throbber
I lllll llllllll Ill lllll lllll lllll lllll lllll 111111111111111111111111111111111
`US008102863B 1
`
`c12) United States Patent
`Evans
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 8,102,863 Bl
`Jan.24,2012
`
`(54) HIGH-SPEED WAN TO WIRELESS LAN
`GATEWAY
`
`(75)
`
`Inventor: Gregory Morgan Evans, Raleigh, NC
`(US)
`
`6,665,536 Bl
`6,721,282 B2 *
`6,735,699 Bl
`6,738,493 Bl
`6,751,670 Bl
`
`12/2003 Mahany
`412004 Motley .......................... 370/252
`512004 Sasaki et al.
`512004 Cox et al.
`6/2004 Patterson
`(Continued)
`
`(73) Assignee: Qurio Holdings, Inc., Raleigh, NC (US)
`
`( *) Notice:
`
`Subject to any disclaimer, the term ofthis
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 1125 days.
`
`GB
`
`FOREIGN PATENT DOCUMENTS
`2306869 A
`5/1997
`(Continued)
`
`OTHER PUBLICATIONS
`
`(21) Appl. No.: 11/475,360
`
`(22) Filed:
`
`Jun.27,2006
`
`(51)
`
`Int. Cl.
`(2006.01)
`H04L 1100
`(2006.01)
`H04L 12128
`(2006.01)
`H04L 12156
`(52) U.S. Cl. ..................... 370/401; 370/230.1; 370/235;
`370/412
`( 58) Field of Classification Search . ... ... ... ... .. ... 3 70/230,
`370/230.1, 235, 401, 412
`See application file for complete search history.
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`5,613,004 A
`3/1997 Cooperman et al.
`1111997 Moskowitz et al.
`5,687,236 A
`5,758,257 A
`5/1998 Herz et al.
`8/1998 Payton
`5,790,935 A
`5,905,800 A
`5/1999 Moskowitz et al.
`6,076,108 A
`612000 Courts et al.
`10/2000 Zhao et al.
`6,141,753 A
`6,282,299 Bl
`8/2001 Tewfiket al.
`6,370,584 Bl
`412002 Bestavros et al.
`6,385,641 Bl
`512002 Jiang et al.
`6,389,541 Bl
`512002 Patterson
`6,411,946 Bl
`612002 Chaudhuri
`6,470,332 Bl
`10/2002 Weschler
`6,470,389 Bl
`10/2002 Chung et al.
`
`E. Setton, T. Yoo, X. Zhu, A. Goldsmith, and B. Girod, "Cross-Layer
`Design of Ad Hoc Networks for Real-Time Video Streaming," IEEE
`Wireless Communications, vol. 12, issue 4, pp. 99-102, Aug. 2005.
`
`(Continued)
`
`Primary Examiner - Hassan Phillips
`Assistant Examiner - Lonnie Sweet
`(74) Attorney, Agent, or Firm - Withrow & Terranova,
`PLLC
`
`ABSTRACT
`(57)
`A gateway interconnecting a high speed Wide Area Network
`(WAN) and a lower speed Wireless Local Area Network
`(WLAN) is provided. The high speed WAN is preferably
`connected to the gateway via a Fiber-to-the Home (FTTH)
`connection and associated FTTH modem. In general, the
`gateway includes an adaptable cross-layer offload engine
`operating to manage bandwidth between the high speed WAN
`and the lower speed WLAN. As data enters the gateway from
`the WAN at the high speed data rate of the WAN, the offload
`engine stores the data in a non-secure data cache. A rule check
`engine performs a stateless or stateful inspection of the data in
`the non-secure data cache. Thereafter, the data is moved from
`the non-secure data cache to a secure data cache and thereaf(cid:173)
`ter transmitted to an appropriate user device in the WLAN at
`the lower data rate of the WLAN.
`
`21 Claims, 4 Drawing Sheets
`
`--------------------------------------,
`L.:16
`;~------------ --,
`1 WIRELESS
`\
`LOCAL AREA NETWORK (WLAN)
`:
`I
`I
`I
`I
`I
`I
`I
`I
`I
`
`24
`
`I
`I
`I
`1 CUSTOMER PREMISES
`18~
`I
`I
`I
`I
`I
`I
`I
`I
`FTTH
`I
`NETWORK:
`FIBER
`1
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`~-------------------------------------
`
`, ________________ ;
`
`\
`
`DISH, Exh. 1001, p. 1
`
`

`
`US 8,102,863 Bl
`Page 2
`
`............... 709/203
`
`U.S. PATENT DOCUMENTS
`6,774,926 Bl
`8/2004 Ellis et al.
`6,789,116 Bl
`912004 Sarkissian et al.
`6,791,962 B2
`912004 Wentink
`6,804,779 Bl
`10/2004 Carroni et al.
`6,839,751 Bl
`112005 Dietz et al.
`6,865,605 Bl
`3/2005 Soderberg et al.
`6,871,236 B2
`3/2005 Fislnnan et al.
`6,970,848 B2
`1112005 Osaka et al.
`6,975,743 B2
`12/2005 Venkatesan et al.
`6,987,985 B2
`112006 Purkayastha et al.
`7,002,955 Bl
`212006 Kanuri et al.
`7,003,131 B2
`212006 Watson et al.
`3/2006 Vaidyanathan et al.
`7,016,668 B2
`7,020,304 B2
`3/2006 Alattar et al.
`7,036,024 B2
`412006 Watson
`7,039,562 Bl
`512006 Notani et al.
`7,065,607 B2
`612006 England et al.
`10/2006 de Bonet
`7,130,872 B2
`7,149,807 Bl
`12/2006 Kontothanassis
`7,203,744 Bl
`4/2007 Parekh et al.
`7,263,545 B2
`8/2007 Digate et al.
`7,356,013 B2
`4/2008 Linder et al.
`7,376,790 B2
`5/2008 Lango et al.
`7,409,556 B2
`8/2008 Wu et al.
`7,512,973 Bl
`3/2009 Chan et al.
`7,607,170 B2
`10/2009 Chesla
`7,624,436 B2
`1112009 Balakrishnan et al.
`7,656,849 Bl
`212010 Evans
`7,733,772 B2
`612010 Hazra et al.
`7,733,908 Bl
`612010 Evans
`7,739,658 B2
`6/2010 Watson et al.
`7,801,945 Bl
`912010 Geddes et al.
`200110051996 Al
`12/2001 Cooper et al.
`2002100107 59 Al
`112002 Hitson et al.
`2002/0013812 Al*
`112002 Krueger et al.
`2002/0049580 Al
`412002 Kutaragi et al.
`2002/0054578 Al
`512002 Zhang et al.
`2002/0061029 Al
`512002 Dillon
`200210104003 Al
`8/2002 Iwarnura
`200210104099 Al
`8/2002 Novak
`200210107934 Al
`8/2002 Lowery et al.
`2002/0129367 Al
`912002 Devara
`10/2002 Gutta et al.
`200210144267 Al
`200210156842 Al
`10/2002 Signes et al.
`200210168082 Al
`1112002 Razdan
`2003/0009769 Al
`112003 Hensgen et al.
`2003/0046270 Al
`3/2003 Leung et al.
`2003/0050055 Al
`3/2003 Ting et al.
`2003/0081580 Al
`5/2003 Vaidyanathan et al.
`5/2003 Cooper et al.
`2003/0093665 Al
`2003/0110234 Al
`6/2003 Egli et al.
`2003/0152096 Al*
`8/2003 Chapman ...................... 370/412
`2003/0161268 Al
`8/2003 Larsson et al.
`2003/0217099 Al
`1112003 Bobde et al.
`2004/0006615 Al
`112004 Jackson
`2004/0008864 Al
`112004 Watson et al.
`2004/00097 51 Al
`112004 Michaelis et al.
`200410010692 Al
`112004 Watson
`200410010694 Al
`112004 Collens et al.
`2004/0030798 Al
`212004 Andersson et al.
`3/2004 Mahany
`2004/0042421 Al
`3/2004 Maissel et al.
`2004/0049787 Al
`2004/0070593 Al
`412004 Neely et al.
`2004/0083487 Al
`412004 Collens et al.
`2004/0086122 Al
`512004 Watson
`2004/0088369 Al
`512004 Yeager et al.
`2004/0088557 Al
`512004 Malcolm et al.
`200410117824 Al
`6/2004 Karaoguz et al.
`2004/0139047 Al
`7 /2004 Rechsteiner et al.
`2004/0156528 Al
`8/2004 Joo et al.
`200410187005 Al
`912004 Molaro
`10/2004 Sarkissian et al.
`2004/0199630 Al
`2004/0240405 Al
`12/2004 Okazaki
`12/2004 Purkayastha et al.
`2004/0248615 Al
`2004/0254998 Al
`12/2004 Horvitz
`2004/0263941 Al
`12/2004 Chen et al.
`2004/0264372 Al
`12/2004 Huang
`2004/0267900 Al
`12/2004 Hoekstra et al.
`
`2005/0008017 Al
`200510010664 Al
`2005/0034001 Al
`2005/0036469 Al
`2005/0044422 Al
`2005/0050103 Al
`2005/0081042 Al
`2005/0086069 Al
`2005/0097331 Al
`2005/0108769 Al
`2005/0120091 Al
`2005/0120127 Al
`2005/0125405 Al
`2005/0143123 Al
`2005/0165828 Al
`2005/0169632 Al*
`2005/0182989 Al
`2005/0183120 Al
`2005/0192987 Al
`2005/0201340 Al*
`2005/0201726 Al
`2005/0216942 Al
`2005/0220321 Al
`2005/0229246 Al
`2005/0238012 Al
`2005/0239497 Al
`2005/0281194 Al
`2005/0286438 Al
`200610010274 Al
`200610015735 Al
`2006/0037077 Al
`2006/0048185 Al
`2006/0048186 Al
`2006/0050880 Al
`2006/0053452 Al
`2006/0056349 Al
`2006/0059560 Al
`2006/0072786 Al
`2006/0075243 Al
`2006/0080707 Al
`2006/0085830 Al
`2006/0095401 Al
`2006/0095471 Al
`2006/0095472 Al
`2006/0095792 Al
`2006/0114832 Al
`2006/0123235 Al
`2006/0127037 Al
`2006/0129672 Al*
`2006/0129810 Al
`2006/0133644 Al
`200610156003 Al
`2006/0161776 Al
`2006/0173794 Al
`2006/0174128 Al
`2006/0182101 Al
`2006/0200416 Al
`2006/0206933 Al *
`2006/0233101 Al
`2006/0270415 Al
`2006/0277271 Al
`2007/0002742 Al*
`2007 /0008978 Al
`2007/0058561 Al
`2007/0061488 Al*
`2007/0061580 Al*
`2007/0064643 Al
`200710110080 Al
`2007/0133673 Al
`2007/0214237 Al
`2007 /0223437 Al
`2007 /0282847 Al
`2008/0044087 Al
`2009/0037388 Al
`2009/0287837 Al
`2010/0174770 Al
`2011100877 50 Al
`
`112005 Datta et al.
`1/2005 Hubbard
`212005 Pontarelli
`212005 Wentink
`212005 Cantrell et al.
`3/2005 Kesteloot et al.
`412005 Venkstesan et al.
`412005 Watson et al.
`512005 Majidimehr et al.
`512005 Arnold et al.
`6/2005 Casais et al.
`6/2005 Bradley et al.
`6/2005 Watson et al.
`6/2005 Black et al.
`7 /2005 Lango et al
`8/2005 Song et al. ...................... 398/72
`8/2005 Zarnke et al.
`8/2005 Jain et al.
`912005 Marsh
`912005 Wang et al. ................... 370/337
`912005 Malcolm et al.
`912005 Barton
`10/2005 Langelaar
`10/2005 Rajagopal et al.
`10/2005 Panigrahy et al.
`10/2005 Bahl et al.
`12/2005 Sonoda
`12/2005 Rajkotia
`112006 Olson
`112006 Kudo et al.
`212006 Gadde et al.
`3/2006 Alterman
`3/2006 Alterman
`3/2006 Taylor et al.
`3/2006 Lee et al.
`3/2006 Nakatugawa et al.
`3/2006 Montulli
`412006 Watson et al.
`412006 Lakarnp et al.
`412006 Laksono
`412006 Bruck et al.
`512006 Krikorian et al.
`512006 Krikorian et al.
`512006 Krikorian et al.
`512006 Hurtado et al.
`612006 Hamilton et al.
`612006 Vanstone
`612006 Van Hoff et al.
`612006 Mayer ........................... 709/223
`612006 Jeong et al.
`612006 Wells et al.
`712006 Zhang et al.
`712006 Van DerVoon et al.
`8/2006 Sellars et al.
`8/2006 Yuval
`8/2006 Hoekstra et al.
`912006 White et al.
`912006 Molen et al. .................... 726/14
`10/2006 Luft et al.
`1112006 Waxman
`12/2006 Morse et al.
`112007 Krishnaswarny et al.
`112007 Pirzada et al.
`3/2007 Virgile
`3/2007 Alagappan et al ............ 709/246
`3/2007 Venkatesan et al. .......... 713/176
`3/2007 Tavares
`5/2007 Bennett
`6/2007 Imaizumi
`9/2007 Stibel et al.
`9/2007 Virgile
`12/2007 Gwozdz
`2/2008 Levy et al.
`212009 Cooper et al.
`1112009 Felsher
`7/2010 Pandya
`412011 Gwozdz
`
`.... 370/235
`
`DISH, Exh. 1001, p. 2
`
`

`
`US 8,102,863 Bl
`Page 3
`
`WO
`WO
`WO
`WO
`
`FOREIGN PATENT DOCUMENTS
`WO 00/40021 Al
`712000
`0069163 A2
`11/2000
`2006046099 A2
`512006
`2006046099 A3
`512006
`
`OTHER PUBLICATIONS
`
`http://www.pcconnection.com/
`Connection,
`PC
`ProductDetail?sku~5373l72&SourceID~k40132, 2006.
`Vijay T. Raisinghani et al., "ECLAIR: An Efficient Cross Layer
`Architecture for Wireless Protocol Stacks," 5th World Wireless Con(cid:173)
`gress, San Francisco, CA, May 25-28, 2004.
`Vineet Srivastava et al., "Cross-Layer Design: A Survey and the Road
`Ahead," IEEE Communications Magazine, pp. 112-119, Dec. 2005.
`No Author, "Cisco AON: A Network-Based Intelligent Message
`Routing System," (website), obtained Jan. 9, 2007, 7 pages, http://
`www.cisco.com/en/US/products/ps6438/products_data_
`sheet0900aecd802c lf9c .html.
`E. Koch et al., "Towards Robust and Hidden Image Copyright Label(cid:173)
`ing," (article), Jun. 20-22, 1995, 4 pages, Proc. of 1995 IEEE Work(cid:173)
`shop on Nonlinear Signal and Image Processing, Neos Marmaras,
`Greece.
`E. Setton et al., "Cross-Layer Design of Ad Hoc Networks for Real(cid:173)
`Time Video Streaming," (article), Aug. 2005, pp. 99-102, vol. 12,
`issue 4, IEEE Wireless Communications.
`No Author, "Gefen HDMI Cat-5 Extreme User Manual," (manual),
`2006, 16 pages, Gefen Inc.
`No Author, "Global-Link Product Manual Rev. C-Jan. 2005,"
`(manual), Jan. 2005, 68 pages, Logical Solutions, http://www.
`thinklogical.com/documents/Global-Link_Manual_Rev _ C.pdf.
`No Author, "Xtendex HDTV Extender," (website), 2005, 2 pages,
`http://www.networktechinc.com/pdf/cat-hdtv-extend.pdf.
`No Author, "Get the eye, get Purelink," (website), obtained Jul. 13,
`2007, 2 pages, http://www.dtrovision.com.
`
`No Author, "Secure KYM over IP: Global-link-Thinklogical,"
`(website), obtained Jul. 13, 2007, 1 page, http://www.thinklogical.
`com/products/ globalLink. php.
`Jana Dittmann et al., "Robust MPEG Video Watermarking Technolo(cid:173)
`gies," (article), 1998, pp. 71-80, International Multimedia Confer(cid:173)
`ence archive Proceedings of the sixth ACM international conference
`on Multimedia table of contents, Bristol, United Kingdom, http://
`www.ipsi.fraunhofer.de/mobile/publications/fullpapers/ ACM/
`acm ab.doc.
`Jiri Fridrich, "Applications of Data Hiding in Digital Images,"
`(article), Nov. 4-6, 1998, 33 pages, Tutorial for the ISPACS '98
`Conference in Melbourne, Australia.
`No Author, "Xtendex Series ST-CSDVI-150, 150 Foot DVI Video
`Extender Installation and Operation Manual Software Version 1.2,"
`(manual), Oct. 4, 2006, 11 pages, http://www.networktechinc.com/
`pdf/man063 .pdf.
`Paul Judge et al., "WHIM: Watermarking Multicast Video with a
`Hierarchy of Intermediaries," (article), 2002, pp. 699-712, vol. 39,
`issue 6, Computer Networks: The International Journal of Computer
`and Telecommunications Networking archive.
`No Author, "PC Connection," (website), 2006, 6 pages, http://www.
`pcconnection.com/ProductDetail?sku~5373 l 72
`&SourceID~k40132.
`No Author, Graham Klyne et al., editors, "W3C Composite Capabil(cid:173)
`ity," (website), Jan. 15, 2004, 61 pages, http://www.w3.org/TR/2004/
`REC-CCPP-struct-vocab-20040115/.
`No Author, "MediaMax Axonix Corporation," (website), obtained
`Jul. 13, 2007, 2 pages, http://www.axonix.com/mediamax/.
`No Author, "Kaleidescape-Home," (website), obtained Jul. 13,
`2007, 1 page, http://www.kaleidescape.com.
`No Author, "Yahoo! Messenger," (website), obtained Jan. 9, 2007, 2
`pages, http://messenger.yahoo.com/chat.php.
`No Author, "Series 2 TiVo Home Media Features Guide," (manual),
`2005, 47 pages.
`* cited by examiner
`
`DISH, Exh. 1001, p. 3
`
`

`
`------------------------------,
`,....-16
`___________ L __
`'
`
`'
`\
`
`~
`1 WIRELESS
`LOCAL AREA NETWORK (WLAN)
`:
`I
`I
`1
`:
`I
`I
`
`22
`
`USER
`DEVICE
`
`24
`:;:12 ~
`, ~ o''EvlcE 1
`
`10~
`
`I
`I
`I
`: CUSTOMER PREMISES
`18
`~
`I
`I
`I
`I
`I
`I
`I
`I
`mH
`1
`NETWORK 1
`FIBER
`:
`I
`I
`I
`I
`I
`I
`I
`I
`I
`
`20
`1000 Bt
`
`,
`
`NETWORK
`INTERFACE
`
`26
`
`28
`
`USER
`DEVICE
`
`USER
`DEVICE
`
`I
`I
`I
`I
`I
`I
`I
`I
`
`'
`~------------------~~~~~~-------------/
`
`-----
`
`- - - - - -
`
`~
`
`I
`
`FIG. 1
`
`~
`00 .
`
`~
`~
`~
`
`~ = ~
`
`~
`
`~ :=
`'" ...
`0 ....
`
`N
`
`N
`
`N
`
`('D
`('D
`
`1J1 =(cid:173)
`.....
`....
`0 ..... ...
`
`d
`rJl
`'"ex;
`
`"'"" = N
`Oo
`0--, w = "'""
`
`DISH, Exh. 1001, p. 4
`
`

`
`GATEWAY OS
`
`56
`
`~
`
`NON-SECURE
`DATA
`CACHE
`
`38
`
`C::>
`C::>
`
`c::>
`
`0
`
`SECURE
`DATA
`CACHE
`
`l,-40
`
`,.....-34
`
`r1 802.11X
`
`RADIO(S)
`
`30
`
`ADAPTABLE CROSS-LAYER
`OFFLOAD ENGINE
`
`I
`
`,-32
`
`1000 Bt
`ETHERNET
`NIC
`
`,-36
`I ....
`LJ ETHERNET ::=::
`..._..
`
`1000Bt
`SWITCH
`
`L__
`
`42-...
`
`I
`
`I
`
`I
`
`44
`
`46
`
`48
`
`IDS RULES
`
`DRM ENCODER/DECODER
`
`DES ENCRYPTION/DECRYPTION
`
`FILE FORMAT CONVERSION
`
`FIG.2
`
`50
`
`,-54
`
`~
`00 .
`
`~
`~
`~
`
`~ = ~
`
`~
`
`N
`
`~ :=
`~ ....
`N
`0 ......
`N
`
`1J1 =(cid:173)
`
`('D
`('D
`......
`N
`0 ......
`....
`
`d
`rJl
`~
`"'"" = N
`Oo
`0--, w = "'""
`
`DISH, Exh. 1001, p. 5
`
`

`
`C>
`
`C>
`
`~C)
`
`C)
`
`0
`
`c::>
`C>
`
`0
`
`SECURE CACHE
`NON-SECURE CACHE
`=><=
`=><=
`I DRM ENCODING/DECODING I
`FILE CONVERSION
`=><=
`=><=
`I
`I
`
`I
`
`TCP FLOWS
`=><=
`I
`
`TCP
`
`UDP
`
`-------·
`LAYER4 I
`
`OFFLOAD ~ LAYER 31
`ENGINE
`30
`
`LAYER2 I
`-------I
`
`FTP
`=><=
`I
`
`UDP FLOWS
`
`I~ C>
`I ~
`I~
`I
`
`~
`00 .
`
`~
`~
`~
`
`~ = ~
`
`c::::>
`
`0
`
`C>
`
`RULE
`CHECK
`ENGINE
`42
`
`~II l66
`
`~
`
`~ =
`"' ...
`0 ....
`
`N
`
`N
`
`N
`
`1J1 =-('D
`.....
`
`('D
`
`(.H
`
`0 ..... ...
`
`d
`rJl
`
`"'QIO
`
`"'"" = N
`Oo
`0--, w = "'""
`
`IP ROUTER
`IP
`=><=
`=><=
`I
`I
`SIMPLE MAC
`SMART MAC
`ETHERNET SWITCH
`=><=
`=><=
`=><=
`=><=
`=><=
`=><=
`I
`1000 Bt
`1000 Bt
`I
`802.11n
`I
`802.11n
`I
`802.11n
`I
`802.11n
`
`WANi:JBt
`
`FIG. 3
`
`DISH, Exh. 1001, p. 6
`
`

`
`, ,
`, ,
`
`I
`I
`I
`I
`I
`I
`I
`I
`,
`I
`I , '
`(
`
`I
`I
`,
`I
`I , '
`...
`I
`I
`I
`I
`
`,
`
`,
`I
`i-'
`I
`
`I ...
`
`... ... ...
`
`SNMP->" .. / ..
`
`I
`
`;
`
`CROSS-LAYER MESSAGING MATRIX
`
`,,''~
`,, ....
`MATRIX
`CONTRO~ ......
`~- ..
`
`'
`
`I
`I
`
`' ' ' '
`
`T
`RSVP AND/OR
`DIFFSERV OTHER ROUTING
`PROTOCOLS
`
`' ,
`
`'-----L----------J-----------L-----------'
`I
`WAN
`I I
`FIG. 4
`
`I
`
`- I U
`
`I
`
`- UU
`
`I
`
`- Ut:.
`
`I
`
`WLAN
`
`~
`00 .
`
`~
`~
`~
`
`~ = ~
`
`~
`
`~ :=
`"' ...
`0 ....
`
`N
`
`N
`
`N
`
`('D
`('D
`
`1J1 =(cid:173)
`..... ...
`0 ..... ...
`
`d
`rJl
`
`"'QIO
`
`"'"" = N
`Oo
`0--, w = "'""
`
`I
`
`DISH, Exh. 1001, p. 7
`
`

`
`US 8, 102,863 B 1
`
`1
`HIGH-SPEED WAN TO WIRELESS LAN
`GATEWAY
`
`FIELD OF THE INVENTION
`
`The present invention relates to a gateway device and more
`particularly relates to a gateway device interconnecting a high
`speed Wide Area Network (WAN) to a lower speed Wireless
`Local Area Network (WLAN).
`
`BACKGROUND OF THE INVENTION
`
`2
`Those skilled in the art will appreciate the scope of the
`present invention and realize additional aspects thereof after
`reading the following detailed description of the preferred
`embodiments in association with the accompanying drawing
`figures.
`
`5
`
`BRIEF DESCRIPTION OF THE DRAWING
`FIGURES
`
`10
`
`The accompanying drawing figures incorporated in and
`forming a part of this specification illustrate several aspects of
`the invention, and together with the description serve to
`explain the principles of the invention.
`FIG. 1 illustrates a system including an adaptable cross-
`15 layer gateway for interconnecting, or bridging, a high speed
`Wide Area Network (WAN) to a lower speed Wireless Local
`Area Network (WLAN) according to one embodiment of the
`present invention;
`FIG. 2 is a block diagram of the adaptable cross-layer
`gateway of FIG. 1 according to one embodiment of the
`present invention;
`FIG. 3 is an exemplary protocol stack representation of the
`adaptable cross-layer gateway according to one embodiment
`of the present invention; and
`FIG. 4 illustrates an exemplary cross-messaging matrix
`controlled to provide a complete protocol stack having a
`cross-layer architecture for a network connection imple(cid:173)
`mented by the adaptable cross-layer gateway according to
`one embodiment of the present invention.
`
`Historically, residential gateways provided a routing func(cid:173)
`tion from an in-home Local Area Network (LAN) to a Wide
`Area Network (WAN) based Asynchronous Digital Sub(cid:173)
`scriber Line (ADSL) or Data Over Cable Service Interface
`Specification (DOCSIS) connection. Bandwidth available
`from the WAN ranged from 200 kbps to 6 Mbps. The LAN
`side of the gateway was either a single or multiple 10/lOOBt
`Ethernet connections serving client computers. Eventually, 20
`these Ethernet connections were replaced with wireless IEEE
`802.llb/a/g LANs operating from 6 to 50 Mbps. The smaller
`bandwidth capabilities of the WAN versus the LAN kept
`downstream traffic flow simple in the gateway. Upstream
`traffic from the LAN to WAN was seldom an issue because 25
`users were less sensitive to this bottleneck. A typical upstream
`bottleneck scenario would be sending an email with a large
`attachment. In this situation, the Transfer Control Protocol
`(TCP) service of the gateway would simply throttle the LAN
`connection to the appropriate speed for the WAN.
`With the advent of Fiber-to-the-Home (FTTH) networks,
`the traditional scenario described above has been reversed. In
`a FTTH network, a high speed FTTH data connection is
`provided to the residential gateway. The FTTH data connec(cid:173)
`tion provides data rates in the range of 1 to 10 Gbps. In 35
`contrast, the proposed IEEE 802.1 ln standard for wireless
`LAN s provides data rates in the range ofl 00 to 500 Mbps. As
`such, the traditional residential gateway architecture will
`limit overall performance to the wireless LAN bandwidth,
`thereby negating much of the value of the FTTH connection. 40
`Thus, there is a need for an improved residential gateway
`architecture for interconnecting a high speed WAN to a lower
`speed wireless LAN.
`
`30
`
`DETAILED DESCRIPTION OF THE PREFERRED
`EMBODIMENTS
`
`The embodiments set forth below represent the necessary
`information to enable those skilled in the art to practice the
`invention and illustrate the best mode of practicing the inven(cid:173)
`tion. Upon reading the following description in light of the
`accompanying drawing figures, those skilled in the art will
`understand the concepts of the invention and will recognize
`applications of these concepts not particularly addressed
`herein. It should be understood that these concepts and appli-
`cations fall within the scope of the disclosure and the accom(cid:173)
`panying claims.
`FIG.1 illustrates a system 10 including an adaptable cross-
`45 layer gateway 12 interconnecting, or bridging, a high speed
`WAN 14 and a lower speed WLAN 16 according to one
`embodiment of the present invention. In addition, as dis(cid:173)
`cussed below, the gateway 12 offloads data to data caches in
`order to take advantage of the high data rate provided by the
`50 high speed WAN 14. In addition, by using cross-layering
`techniques, the gateway 12 improves the performance of the
`WLAN 16 in order to take further advantage of the high speed
`WAN 14. The gateway 12 may be implemented in hardware
`or a combination of hardware and software. For example, the
`55 gateway 12 may include one or more Application Specific
`Integrated Circuits (AS I Cs), one or more Digital Signal Pro(cid:173)
`cessors (DSPs), one or more Field Programmable Gate
`Arrays (FPGAs ), or the like.
`The WAN 14 may be a distributed public access network
`60 such as the Internet. Preferably, the WAN 14 provides a Fiber(cid:173)
`to-the-Home (FTTH) connection to a customer premises 18,
`which in this example includes a network interface 20, the
`gateway 12, and the WLAN 16. FTTH generally refers to a
`broadband network where a fiber-optic connection is pro-
`65 vided to the home. The FTTH connection provides data rates
`equal to or greater than 1 Gigabit per second (Gbps). For
`example, the FTTH connection may provide data rates in the
`
`SUMMARY OF THE INVENTION
`
`The present invention relates to a gateway interconnecting
`a high speed Wide Area Network (WAN) and a lower speed
`Wireless Local Area Network (WLAN). The high speed
`WAN is preferably connected to the gateway via a Fiber-to(cid:173)
`the-Home (FTTH) connection and associated FTTH modem.
`In general, the gateway includes an adaptable cross-layer
`offload engine operating to manage bandwidth between the
`high speed WAN and the lower speed WLAN. As data enters
`the gateway from the WAN at the high speed data rate of the
`WAN, the offload engine stores the data in a non-secure data
`cache. A rule check engine performs a stateless or stateful
`inspection of the data in the non-secure data cache. Once
`inspected by the rule check engine, the data is moved from the
`non-secure cache to the secure cache and thereafter transmit(cid:173)
`ted to an appropriate user device in the WLAN at a lower data
`rate of the WLAN.
`Prior to transmitting the data, the gateway may also per(cid:173)
`form additional functions such as, but not limited to, file
`format conversion, Digital Rights Management (DRM)
`encoding or decoding, and Data Encryption Standard (DES)
`encryption or decryption.
`
`DISH, Exh. 1001, p. 8
`
`

`
`US 8, 102,863 B 1
`
`5
`
`3
`range of and including 1 to 10 Gbps. The network interface 20
`may be a FTTH modem providing an interface between the
`FTTH connection and the gateway 12. In this exemplary
`embodiment, the network interface 20 provides an optical to
`electrical Gigabit Ethernet connection (lOOOBt) to the gate-
`way 12. It should be noted that while the preferred high speed
`connection to the WAN 14 is the FTTH connection discussed
`herein, the present invention is not limited thereto. The gate(cid:173)
`way 12 of the present invention may be used to interconnect,
`or bridge, any high speed WAN to a lower speed LAN regard(cid:173)
`less of the type of connection provided to the WAN. For
`example, the gateway 12 may interconnect an OC-192
`(9.95328 Gbps) or 10 Gigabit Ethernet WAN to a multiport
`Gigabit Ethernet (lOOOBt) lower speed LAN.
`The WLAN 16 may operate, for example, according to one 15
`or more of the suite of IEEE 802.11 standards such as the
`IEEE 802.1 la, IEEE 802.11 b, IEEE 802.1 lg, or the proposed
`IEEE 802.1 ln standards. The WLAN 16 is formed by the
`gateway 12 and a number of user devices 22-28 each having
`a wireless interface. The user devices 22-28 may be, for 20
`example, personal computers, Personal Video Recorders
`(PVRs), Personal Digital Assistants (PDAs), other Internet
`Protocol (IP) appliances, or the like, or any combination
`thereof.
`FIG. 2 is a more detailed block diagram of the gateway 12
`according to one embodiment of the present invention. At the
`heart of the gateway 12 is an adaptable cross-layer offload
`engine 30 that manages bandwidth, or traffic flow, between
`the WAN 14 and the WLAN 16. The offload engine 30 utilizes
`cross-layer functionality and is configurable to adapt to vary(cid:173)
`ing conditions in the WLAN 16. The offload engine 30 is
`preferably implemented in hardware, but may alternatively be
`implemented in software or a combination of hardware and
`software.
`The offload engine 30 is communicatively coupled to the
`WAN 14 via, in this example, a Gigabit Ethernet Network
`Interface Card (NIC) 32, which is connected to the WAN 14
`(FIG. 1) via the network interface 20. The NIC 32 may gen(cid:173)
`erally be referred to as a high speed network interface. The
`offload engine 30 is communicatively coupled to the WLAN
`16, and more specifically the user devices 22-28 in the WLAN
`16, via one or more wireless radios 34. In this example, the
`wireless radios 34 are IEEE 802.1 ln wireless radios. How(cid:173)
`ever, the present invention is not limited thereto. The gateway
`12 may also include an Ethernet switch 36 or the like provid(cid:173)
`ing one or more wired connections to additional LAN
`devices.
`The gateway 12 also includes a non-secure data cache 38
`and a secure data cache 40. The non-secure and secure data
`caches 38 and 40 are used to buffer data as needed by the 50
`offload engine 30. While illustrated separately, the data
`caches 38 and 40 may be implemented in a single physical
`cache where, for example, flags are used to identify secure
`and non-secure data. The non-secure data cache 38 is used to
`store received data from the WAN 14 for inspection and
`processing prior to forwarding the data to the WLAN 16. The
`non-secure data cache 38 may also be used to buffer large data
`sets from the WLAN 16 waiting for transmission over the
`WAN 14. By buffering data in the non-secure data cache 38,
`the gateway 12 is enabled to take advantage of the full band(cid:173)
`width provided by the FTTH connection. The secure data
`cache 40 is used to temporarily store data from the non-secure
`data cache 38 that has been inspected and cleared for trans(cid:173)
`mission prior to transmission to the user devices 22-28 in the
`WLAN16.
`A rule check engine 42 operates to inspect the data in the
`non-secure data cache 38 according to a number of rules,
`
`4
`which in this example include Intrusion Detection System
`(IDS) rules 44, Digital Rights Management (DRM) rules 46,
`and other general or specific content rules 48. The rule check
`engine 42 may perform stateless inspection, stateful inspec(cid:173)
`tion, or both stateless and stateful inspection. The IDS rules
`44 are generally rules for detecting malicious network traffic
`and may include, for example, typical firewall rules. The
`DRM rules 46 may be rules for protecting media files, such as
`videos, songs, and images, stored on the user devices 22-28
`10 within the WLAN 16 when transmitted over the WAN 14. In
`addition, the DRM rules 46 may include rules for identifying
`incoming content to be encoded as a security feature to pre(cid:173)
`vent unauthorized viewing of the specified content by, for
`example, children within the WLAN 16. The content rules 48
`may include rules regulating the types of content that may be
`accessed by the user devices 22-28 within the WLAN 16. In
`addition, as discussed below, the rule check engine 42 may
`inspect the data passing through the gateway 12 based on
`rules for triggering additional functions provided by the gate(cid:173)
`way 12.
`The gateway 12 may also include various additional func(cid:173)
`tional components such as, but not limited to, a DRM
`encoder/decoder 50, a Digital Encryption System (DES)
`encryption/decryption function 52, and a file format conver-
`25 sion function 54. The functions 50-54 may be triggered either
`directly or indirectly by the rule check engine 42 based on
`associated rules used to inspect data passing through the
`gateway 12.
`The DRM encoder/decoder 50 may be implemented in
`30 hardware, software, or a combination of hardware and soft(cid:173)
`ware, and may be used to protect content transmitted over the
`WAN 14 from the user devices 22-28 within the WLAN 16. In
`addition or alternatively, the DRM encoder/decoder 50 may
`be used in conjunction with firewall technology to create a
`35 security feature that prevents unauthorized viewing of speci(cid:173)
`fied content on the user devices 22-28. More specifically, in
`the outgoing direction, the DRM encoder/decoder 50 may
`operate to encode content leaving the WLAN 16. For
`example, personal videos, songs, images, or the like stored by
`40 the user devices 22-28 may be encoded by the DRM encoder/
`decoder 50 such that only desired recipients may view or play
`the content. As for incoming content, the DRM encoder/
`decoder 50 may, for example, encode specified types of con(cid:173)
`tent from the WAN 14 to prevent unauthorized viewing by, for
`45 example, children. License keys could be distributed by the
`gateway 12 to appropriate user devices 22-28 to unlock the
`encoded content. It should be noted that the present invention
`is not limited to DRM encoding or decoding. Other types of
`encoding and decoding may be used as desired.
`The DES encryption/decryption function52 may be imple-
`mented in the wireless radios 34. However, the present inven(cid:173)
`tion is not limited thereto. The DES encryption/decryption
`function 52 operates to provide encryption and decryption of
`data transmitted over the WLAN 16 as commonly understood
`55 in the art. Additionally, DES and DRM may share the same
`encryption/decryption functions.
`The file format conversion function 54 may be imple(cid:173)
`mented in hardware, software, or a combination of hardware
`and software, and may be used to reduce the size of or other-
`60 wise adapt incoming content in order to reduce the bandwidth
`required to transfer the content to the appropriate user devices
`22-28. More specifically, the file format conversion function
`54 may convert the content from a first file format to a second
`file format having reduced bandwidth requirements, reduce
`65 the quality of the content, or both. For example, the file format
`conversion function 54 may convert a Motion Pictures
`Experts Group (MPEG) Layer 2 (MPEG-2) video file to a
`
`DISH, Exh. 1001, p. 9
`
`

`
`US 8, 102,863 B 1
`
`5
`MPEG Layer 4 (MPEG-4) video file, thereby reducing the
`bandwidth required to transfer the video file over the WLAN
`16. In addition or alternatively, the file format conversion
`function 54 may reduce the quality of the content such that the
`bandwidth required to transfer the content over the WLAN 16 5
`is also reduced. For example, the quality of video content may
`be reduced by reducing the resolution, bit rate, or frame rate.
`The file format conversion function 54 may process incoming
`content as the content is provided to the gateway 12 or after
`the content is entirely transferred to the gateway 12.
`The gateway 12 also includes a gateway operating system
`(OS) 56, which operates to configure and control the opera(cid:173)
`tion of the offload engine 30, the rule check engine 42, and the
`various functions 50-54. The gateway OS 56 may include
`client agents loaded, or configured, by the user devices 22-28. 15
`Using these client agents, the gateway OS 56 may be config(cid:173)
`ured to, for example, convert all incoming MPEG-2 files to
`MPEG-4 files for all of the user devices 22-28; convert all
`incoming MPEG-2 files to MPEG-4 files for the user device
`22; convert all incoming MPEG-2 files to AVI files for the 20
`user device 24; block all video content to the user device 26;
`block only Internet Protocol (IP) streaming content to the user
`device 28; use DRM encoding on all multimedia content and
`restrict playback to the user device 22; and configure the
`gateway 12 to immediately cache e-mail with attachments 25
`and provide the e-mail and attachments to the appropriate one
`of the user devices 22-28 over available radio frequency (RF)
`spectrum using a background operation. The above opera(cid:173)
`tions are intended to be exemplary and as such should not be
`construed to limit the scope of the present invention. These 30
`configurations may be implemented by the gateway OS 56 as
`additional rules for the rule check engine 42.
`In operation, when data is received from the WAN 14 via
`the NIC 32, the offload engine 30 offloads the data into the
`non-secure data cache 38. While in the non-secure data cache 35
`38, the data is inspected by the rule check engine 42 based on
`the rules 44-48 and any additional rules from the gateway OS
`56 for triggering

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket