2007-06-12 2023-04-18 Icontrol Networks, Inc. Communication protocols in integrated systems
US11582065B2 (en) 2007-06-12 2023-02-14 Icontrol Networks, Inc. Systems and methods for device communication
US11815969B2 (en) 2007-08-10 2023-11-14 Icontrol Networks, Inc. Integrated security system with parallel processing architecture
US11831462B2 (en) 2007-08-24 2023-11-28 Icontrol Networks, Inc. Controlling data routing in premises management systems
US11916928B2 (en) 2008-01-24 2024-02-27 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US11816323B2 (en) 2008-06-25 2023-11-14 Icontrol Networks, Inc. Automation system user interface
US11641391B2 (en) 2008-08-11 2023-05-02 Icontrol Networks Inc. Integrated cloud system with lightweight gateway for premises automation
US11711234B2 (en) 2008-08-11 2023-07-25 Icontrol Networks, Inc. Integrated cloud system for premises automation
US11792036B2 (en) 2008-08-11 2023-10-17 Icontrol Networks, Inc. Mobile premises automation platform
US11368327B2 (en) 2008-08-11 2022-06-21 Icontrol Networks, Inc. Integrated cloud system for premises automation
US11616659B2 (en) 2008-08-11 2023-03-28 Icontrol Networks, Inc. Integrated cloud system for premises automation
US11758026B2 (en) 2008-08-11 2023-09-12 Icontrol Networks, Inc. Virtual device systems and methods
US11729255B2 (en) 2008-08-11 2023-08-15 Icontrol Networks, Inc. Integrated cloud system with lightweight gateway for premises automation
US11601865B2 (en) 2009-04-30 2023-03-07 Icontrol Networks, Inc. Server-based notification of alarm event subsequent to communication failure with armed security system
US11553399B2 (en) 2009-04-30 2023-01-10 Icontrol Networks, Inc. Custom content for premises management
US11856502B2 (en) 2009-04-30 2023-12-26 Icontrol Networks, Inc. Method, system and apparatus for automated inventory reporting of security, monitoring and automation hardware and software at customer premises
US11778534B2 (en) 2009-04-30 2023-10-03 Icontrol Networks, Inc. Hardware configurable security, monitoring and automation controller having modular communication protocol interfaces
US11665617B2 (en) 2009-04-30 2023-05-30 Icontrol Networks, Inc. Server-based notification of alarm event subsequent to communication failure with armed security system
US11398147B2 (en) 2010-09-28 2022-07-26 Icontrol Networks, Inc. Method, system and apparatus for automated reporting of account and sensor zone information to a central station
US11900790B2 (en) 2010-09-28 2024-02-13 Icontrol Networks, Inc. Method, system and apparatus for automated reporting of account and sensor zone information to a central station
US11341840B2 (en) 2010-12-17 2022-05-24 Icontrol Networks, Inc. Method and system for processing security event data
US20140192681A1 (en) * 2013-01-09 2014-07-10 Samsung Electronics Co., Ltd. Apparatus and method for providing integrated device information
US9699638B2 (en) * 2013-01-09 2017-07-04 Samsung Electronics Co., Ltd Apparatus and method for providing integrated device information
US11943301B2 (en) 2014-03-03 2024-03-26 Icontrol Networks, Inc. Media content management
US11405463B2 (en) 2014-03-03 2022-08-02 Icontrol Networks, Inc. Media content management
US20150381698A1 (en) * 2015-05-08 2015-12-31 Bandwidth.Com, Inc. Bonding of Multiple Concurrent Data Streams Among Multiple Devices
US9413804B2 (en) * 2015-05-08 2016-08-09 Bandwidth.Com, Inc. Bonding of multiple concurrent data streams among multiple devices
US10165612B2 (en) * 2016-06-16 2018-12-25 I/O Interconnected, Ltd. Wireless connecting method, computer, and non-transitory computer-readable storage medium
US10154033B2 (en) * 2016-06-16 2018-12-11 Ambit Microsystems (Shanghai) Ltd. Electronic device and method for establishing wireless connection
US20170366923A1 (en) * 2016-06-16 2017-12-21 I/O Interconnect, Ltd. Method for making a host personal computer act as an accessory in bluetooth piconet
US9906893B2 (en) * 2016-06-16 2018-02-27 I/O Interconnect, Ltd. Method for making a host personal computer act as an accessory in bluetooth piconet
US10650621B1 (en) 2016-09-13 2020-05-12 Iocurrents, Inc. Interfacing with a vehicular controller area network
US11232655B2 (en) 2016-09-13 2022-01-25 Iocurrents, Inc. System and method for interfacing with a vehicular controller area network
US20180324048A1 (en) * 2017-05-08 2018-11-08 Sk Planet Co., Ltd. Smart order apparatus, operation method thereof, and terminal
CN109922490A (en) * 2019-01-28 2019-06-21 行目数据科技有限公司 A kind of anti-interruption continuous transmission management system of data
CN111065137A (en) * 2019-12-17 2020-04-24 海信集团有限公司 Method for accessing intelligent equipment to network based on Bluetooth and wireless network

Also Published As

Publication number Publication date
EP1344143A2 (en) 2003-09-17
DK1344143T3 (en) 2013-09-30
US9049042B2 (en) 2015-06-02
ES2426670T3 (en) 2013-10-24
US8996698B1 (en) 2015-03-31
CY1114391T1 (en) 2016-08-31
US20100115103A1 (en) 2010-05-06
US20050286466A1 (en) 2005-12-29
WO2002057869A2 (en) 2002-07-25
US8862736B2 (en) 2014-10-14
AU2002246586A1 (en) 2002-07-30
EP1344143B1 (en) 2013-07-03
EP2288082A1 (en) 2011-02-23
EP1344143A4 (en) 2005-10-12
US8935326B2 (en) 2015-01-13
US20100115104A1 (en) 2010-05-06
PT1344143E (en) 2013-08-26
US20150207885A1 (en) 2015-07-23
WO2002057869A3 (en) 2002-11-07

Similar Documents

Publication Publication Date Title
US9049042B2 (en) System for providing mobile VoIP
EP1652356B1 (en) Mobility in a multi-access communication network
US10206154B2 (en) Mobile device WiFi/cellular seamless roaming, seamless session continuity, always connected switching controller
JP4037646B2 (en) Optimal Internet network connection and roaming system and method for indoor / outdoor users
US7496360B2 (en) Multi-function telephone
JP5193030B2 (en) Multi-mode handset service
US7633909B1 (en) Method and system for providing multiple connections from a common wireless access point
TWI322600B (en) Base station for wireless communications
EP2064905B1 (en) Method for establishing voice communications using a mobile handset
US7319874B2 (en) Dual mode terminal for accessing a cellular network directly or via a wireless intranet
US7277434B2 (en) Method for SIP-mobility and mobile-IP coexistence
US20050025182A1 (en) Systems and methods using multiprotocol communication
JP2008510394A (en) Fixed mobile communication with intermediate session mode switching
US7697956B2 (en) Management of LAN devices behind firewalls via dual mode mobile device
JP2008533761A (en) Communication method and communication system
JP4886022B2 (en) Mobile terminal and wireless device with common IP address
JP2006086936A (en) Radio network system and communication method, communication apparatus, radio terminal, communication control program and terminal control program
AU2003302045B2 (en) Extended handset functionality and mobility
Watson Fixed/mobile convergence and beyond: unbounded mobile communications
Wisely et al. Evolving systems beyond 3G—the IST BRAIN and MIND projects
Zhang End to end architecture and mechanisms for mobile and wireless communications in the Internet

Legal Events

Date Code Title Description
AS Assignment

Owner name: SOFTWARE CELLULAR NETWORK LIMITED, UNITED KINGDOM

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MCEWAN, ANDREW DONALD;XOSIA LIMITED;REEL/FRAME:040414/0646

Effective date: 20060113

Owner name: TRUPHONE LIMITED, UNITED KINGDOM

Free format text: CHANGE OF NAME;ASSIGNOR:SOFTWARE CELLULAR NETWORK LIMITED;REEL/FRAME:040414/0666

Effective date: 20100520

AS Assignment

Owner name: TRUPHONE LIMITED, UNITED KINGDOM

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MCEWAN, ANDREW DONALD;REEL/FRAME:040457/0617

Effective date: 20161129

AS Assignment

Owner name: SOFTWARE CELLULAR NETWORK LIMITED, UNITED KINGDOM

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:TAGG, JAMES;REEL/FRAME:040732/0432

Effective date: 20060116

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION