`US008102863B 1
`
`c12) United States Patent
`Evans
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 8,102,863 Bl
`Jan.24,2012
`
`(54) HIGH-SPEED WAN TO WIRELESS LAN
`GATEWAY
`
`(75)
`
`Inventor: Gregory Morgan Evans, Raleigh, NC
`(US)
`
`6,665,536 Bl
`6,721,282 B2 *
`6,735,699 Bl
`6,738,493 Bl
`6,751,670 Bl
`
`12/2003 Mahany
`412004 Motley .......................... 370/252
`512004 Sasaki et al.
`512004 Cox et al.
`6/2004 Patterson
`(Continued)
`
`(73) Assignee: Qurio Holdings, Inc., Raleigh, NC (US)
`
`( *) Notice:
`
`Subject to any disclaimer, the term ofthis
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 1125 days.
`
`GB
`
`FOREIGN PATENT DOCUMENTS
`2306869 A
`5/1997
`(Continued)
`
`OTHER PUBLICATIONS
`
`(21) Appl. No.: 11/475,360
`
`(22) Filed:
`
`Jun.27,2006
`
`(51)
`
`Int. Cl.
`(2006.01)
`H04L 1100
`(2006.01)
`H04L 12128
`(2006.01)
`H04L 12156
`(52) U.S. Cl. ..................... 370/401; 370/230.1; 370/235;
`370/412
`( 58) Field of Classification Search . ... ... ... ... .. ... 3 70/230,
`370/230.1, 235, 401, 412
`See application file for complete search history.
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`5,613,004 A
`3/1997 Cooperman et al.
`1111997 Moskowitz et al.
`5,687,236 A
`5,758,257 A
`5/1998 Herz et al.
`8/1998 Payton
`5,790,935 A
`5,905,800 A
`5/1999 Moskowitz et al.
`6,076,108 A
`612000 Courts et al.
`10/2000 Zhao et al.
`6,141,753 A
`6,282,299 Bl
`8/2001 Tewfiket al.
`6,370,584 Bl
`412002 Bestavros et al.
`6,385,641 Bl
`512002 Jiang et al.
`6,389,541 Bl
`512002 Patterson
`6,411,946 Bl
`612002 Chaudhuri
`6,470,332 Bl
`10/2002 Weschler
`6,470,389 Bl
`10/2002 Chung et al.
`
`E. Setton, T. Yoo, X. Zhu, A. Goldsmith, and B. Girod, "Cross-Layer
`Design of Ad Hoc Networks for Real-Time Video Streaming," IEEE
`Wireless Communications, vol. 12, issue 4, pp. 99-102, Aug. 2005.
`
`(Continued)
`
`Primary Examiner - Hassan Phillips
`Assistant Examiner - Lonnie Sweet
`(74) Attorney, Agent, or Firm - Withrow & Terranova,
`PLLC
`
`ABSTRACT
`(57)
`A gateway interconnecting a high speed Wide Area Network
`(WAN) and a lower speed Wireless Local Area Network
`(WLAN) is provided. The high speed WAN is preferably
`connected to the gateway via a Fiber-to-the Home (FTTH)
`connection and associated FTTH modem. In general, the
`gateway includes an adaptable cross-layer offload engine
`operating to manage bandwidth between the high speed WAN
`and the lower speed WLAN. As data enters the gateway from
`the WAN at the high speed data rate of the WAN, the offload
`engine stores the data in a non-secure data cache. A rule check
`engine performs a stateless or stateful inspection of the data in
`the non-secure data cache. Thereafter, the data is moved from
`the non-secure data cache to a secure data cache and thereaf(cid:173)
`ter transmitted to an appropriate user device in the WLAN at
`the lower data rate of the WLAN.
`
`21 Claims, 4 Drawing Sheets
`
`--------------------------------------,
`L.:16
`;~------------ --,
`1 WIRELESS
`\
`LOCAL AREA NETWORK (WLAN)
`:
`I
`I
`I
`I
`I
`I
`I
`I
`I
`
`24
`
`I
`I
`I
`1 CUSTOMER PREMISES
`18~
`I
`I
`I
`I
`I
`I
`I
`I
`FTTH
`I
`NETWORK:
`FIBER
`1
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`~-------------------------------------
`
`, ________________ ;
`
`\
`
`DISH, Exh. 1001, p. 1
`
`
`
`US 8,102,863 Bl
`Page 2
`
`............... 709/203
`
`U.S. PATENT DOCUMENTS
`6,774,926 Bl
`8/2004 Ellis et al.
`6,789,116 Bl
`912004 Sarkissian et al.
`6,791,962 B2
`912004 Wentink
`6,804,779 Bl
`10/2004 Carroni et al.
`6,839,751 Bl
`112005 Dietz et al.
`6,865,605 Bl
`3/2005 Soderberg et al.
`6,871,236 B2
`3/2005 Fislnnan et al.
`6,970,848 B2
`1112005 Osaka et al.
`6,975,743 B2
`12/2005 Venkatesan et al.
`6,987,985 B2
`112006 Purkayastha et al.
`7,002,955 Bl
`212006 Kanuri et al.
`7,003,131 B2
`212006 Watson et al.
`3/2006 Vaidyanathan et al.
`7,016,668 B2
`7,020,304 B2
`3/2006 Alattar et al.
`7,036,024 B2
`412006 Watson
`7,039,562 Bl
`512006 Notani et al.
`7,065,607 B2
`612006 England et al.
`10/2006 de Bonet
`7,130,872 B2
`7,149,807 Bl
`12/2006 Kontothanassis
`7,203,744 Bl
`4/2007 Parekh et al.
`7,263,545 B2
`8/2007 Digate et al.
`7,356,013 B2
`4/2008 Linder et al.
`7,376,790 B2
`5/2008 Lango et al.
`7,409,556 B2
`8/2008 Wu et al.
`7,512,973 Bl
`3/2009 Chan et al.
`7,607,170 B2
`10/2009 Chesla
`7,624,436 B2
`1112009 Balakrishnan et al.
`7,656,849 Bl
`212010 Evans
`7,733,772 B2
`612010 Hazra et al.
`7,733,908 Bl
`612010 Evans
`7,739,658 B2
`6/2010 Watson et al.
`7,801,945 Bl
`912010 Geddes et al.
`200110051996 Al
`12/2001 Cooper et al.
`2002100107 59 Al
`112002 Hitson et al.
`2002/0013812 Al*
`112002 Krueger et al.
`2002/0049580 Al
`412002 Kutaragi et al.
`2002/0054578 Al
`512002 Zhang et al.
`2002/0061029 Al
`512002 Dillon
`200210104003 Al
`8/2002 Iwarnura
`200210104099 Al
`8/2002 Novak
`200210107934 Al
`8/2002 Lowery et al.
`2002/0129367 Al
`912002 Devara
`10/2002 Gutta et al.
`200210144267 Al
`200210156842 Al
`10/2002 Signes et al.
`200210168082 Al
`1112002 Razdan
`2003/0009769 Al
`112003 Hensgen et al.
`2003/0046270 Al
`3/2003 Leung et al.
`2003/0050055 Al
`3/2003 Ting et al.
`2003/0081580 Al
`5/2003 Vaidyanathan et al.
`5/2003 Cooper et al.
`2003/0093665 Al
`2003/0110234 Al
`6/2003 Egli et al.
`2003/0152096 Al*
`8/2003 Chapman ...................... 370/412
`2003/0161268 Al
`8/2003 Larsson et al.
`2003/0217099 Al
`1112003 Bobde et al.
`2004/0006615 Al
`112004 Jackson
`2004/0008864 Al
`112004 Watson et al.
`2004/00097 51 Al
`112004 Michaelis et al.
`200410010692 Al
`112004 Watson
`200410010694 Al
`112004 Collens et al.
`2004/0030798 Al
`212004 Andersson et al.
`3/2004 Mahany
`2004/0042421 Al
`3/2004 Maissel et al.
`2004/0049787 Al
`2004/0070593 Al
`412004 Neely et al.
`2004/0083487 Al
`412004 Collens et al.
`2004/0086122 Al
`512004 Watson
`2004/0088369 Al
`512004 Yeager et al.
`2004/0088557 Al
`512004 Malcolm et al.
`200410117824 Al
`6/2004 Karaoguz et al.
`2004/0139047 Al
`7 /2004 Rechsteiner et al.
`2004/0156528 Al
`8/2004 Joo et al.
`200410187005 Al
`912004 Molaro
`10/2004 Sarkissian et al.
`2004/0199630 Al
`2004/0240405 Al
`12/2004 Okazaki
`12/2004 Purkayastha et al.
`2004/0248615 Al
`2004/0254998 Al
`12/2004 Horvitz
`2004/0263941 Al
`12/2004 Chen et al.
`2004/0264372 Al
`12/2004 Huang
`2004/0267900 Al
`12/2004 Hoekstra et al.
`
`2005/0008017 Al
`200510010664 Al
`2005/0034001 Al
`2005/0036469 Al
`2005/0044422 Al
`2005/0050103 Al
`2005/0081042 Al
`2005/0086069 Al
`2005/0097331 Al
`2005/0108769 Al
`2005/0120091 Al
`2005/0120127 Al
`2005/0125405 Al
`2005/0143123 Al
`2005/0165828 Al
`2005/0169632 Al*
`2005/0182989 Al
`2005/0183120 Al
`2005/0192987 Al
`2005/0201340 Al*
`2005/0201726 Al
`2005/0216942 Al
`2005/0220321 Al
`2005/0229246 Al
`2005/0238012 Al
`2005/0239497 Al
`2005/0281194 Al
`2005/0286438 Al
`200610010274 Al
`200610015735 Al
`2006/0037077 Al
`2006/0048185 Al
`2006/0048186 Al
`2006/0050880 Al
`2006/0053452 Al
`2006/0056349 Al
`2006/0059560 Al
`2006/0072786 Al
`2006/0075243 Al
`2006/0080707 Al
`2006/0085830 Al
`2006/0095401 Al
`2006/0095471 Al
`2006/0095472 Al
`2006/0095792 Al
`2006/0114832 Al
`2006/0123235 Al
`2006/0127037 Al
`2006/0129672 Al*
`2006/0129810 Al
`2006/0133644 Al
`200610156003 Al
`2006/0161776 Al
`2006/0173794 Al
`2006/0174128 Al
`2006/0182101 Al
`2006/0200416 Al
`2006/0206933 Al *
`2006/0233101 Al
`2006/0270415 Al
`2006/0277271 Al
`2007/0002742 Al*
`2007 /0008978 Al
`2007/0058561 Al
`2007/0061488 Al*
`2007/0061580 Al*
`2007/0064643 Al
`200710110080 Al
`2007/0133673 Al
`2007/0214237 Al
`2007 /0223437 Al
`2007 /0282847 Al
`2008/0044087 Al
`2009/0037388 Al
`2009/0287837 Al
`2010/0174770 Al
`2011100877 50 Al
`
`112005 Datta et al.
`1/2005 Hubbard
`212005 Pontarelli
`212005 Wentink
`212005 Cantrell et al.
`3/2005 Kesteloot et al.
`412005 Venkstesan et al.
`412005 Watson et al.
`512005 Majidimehr et al.
`512005 Arnold et al.
`6/2005 Casais et al.
`6/2005 Bradley et al.
`6/2005 Watson et al.
`6/2005 Black et al.
`7 /2005 Lango et al
`8/2005 Song et al. ...................... 398/72
`8/2005 Zarnke et al.
`8/2005 Jain et al.
`912005 Marsh
`912005 Wang et al. ................... 370/337
`912005 Malcolm et al.
`912005 Barton
`10/2005 Langelaar
`10/2005 Rajagopal et al.
`10/2005 Panigrahy et al.
`10/2005 Bahl et al.
`12/2005 Sonoda
`12/2005 Rajkotia
`112006 Olson
`112006 Kudo et al.
`212006 Gadde et al.
`3/2006 Alterman
`3/2006 Alterman
`3/2006 Taylor et al.
`3/2006 Lee et al.
`3/2006 Nakatugawa et al.
`3/2006 Montulli
`412006 Watson et al.
`412006 Lakarnp et al.
`412006 Laksono
`412006 Bruck et al.
`512006 Krikorian et al.
`512006 Krikorian et al.
`512006 Krikorian et al.
`512006 Hurtado et al.
`612006 Hamilton et al.
`612006 Vanstone
`612006 Van Hoff et al.
`612006 Mayer ........................... 709/223
`612006 Jeong et al.
`612006 Wells et al.
`712006 Zhang et al.
`712006 Van DerVoon et al.
`8/2006 Sellars et al.
`8/2006 Yuval
`8/2006 Hoekstra et al.
`912006 White et al.
`912006 Molen et al. .................... 726/14
`10/2006 Luft et al.
`1112006 Waxman
`12/2006 Morse et al.
`112007 Krishnaswarny et al.
`112007 Pirzada et al.
`3/2007 Virgile
`3/2007 Alagappan et al ............ 709/246
`3/2007 Venkatesan et al. .......... 713/176
`3/2007 Tavares
`5/2007 Bennett
`6/2007 Imaizumi
`9/2007 Stibel et al.
`9/2007 Virgile
`12/2007 Gwozdz
`2/2008 Levy et al.
`212009 Cooper et al.
`1112009 Felsher
`7/2010 Pandya
`412011 Gwozdz
`
`.... 370/235
`
`DISH, Exh. 1001, p. 2
`
`
`
`US 8,102,863 Bl
`Page 3
`
`WO
`WO
`WO
`WO
`
`FOREIGN PATENT DOCUMENTS
`WO 00/40021 Al
`712000
`0069163 A2
`11/2000
`2006046099 A2
`512006
`2006046099 A3
`512006
`
`OTHER PUBLICATIONS
`
`http://www.pcconnection.com/
`Connection,
`PC
`ProductDetail?sku~5373l72&SourceID~k40132, 2006.
`Vijay T. Raisinghani et al., "ECLAIR: An Efficient Cross Layer
`Architecture for Wireless Protocol Stacks," 5th World Wireless Con(cid:173)
`gress, San Francisco, CA, May 25-28, 2004.
`Vineet Srivastava et al., "Cross-Layer Design: A Survey and the Road
`Ahead," IEEE Communications Magazine, pp. 112-119, Dec. 2005.
`No Author, "Cisco AON: A Network-Based Intelligent Message
`Routing System," (website), obtained Jan. 9, 2007, 7 pages, http://
`www.cisco.com/en/US/products/ps6438/products_data_
`sheet0900aecd802c lf9c .html.
`E. Koch et al., "Towards Robust and Hidden Image Copyright Label(cid:173)
`ing," (article), Jun. 20-22, 1995, 4 pages, Proc. of 1995 IEEE Work(cid:173)
`shop on Nonlinear Signal and Image Processing, Neos Marmaras,
`Greece.
`E. Setton et al., "Cross-Layer Design of Ad Hoc Networks for Real(cid:173)
`Time Video Streaming," (article), Aug. 2005, pp. 99-102, vol. 12,
`issue 4, IEEE Wireless Communications.
`No Author, "Gefen HDMI Cat-5 Extreme User Manual," (manual),
`2006, 16 pages, Gefen Inc.
`No Author, "Global-Link Product Manual Rev. C-Jan. 2005,"
`(manual), Jan. 2005, 68 pages, Logical Solutions, http://www.
`thinklogical.com/documents/Global-Link_Manual_Rev _ C.pdf.
`No Author, "Xtendex HDTV Extender," (website), 2005, 2 pages,
`http://www.networktechinc.com/pdf/cat-hdtv-extend.pdf.
`No Author, "Get the eye, get Purelink," (website), obtained Jul. 13,
`2007, 2 pages, http://www.dtrovision.com.
`
`No Author, "Secure KYM over IP: Global-link-Thinklogical,"
`(website), obtained Jul. 13, 2007, 1 page, http://www.thinklogical.
`com/products/ globalLink. php.
`Jana Dittmann et al., "Robust MPEG Video Watermarking Technolo(cid:173)
`gies," (article), 1998, pp. 71-80, International Multimedia Confer(cid:173)
`ence archive Proceedings of the sixth ACM international conference
`on Multimedia table of contents, Bristol, United Kingdom, http://
`www.ipsi.fraunhofer.de/mobile/publications/fullpapers/ ACM/
`acm ab.doc.
`Jiri Fridrich, "Applications of Data Hiding in Digital Images,"
`(article), Nov. 4-6, 1998, 33 pages, Tutorial for the ISPACS '98
`Conference in Melbourne, Australia.
`No Author, "Xtendex Series ST-CSDVI-150, 150 Foot DVI Video
`Extender Installation and Operation Manual Software Version 1.2,"
`(manual), Oct. 4, 2006, 11 pages, http://www.networktechinc.com/
`pdf/man063 .pdf.
`Paul Judge et al., "WHIM: Watermarking Multicast Video with a
`Hierarchy of Intermediaries," (article), 2002, pp. 699-712, vol. 39,
`issue 6, Computer Networks: The International Journal of Computer
`and Telecommunications Networking archive.
`No Author, "PC Connection," (website), 2006, 6 pages, http://www.
`pcconnection.com/ProductDetail?sku~5373 l 72
`&SourceID~k40132.
`No Author, Graham Klyne et al., editors, "W3C Composite Capabil(cid:173)
`ity," (website), Jan. 15, 2004, 61 pages, http://www.w3.org/TR/2004/
`REC-CCPP-struct-vocab-20040115/.
`No Author, "MediaMax Axonix Corporation," (website), obtained
`Jul. 13, 2007, 2 pages, http://www.axonix.com/mediamax/.
`No Author, "Kaleidescape-Home," (website), obtained Jul. 13,
`2007, 1 page, http://www.kaleidescape.com.
`No Author, "Yahoo! Messenger," (website), obtained Jan. 9, 2007, 2
`pages, http://messenger.yahoo.com/chat.php.
`No Author, "Series 2 TiVo Home Media Features Guide," (manual),
`2005, 47 pages.
`* cited by examiner
`
`DISH, Exh. 1001, p. 3
`
`
`
`------------------------------,
`,....-16
`___________ L __
`'
`
`'
`\
`
`~
`1 WIRELESS
`LOCAL AREA NETWORK (WLAN)
`:
`I
`I
`1
`:
`I
`I
`
`22
`
`USER
`DEVICE
`
`24
`:;:12 ~
`, ~ o''EvlcE 1
`
`10~
`
`I
`I
`I
`: CUSTOMER PREMISES
`18
`~
`I
`I
`I
`I
`I
`I
`I
`I
`mH
`1
`NETWORK 1
`FIBER
`:
`I
`I
`I
`I
`I
`I
`I
`I
`I
`
`20
`1000 Bt
`
`,
`
`NETWORK
`INTERFACE
`
`26
`
`28
`
`USER
`DEVICE
`
`USER
`DEVICE
`
`I
`I
`I
`I
`I
`I
`I
`I
`
`'
`~------------------~~~~~~-------------/
`
`-----
`
`- - - - - -
`
`~
`
`I
`
`FIG. 1
`
`~
`00 .
`
`~
`~
`~
`
`~ = ~
`
`~
`
`~ :=
`'" ...
`0 ....
`
`N
`
`N
`
`N
`
`('D
`('D
`
`1J1 =(cid:173)
`.....
`....
`0 ..... ...
`
`d
`rJl
`'"ex;
`
`"'"" = N
`Oo
`0--, w = "'""
`
`DISH, Exh. 1001, p. 4
`
`
`
`GATEWAY OS
`
`56
`
`~
`
`NON-SECURE
`DATA
`CACHE
`
`38
`
`C::>
`C::>
`
`c::>
`
`0
`
`SECURE
`DATA
`CACHE
`
`l,-40
`
`,.....-34
`
`r1 802.11X
`
`RADIO(S)
`
`30
`
`ADAPTABLE CROSS-LAYER
`OFFLOAD ENGINE
`
`I
`
`,-32
`
`1000 Bt
`ETHERNET
`NIC
`
`,-36
`I ....
`LJ ETHERNET ::=::
`..._..
`
`1000Bt
`SWITCH
`
`L__
`
`42-...
`
`I
`
`I
`
`I
`
`44
`
`46
`
`48
`
`IDS RULES
`
`DRM ENCODER/DECODER
`
`DES ENCRYPTION/DECRYPTION
`
`FILE FORMAT CONVERSION
`
`FIG.2
`
`50
`
`,-54
`
`~
`00 .
`
`~
`~
`~
`
`~ = ~
`
`~
`
`N
`
`~ :=
`~ ....
`N
`0 ......
`N
`
`1J1 =(cid:173)
`
`('D
`('D
`......
`N
`0 ......
`....
`
`d
`rJl
`~
`"'"" = N
`Oo
`0--, w = "'""
`
`DISH, Exh. 1001, p. 5
`
`
`
`C>
`
`C>
`
`~C)
`
`C)
`
`0
`
`c::>
`C>
`
`0
`
`SECURE CACHE
`NON-SECURE CACHE
`=><=
`=><=
`I DRM ENCODING/DECODING I
`FILE CONVERSION
`=><=
`=><=
`I
`I
`
`I
`
`TCP FLOWS
`=><=
`I
`
`TCP
`
`UDP
`
`-------·
`LAYER4 I
`
`OFFLOAD ~ LAYER 31
`ENGINE
`30
`
`LAYER2 I
`-------I
`
`FTP
`=><=
`I
`
`UDP FLOWS
`
`I~ C>
`I ~
`I~
`I
`
`~
`00 .
`
`~
`~
`~
`
`~ = ~
`
`c::::>
`
`0
`
`C>
`
`RULE
`CHECK
`ENGINE
`42
`
`~II l66
`
`~
`
`~ =
`"' ...
`0 ....
`
`N
`
`N
`
`N
`
`1J1 =-('D
`.....
`
`('D
`
`(.H
`
`0 ..... ...
`
`d
`rJl
`
`"'QIO
`
`"'"" = N
`Oo
`0--, w = "'""
`
`IP ROUTER
`IP
`=><=
`=><=
`I
`I
`SIMPLE MAC
`SMART MAC
`ETHERNET SWITCH
`=><=
`=><=
`=><=
`=><=
`=><=
`=><=
`I
`1000 Bt
`1000 Bt
`I
`802.11n
`I
`802.11n
`I
`802.11n
`I
`802.11n
`
`WANi:JBt
`
`FIG. 3
`
`DISH, Exh. 1001, p. 6
`
`
`
`, ,
`, ,
`
`I
`I
`I
`I
`I
`I
`I
`I
`,
`I
`I , '
`(
`
`I
`I
`,
`I
`I , '
`...
`I
`I
`I
`I
`
`,
`
`,
`I
`i-'
`I
`
`I ...
`
`... ... ...
`
`SNMP->" .. / ..
`
`I
`
`;
`
`CROSS-LAYER MESSAGING MATRIX
`
`,,''~
`,, ....
`MATRIX
`CONTRO~ ......
`~- ..
`
`'
`
`I
`I
`
`' ' ' '
`
`T
`RSVP AND/OR
`DIFFSERV OTHER ROUTING
`PROTOCOLS
`
`' ,
`
`'-----L----------J-----------L-----------'
`I
`WAN
`I I
`FIG. 4
`
`I
`
`- I U
`
`I
`
`- UU
`
`I
`
`- Ut:.
`
`I
`
`WLAN
`
`~
`00 .
`
`~
`~
`~
`
`~ = ~
`
`~
`
`~ :=
`"' ...
`0 ....
`
`N
`
`N
`
`N
`
`('D
`('D
`
`1J1 =(cid:173)
`..... ...
`0 ..... ...
`
`d
`rJl
`
`"'QIO
`
`"'"" = N
`Oo
`0--, w = "'""
`
`I
`
`DISH, Exh. 1001, p. 7
`
`
`
`US 8, 102,863 B 1
`
`1
`HIGH-SPEED WAN TO WIRELESS LAN
`GATEWAY
`
`FIELD OF THE INVENTION
`
`The present invention relates to a gateway device and more
`particularly relates to a gateway device interconnecting a high
`speed Wide Area Network (WAN) to a lower speed Wireless
`Local Area Network (WLAN).
`
`BACKGROUND OF THE INVENTION
`
`2
`Those skilled in the art will appreciate the scope of the
`present invention and realize additional aspects thereof after
`reading the following detailed description of the preferred
`embodiments in association with the accompanying drawing
`figures.
`
`5
`
`BRIEF DESCRIPTION OF THE DRAWING
`FIGURES
`
`10
`
`The accompanying drawing figures incorporated in and
`forming a part of this specification illustrate several aspects of
`the invention, and together with the description serve to
`explain the principles of the invention.
`FIG. 1 illustrates a system including an adaptable cross-
`15 layer gateway for interconnecting, or bridging, a high speed
`Wide Area Network (WAN) to a lower speed Wireless Local
`Area Network (WLAN) according to one embodiment of the
`present invention;
`FIG. 2 is a block diagram of the adaptable cross-layer
`gateway of FIG. 1 according to one embodiment of the
`present invention;
`FIG. 3 is an exemplary protocol stack representation of the
`adaptable cross-layer gateway according to one embodiment
`of the present invention; and
`FIG. 4 illustrates an exemplary cross-messaging matrix
`controlled to provide a complete protocol stack having a
`cross-layer architecture for a network connection imple(cid:173)
`mented by the adaptable cross-layer gateway according to
`one embodiment of the present invention.
`
`Historically, residential gateways provided a routing func(cid:173)
`tion from an in-home Local Area Network (LAN) to a Wide
`Area Network (WAN) based Asynchronous Digital Sub(cid:173)
`scriber Line (ADSL) or Data Over Cable Service Interface
`Specification (DOCSIS) connection. Bandwidth available
`from the WAN ranged from 200 kbps to 6 Mbps. The LAN
`side of the gateway was either a single or multiple 10/lOOBt
`Ethernet connections serving client computers. Eventually, 20
`these Ethernet connections were replaced with wireless IEEE
`802.llb/a/g LANs operating from 6 to 50 Mbps. The smaller
`bandwidth capabilities of the WAN versus the LAN kept
`downstream traffic flow simple in the gateway. Upstream
`traffic from the LAN to WAN was seldom an issue because 25
`users were less sensitive to this bottleneck. A typical upstream
`bottleneck scenario would be sending an email with a large
`attachment. In this situation, the Transfer Control Protocol
`(TCP) service of the gateway would simply throttle the LAN
`connection to the appropriate speed for the WAN.
`With the advent of Fiber-to-the-Home (FTTH) networks,
`the traditional scenario described above has been reversed. In
`a FTTH network, a high speed FTTH data connection is
`provided to the residential gateway. The FTTH data connec(cid:173)
`tion provides data rates in the range of 1 to 10 Gbps. In 35
`contrast, the proposed IEEE 802.1 ln standard for wireless
`LAN s provides data rates in the range ofl 00 to 500 Mbps. As
`such, the traditional residential gateway architecture will
`limit overall performance to the wireless LAN bandwidth,
`thereby negating much of the value of the FTTH connection. 40
`Thus, there is a need for an improved residential gateway
`architecture for interconnecting a high speed WAN to a lower
`speed wireless LAN.
`
`30
`
`DETAILED DESCRIPTION OF THE PREFERRED
`EMBODIMENTS
`
`The embodiments set forth below represent the necessary
`information to enable those skilled in the art to practice the
`invention and illustrate the best mode of practicing the inven(cid:173)
`tion. Upon reading the following description in light of the
`accompanying drawing figures, those skilled in the art will
`understand the concepts of the invention and will recognize
`applications of these concepts not particularly addressed
`herein. It should be understood that these concepts and appli-
`cations fall within the scope of the disclosure and the accom(cid:173)
`panying claims.
`FIG.1 illustrates a system 10 including an adaptable cross-
`45 layer gateway 12 interconnecting, or bridging, a high speed
`WAN 14 and a lower speed WLAN 16 according to one
`embodiment of the present invention. In addition, as dis(cid:173)
`cussed below, the gateway 12 offloads data to data caches in
`order to take advantage of the high data rate provided by the
`50 high speed WAN 14. In addition, by using cross-layering
`techniques, the gateway 12 improves the performance of the
`WLAN 16 in order to take further advantage of the high speed
`WAN 14. The gateway 12 may be implemented in hardware
`or a combination of hardware and software. For example, the
`55 gateway 12 may include one or more Application Specific
`Integrated Circuits (AS I Cs), one or more Digital Signal Pro(cid:173)
`cessors (DSPs), one or more Field Programmable Gate
`Arrays (FPGAs ), or the like.
`The WAN 14 may be a distributed public access network
`60 such as the Internet. Preferably, the WAN 14 provides a Fiber(cid:173)
`to-the-Home (FTTH) connection to a customer premises 18,
`which in this example includes a network interface 20, the
`gateway 12, and the WLAN 16. FTTH generally refers to a
`broadband network where a fiber-optic connection is pro-
`65 vided to the home. The FTTH connection provides data rates
`equal to or greater than 1 Gigabit per second (Gbps). For
`example, the FTTH connection may provide data rates in the
`
`SUMMARY OF THE INVENTION
`
`The present invention relates to a gateway interconnecting
`a high speed Wide Area Network (WAN) and a lower speed
`Wireless Local Area Network (WLAN). The high speed
`WAN is preferably connected to the gateway via a Fiber-to(cid:173)
`the-Home (FTTH) connection and associated FTTH modem.
`In general, the gateway includes an adaptable cross-layer
`offload engine operating to manage bandwidth between the
`high speed WAN and the lower speed WLAN. As data enters
`the gateway from the WAN at the high speed data rate of the
`WAN, the offload engine stores the data in a non-secure data
`cache. A rule check engine performs a stateless or stateful
`inspection of the data in the non-secure data cache. Once
`inspected by the rule check engine, the data is moved from the
`non-secure cache to the secure cache and thereafter transmit(cid:173)
`ted to an appropriate user device in the WLAN at a lower data
`rate of the WLAN.
`Prior to transmitting the data, the gateway may also per(cid:173)
`form additional functions such as, but not limited to, file
`format conversion, Digital Rights Management (DRM)
`encoding or decoding, and Data Encryption Standard (DES)
`encryption or decryption.
`
`DISH, Exh. 1001, p. 8
`
`
`
`US 8, 102,863 B 1
`
`5
`
`3
`range of and including 1 to 10 Gbps. The network interface 20
`may be a FTTH modem providing an interface between the
`FTTH connection and the gateway 12. In this exemplary
`embodiment, the network interface 20 provides an optical to
`electrical Gigabit Ethernet connection (lOOOBt) to the gate-
`way 12. It should be noted that while the preferred high speed
`connection to the WAN 14 is the FTTH connection discussed
`herein, the present invention is not limited thereto. The gate(cid:173)
`way 12 of the present invention may be used to interconnect,
`or bridge, any high speed WAN to a lower speed LAN regard(cid:173)
`less of the type of connection provided to the WAN. For
`example, the gateway 12 may interconnect an OC-192
`(9.95328 Gbps) or 10 Gigabit Ethernet WAN to a multiport
`Gigabit Ethernet (lOOOBt) lower speed LAN.
`The WLAN 16 may operate, for example, according to one 15
`or more of the suite of IEEE 802.11 standards such as the
`IEEE 802.1 la, IEEE 802.11 b, IEEE 802.1 lg, or the proposed
`IEEE 802.1 ln standards. The WLAN 16 is formed by the
`gateway 12 and a number of user devices 22-28 each having
`a wireless interface. The user devices 22-28 may be, for 20
`example, personal computers, Personal Video Recorders
`(PVRs), Personal Digital Assistants (PDAs), other Internet
`Protocol (IP) appliances, or the like, or any combination
`thereof.
`FIG. 2 is a more detailed block diagram of the gateway 12
`according to one embodiment of the present invention. At the
`heart of the gateway 12 is an adaptable cross-layer offload
`engine 30 that manages bandwidth, or traffic flow, between
`the WAN 14 and the WLAN 16. The offload engine 30 utilizes
`cross-layer functionality and is configurable to adapt to vary(cid:173)
`ing conditions in the WLAN 16. The offload engine 30 is
`preferably implemented in hardware, but may alternatively be
`implemented in software or a combination of hardware and
`software.
`The offload engine 30 is communicatively coupled to the
`WAN 14 via, in this example, a Gigabit Ethernet Network
`Interface Card (NIC) 32, which is connected to the WAN 14
`(FIG. 1) via the network interface 20. The NIC 32 may gen(cid:173)
`erally be referred to as a high speed network interface. The
`offload engine 30 is communicatively coupled to the WLAN
`16, and more specifically the user devices 22-28 in the WLAN
`16, via one or more wireless radios 34. In this example, the
`wireless radios 34 are IEEE 802.1 ln wireless radios. How(cid:173)
`ever, the present invention is not limited thereto. The gateway
`12 may also include an Ethernet switch 36 or the like provid(cid:173)
`ing one or more wired connections to additional LAN
`devices.
`The gateway 12 also includes a non-secure data cache 38
`and a secure data cache 40. The non-secure and secure data
`caches 38 and 40 are used to buffer data as needed by the 50
`offload engine 30. While illustrated separately, the data
`caches 38 and 40 may be implemented in a single physical
`cache where, for example, flags are used to identify secure
`and non-secure data. The non-secure data cache 38 is used to
`store received data from the WAN 14 for inspection and
`processing prior to forwarding the data to the WLAN 16. The
`non-secure data cache 38 may also be used to buffer large data
`sets from the WLAN 16 waiting for transmission over the
`WAN 14. By buffering data in the non-secure data cache 38,
`the gateway 12 is enabled to take advantage of the full band(cid:173)
`width provided by the FTTH connection. The secure data
`cache 40 is used to temporarily store data from the non-secure
`data cache 38 that has been inspected and cleared for trans(cid:173)
`mission prior to transmission to the user devices 22-28 in the
`WLAN16.
`A rule check engine 42 operates to inspect the data in the
`non-secure data cache 38 according to a number of rules,
`
`4
`which in this example include Intrusion Detection System
`(IDS) rules 44, Digital Rights Management (DRM) rules 46,
`and other general or specific content rules 48. The rule check
`engine 42 may perform stateless inspection, stateful inspec(cid:173)
`tion, or both stateless and stateful inspection. The IDS rules
`44 are generally rules for detecting malicious network traffic
`and may include, for example, typical firewall rules. The
`DRM rules 46 may be rules for protecting media files, such as
`videos, songs, and images, stored on the user devices 22-28
`10 within the WLAN 16 when transmitted over the WAN 14. In
`addition, the DRM rules 46 may include rules for identifying
`incoming content to be encoded as a security feature to pre(cid:173)
`vent unauthorized viewing of the specified content by, for
`example, children within the WLAN 16. The content rules 48
`may include rules regulating the types of content that may be
`accessed by the user devices 22-28 within the WLAN 16. In
`addition, as discussed below, the rule check engine 42 may
`inspect the data passing through the gateway 12 based on
`rules for triggering additional functions provided by the gate(cid:173)
`way 12.
`The gateway 12 may also include various additional func(cid:173)
`tional components such as, but not limited to, a DRM
`encoder/decoder 50, a Digital Encryption System (DES)
`encryption/decryption function 52, and a file format conver-
`25 sion function 54. The functions 50-54 may be triggered either
`directly or indirectly by the rule check engine 42 based on
`associated rules used to inspect data passing through the
`gateway 12.
`The DRM encoder/decoder 50 may be implemented in
`30 hardware, software, or a combination of hardware and soft(cid:173)
`ware, and may be used to protect content transmitted over the
`WAN 14 from the user devices 22-28 within the WLAN 16. In
`addition or alternatively, the DRM encoder/decoder 50 may
`be used in conjunction with firewall technology to create a
`35 security feature that prevents unauthorized viewing of speci(cid:173)
`fied content on the user devices 22-28. More specifically, in
`the outgoing direction, the DRM encoder/decoder 50 may
`operate to encode content leaving the WLAN 16. For
`example, personal videos, songs, images, or the like stored by
`40 the user devices 22-28 may be encoded by the DRM encoder/
`decoder 50 such that only desired recipients may view or play
`the content. As for incoming content, the DRM encoder/
`decoder 50 may, for example, encode specified types of con(cid:173)
`tent from the WAN 14 to prevent unauthorized viewing by, for
`45 example, children. License keys could be distributed by the
`gateway 12 to appropriate user devices 22-28 to unlock the
`encoded content. It should be noted that the present invention
`is not limited to DRM encoding or decoding. Other types of
`encoding and decoding may be used as desired.
`The DES encryption/decryption function52 may be imple-
`mented in the wireless radios 34. However, the present inven(cid:173)
`tion is not limited thereto. The DES encryption/decryption
`function 52 operates to provide encryption and decryption of
`data transmitted over the WLAN 16 as commonly understood
`55 in the art. Additionally, DES and DRM may share the same
`encryption/decryption functions.
`The file format conversion function 54 may be imple(cid:173)
`mented in hardware, software, or a combination of hardware
`and software, and may be used to reduce the size of or other-
`60 wise adapt incoming content in order to reduce the bandwidth
`required to transfer the content to the appropriate user devices
`22-28. More specifically, the file format conversion function
`54 may convert the content from a first file format to a second
`file format having reduced bandwidth requirements, reduce
`65 the quality of the content, or both. For example, the file format
`conversion function 54 may convert a Motion Pictures
`Experts Group (MPEG) Layer 2 (MPEG-2) video file to a
`
`DISH, Exh. 1001, p. 9
`
`
`
`US 8, 102,863 B 1
`
`5
`MPEG Layer 4 (MPEG-4) video file, thereby reducing the
`bandwidth required to transfer the video file over the WLAN
`16. In addition or alternatively, the file format conversion
`function 54 may reduce the quality of the content such that the
`bandwidth required to transfer the content over the WLAN 16 5
`is also reduced. For example, the quality of video content may
`be reduced by reducing the resolution, bit rate, or frame rate.
`The file format conversion function 54 may process incoming
`content as the content is provided to the gateway 12 or after
`the content is entirely transferred to the gateway 12.
`The gateway 12 also includes a gateway operating system
`(OS) 56, which operates to configure and control the opera(cid:173)
`tion of the offload engine 30, the rule check engine 42, and the
`various functions 50-54. The gateway OS 56 may include
`client agents loaded, or configured, by the user devices 22-28. 15
`Using these client agents, the gateway OS 56 may be config(cid:173)
`ured to, for example, convert all incoming MPEG-2 files to
`MPEG-4 files for all of the user devices 22-28; convert all
`incoming MPEG-2 files to MPEG-4 files for the user device
`22; convert all incoming MPEG-2 files to AVI files for the 20
`user device 24; block all video content to the user device 26;
`block only Internet Protocol (IP) streaming content to the user
`device 28; use DRM encoding on all multimedia content and
`restrict playback to the user device 22; and configure the
`gateway 12 to immediately cache e-mail with attachments 25
`and provide the e-mail and attachments to the appropriate one
`of the user devices 22-28 over available radio frequency (RF)
`spectrum using a background operation. The above opera(cid:173)
`tions are intended to be exemplary and as such should not be
`construed to limit the scope of the present invention. These 30
`configurations may be implemented by the gateway OS 56 as
`additional rules for the rule check engine 42.
`In operation, when data is received from the WAN 14 via
`the NIC 32, the offload engine 30 offloads the data into the
`non-secure data cache 38. While in the non-secure data cache 35
`38, the data is inspected by the rule check engine 42 based on
`the rules 44-48 and any additional rules from the gateway OS
`56 for triggering