throbber
I lllll llllllll Ill lllll lllll lllll lllll lllll 111111111111111111111111111111111
`US008879567Bl
`
`c12) United States Patent
`Evans
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 8,879,567 Bl
`Nov. 4, 2014
`
`(54) HIGH-SPEED WAN TO WIRELESS LAN
`GATEWAY
`
`(75)
`
`Inventor: Gregory Morgan Evans, Raleigh, NC
`(US)
`
`6,370,584 Bl
`6,385,641 Bl
`6,389,541 Bl
`6,411,946 Bl
`
`412002 Bestavros et al.
`512002 Jiang et al.
`512002 Patterson
`612002 Chaudhuri
`(Continued)
`
`(73) Assignee: Qurio Holdings, Inc., Raleigh, NC (US)
`
`FOREIGN PATENT DOCUMENTS
`
`( *) Notice:
`
`Subject to any disclaimer, the term ofthis
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 63 days.
`
`GB
`WO
`WO
`WO
`
`2306869 A
`0040021 Al
`0069163 A2
`2006046099 A2
`
`5/1997
`712000
`11/2000
`512006
`
`(21) Appl. No.: 13/329,992
`
`(22) Filed:
`
`Dec. 19, 2011
`
`Related U.S. Application Data
`
`(63) Continuation of application No. 11/475,360, filed on
`Jun. 27, 2006, now Pat. No. 8,102,863.
`
`OTHER PUBLICATIONS
`
`Author Unknown, "Cisco AON: A Network-Based Intelligent Mes(cid:173)
`sage Routing System," Cisco Systems, Inc., 2006, http://www.cisco.
`com/en/US/products/ps6438/products_data_
`sheet0900aecd802clf9c.html, accessed on Jan. 9, 2007, 7 pages.
`
`(Continued)
`
`Primary Examiner - Warner Wong
`(74) Attorney, Agent, or Firm - Withrow & Terranova,
`PLLC
`
`ABSTRACT
`(57)
`A gateway interconnecting a high speed Wide Area Network
`(WAN) and a lower speed Wireless Local Area Network
`(WLAN) is provided. The high speed WAN is preferably
`connected to the gateway via a Fiber-to-the Home (FTTH)
`connection and associated FTTH modem. In general, the
`gateway includes an adaptable cross-layer offload engine
`operating to manage bandwidth between the high speed WAN
`and the lower speed WLAN. As data enters the gateway from
`the WAN at the high speed data rate of the WAN, the offload
`engine stores the data in a non-secure data cache. A rule check
`engine performs a stateless or stateful inspection of the data in
`the non-secure data cache. Thereafter, the data is moved from
`the non-secure data cache to a secure data cache and thereaf(cid:173)
`ter transmitted to an appropriate user device in the WLAN at
`the lower data rate of the WLAN.
`
`34 Claims, 4 Drawing Sheets
`
`(2006.01)
`(2006.01)
`
`(51)
`
`(58)
`
`Int. Cl.
`H04L 12128
`H04J3/22
`(52) U.S. Cl.
`USPC ........................................... 370/401; 370/466
`Field of Classification Search
`USPC .......................................................... 370/401
`See application file for complete search history.
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`5,278,834 A *
`5,613,004 A
`5,687,236 A
`5,758,257 A
`5,790,935 A
`5,818,838 A *
`5,905,800 A
`6,076,108 A
`6,128,736 A
`6,141,753 A
`6,282,299 Bl
`
`1/1994 Mazzola ....................... 370/469
`3/1997 Cooperman et al.
`11/ 1997 Moskowitz et al.
`511998 Herz et al.
`8/1998 Payton et al.
`10/1998 Backes et al. ................. 370/390
`511999 Moskowitz et al.
`612000 Courts et al.
`10/2000 Miller
`10/2000 Zhao et al.
`8/2001 Tewfik et al.
`
`r-------------------------------------,
`/ _____________ c:.1~ ...
`:
`
`1 CUSTOMER PREMISES
`IS-;
`
`t WIRELESS
`:
`LOCALAREANETWORK(WLAN)
`
`'
`1
`
`I
`I
`I
`I
`I
`I
`I
`14 FTTH
`I
`NETWORK 1
`FIBER
`
`I
`I
`I
`I
`I
`I
`I
`\
`
`-- - - -- - - - - - - - - - _,,.'
`
`I
`
`DISH, Exh. 1003, p. 1
`
`

`
`US 8,879,567 Bl
`Page 2
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`10/2002 Weschler
`6,470,332 Bl
`6,470,389 Bl
`10/2002 Chung et al.
`112003 Cox et al.
`6,510,234 Bl
`12/2003 Mahany
`6,665,536 Bl
`6,721,282 B2
`412004 Motley
`512004 Sasaki et al.
`6,735,699 Bl
`6/2004 Patterson
`6,751,670 Bl
`6,774,926 Bl
`8/2004 Ellis et al.
`912004 Sarkissian et al.
`6,789,116 Bl
`912004 Wentink
`6,791,962 B2
`6,804,779 Bl
`10/2004 Carroni et al.
`6,839,751 Bl
`112005 Dietz et al.
`3/2005 Soderberg et al.
`6,865,605 Bl
`3/2005 Fishman et al.
`6,871,236 B2
`512005 Choi et al.
`6,891,766 B2
`512005 Manis et al.
`6,891,796 Bl
`1112005 Osaka et al.
`6,970,848 B2
`12/2005 Venkatesan et al.
`6,975,743 B2
`112006 Purkayastha et al.
`6,987,985 B2
`7,002,955 Bl
`212006 Kanuri et al.
`212006 Watson et al.
`7,003,131 B2
`3/2006 Vaidyanathan et al.
`7,016,668 B2
`3/2006 Alattar et al.
`7,020,304 B2
`412006 Watson
`7,036,024 B2
`7,039,562 Bl
`512006 Notani et al.
`612006 England et al.
`7,065,607 B2
`10/2006 de Bonet
`7,130,872 B2
`7,149,807 Bl
`12/2006 Kontothanassis
`4/2007 Parekh et al.
`7,203,744 Bl
`8/2007 Digate et al.
`7,263,545 B2
`4/2008 Linder et al.
`7,356,013 B2
`5/2008 Lango et al.
`7,376,790 B2
`7,382,879 Bl*
`6/2008 Miller ........................... 380/201
`9/2008 Thorwirth
`7,430,302 B2
`7,512,973 Bl
`3/2009 Chan et al.
`412009 Ginzburg
`7,522,571 B2
`10/2009 Chesla
`7,607,170 B2
`1112009 Balakrishnan et al.
`7,624,436 B2
`2/2010 Evans
`7,656,849 Bl
`6/2010 Hazra et al.
`7,733,772 B2
`6/2010 Evans
`7,733,908 Bl
`6/2010 Watson et al.
`7,739,658 B2
`8/2010 Guruswamy et al.
`7,769,851 Bl
`9/2010 Geddes et al.
`7,801,945 Bl
`7,895,442 Bl*
`212011 Adams et al. ................. 713/176
`712011 Roberts et al.
`7,983,440 Bl
`7,987,490 B2 *
`712011 Ansari et al. .................... 725/82
`1112011 Evans
`8,054,815 B2
`200110051996 Al
`12/2001 Cooper et al.
`112002 Hitson et al.
`2002100107 59 Al
`112002 Krueger et al.
`2002/0013812 Al
`412002 Kutaragi et al.
`2002/0049580 Al
`512002 Zhang et al.
`2002/0054578 Al
`512002 Dillon
`2002/0061029 Al
`200210104003 Al
`8/2002 Iwamura
`8/2002 Barzilai et al.
`2002/0104015 Al
`8/2002 Novak
`200210104099 Al
`200210107934 Al
`8/2002 Lowery et al.
`2002/0110123 Al*
`8/2002 Shitama ........................ 370/389
`200210114336 Al *
`8/2002 Chow ............................ 370/401
`912002 Devara
`2002/0129367 Al
`200210144267 Al
`10/2002 Gutta et al.
`10/2002 Signes et al.
`200210156842 Al
`1112002 Razdan
`200210168082 Al
`2002/0199203 Al* 12/2002 Duffy et al . ................... 725/109
`112003 Hensgen et al.
`2003/0009769 Al
`2003/0012403 Al
`112003 Rhoads et al.
`2003/0046270 Al
`3/2003 Leung et al.
`2003/0050055 Al
`3/2003 Ting et al.
`2003/0058836 Al*
`3/2003 Even ............................. 370/352
`2003/0081580 Al
`5/2003 Vaidyanathan et al.
`2003/0093665 Al
`5/2003 Cooper et al.
`2003/0110234 Al
`6/2003 Egli et al.
`2003/0145325 Al
`7/2003 Finster et al.
`2003/0152096 Al
`8/2003 Chapman
`
`8/2003 Larsson et al.
`2003/0161268 Al
`2003/0217099 Al
`1112003 Bobde et al.
`112004 Jackson
`2004/0006615 Al
`2004/0008864 Al
`112004 Watson et al.
`112004 Michaelis et al.
`2004/00097 51 Al
`200410010692 Al
`112004 Watson
`200410010694 Al
`112004 Collens et al.
`212004 Andersson et al.
`2004/0030798 Al
`3/2004 Mahany
`2004/0042421 Al
`3/2004 Maissel et al.
`2004/0049787 Al
`412004 Neely et al.
`2004/0070593 Al
`412004 Collens et al.
`2004/0083487 Al
`2004/0086122 Al
`512004 Watson
`512004 Yeager et al.
`2004/0088369 Al
`2004/0088557 Al
`512004 Malcolm et al.
`6/2004 Karaoguz et al.
`200410117824 Al
`2004/0139047 Al
`7/2004 Rechsteiner et al.
`2004/0156528 Al
`8/2004 Joo et al.
`200410187005 Al
`912004 Molaro
`2004/0199630 Al
`10/2004 Sarkissian et al.
`12/2004 Okazaki
`2004/0240405 Al
`2004/0248615 Al
`12/2004 Purkayastha et al.
`2004/0252651 Al * 12/2004 Karlsen et al. ................ 370/264
`2004/0254998 Al
`12/2004 Horvitz
`2004/0263941 Al
`12/2004 Chen et al.
`2004/0264372 Al
`12/2004 Huang
`2004/0267900 Al
`12/2004 Hoekstra et al.
`2005/0008017 Al
`1/2005 Datta et al.
`200510010664 Al
`1/2005 Hubbard
`2005/0030976 Al
`212005 Wentink
`2005/0034001 Al
`212005 Pontarelli
`2005/0036469 Al
`212005 Wentink
`2005/0044422 Al
`212005 Cantrell et al.
`2005/0050103 Al
`3/2005 Kesteloot et al.
`2005/0065891 Al
`3/2005 Lee et al.
`2005/0081042 Al
`412005 Venkatesan et al.
`2005/0086069 Al
`412005 Watson et al.
`2005/0097331 Al
`512005 Majidimehr et al.
`2005/0108769 Al
`512005 Arnold et al.
`2005/0120091 Al
`6/2005 Casais et al.
`2005/0120127 Al
`6/2005 Bradley et al.
`2005/0125405 Al
`6/2005 Watson et al.
`2005/0135305 Al
`6/2005 Wentink
`2005/0143123 Al
`6/2005 Black et al.
`2005/0165828 Al
`712005 Lango et al.
`2005/0169632 Al
`8/2005 Song et al.
`2005/0182989 Al
`8/2005 Zarnke et al.
`2005/0183120 Al
`8/2005 Jain et al.
`2005/0192987 Al
`912005 Marsh
`2005/0201340 Al
`912005 Wang eta!.
`2005/0201726 Al
`912005 Malcolm et al.
`2005/0216942 Al
`912005 Barton
`2005/0220321 Al
`10/2005 Langelaar
`2005/0229246 Al
`10/2005 Rajagopal et al.
`2005/0238012 Al
`10/2005 Panigrahy et al.
`2005/0239497 Al
`10/2005 Bahl et al.
`2005/0251491 Al
`11/2005 Medina et al.
`2005/0281194 Al
`12/2005 Sonoda
`2005/0286438 Al
`12/2005 Rajkotia
`2006/0002377 Al
`112006 Skog et al.
`200610010274 Al
`112006 Olson
`200610015735 Al
`112006 Kudo et al.
`2006/0037077 Al
`212006 Gadde et al.
`2006/0048185 Al
`3/2006 Alterman
`2006/0048186 Al
`3/2006 Alterman
`2006/0050880 Al
`3/2006 Taylor et al.
`2006/0053452 Al
`3/2006 Lee et al.
`2006/0056349 Al
`3/2006 Nakatugawa et al.
`2006/0059560 Al
`3/2006 Montulli
`2006/0072786 Al
`412006 Watson et al.
`2006/0075243 Al
`412006 Lakamp et al.
`2006/0080707 Al
`412006 Laksono
`2006/0085830 Al
`412006 Bruck et al.
`2006/0095401 Al
`512006 Krikorian et al.
`2006/0095471 Al
`512006 Krikorian et al.
`2006/0095472 Al
`512006 Krikorian et al.
`2006/0095792 Al
`512006 Hurtado et al.
`2006/0114832 Al
`612006 Hamilton et al.
`2006/0123235 Al
`612006 Vanstone
`
`DISH, Exh. 1003, p. 2
`
`

`
`US 8,879,567 Bl
`Page 3
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`2006/0127037 Al
`2006/0129672 Al
`2006/0129810 Al
`2006/0133644 Al
`200610156003 Al
`2006/0161776 Al
`200610173794 Al
`2006/0174128 Al
`2006/0182101 Al
`2006/0200416 Al
`2006/0206933 Al
`2006/0215596 Al
`2006/0233101 Al
`2006/0270415 Al
`2006/0277271 Al
`2007/0002742 Al
`2007 /0008978 Al
`2007/0058561 Al
`2007/0061488 Al
`2007/0061580 Al
`2007/0064643 Al
`200710110080 Al
`2007/0133673 Al
`2007 /0214237 Al
`2007 /0223437 Al
`2007 /0282847 Al
`2 00 8/ 00440 87 A 1
`2009/0037388 Al
`2009/0067328 Al*
`2009/0137009 Al*
`2009/0287837 Al
`2010/0174770 Al
`2011100877 50 Al
`
`612006 Van Hoff et al.
`612006 Mayer
`612006 Jeong et al.
`612006 Wells et al.
`712006 Zhang et al.
`712006 Van Der Veen et al.
`8/2006 Sellars et al.
`8/2006 Yuval
`8/2006 Hoekstra et al.
`912006 White et al.
`912006 Molen et al.
`912006 Krishnaswarny et al.
`10/2006 Luft et al.
`1112006 Waxman
`12/2006 Morse et al.
`112007 Krishnaswarny et al.
`112007 Pirzada et al.
`3/2007 Virgile
`3/2007 Alagappan et al.
`3/2007 Venkatesan et al.
`3/2007 Tavares
`5/2007 Bennett
`6/2007 Imaizumi
`9/2007 Stibel et al.
`9/2007 Virgile
`12/2007 Gwozdz
`2/2008 Levy et al.
`212009 Cooper et al.
`370/230. l
`3/2009 Morris et al.
`512009 Lai et al. ....................... 435/101
`1112009 Felsher
`7/2010 Pandya
`412011 Gwozdz
`
`OTHER PUBLICATIONS
`
`Author Unknown, "Double 108Mbps Wireless PC Card (WG5 l l U),
`Netgear, Inc.," PC Connection, 2006, http://http://www.pcconnec(cid:173)
`tion.com/ProductDetail?sku~5373172&SourceID~k40132,
`accessed on Apr. 5, 2006, 2 pages.
`Author Unknown, "Gefen-HDMI CAT-5 Extreme," User Manual,
`Gefen Inc., 2006, 16 pages.
`Author Unknown, "Global-Link Product Manual," Logical Solutions
`Inc., Copyright 2003, Revision C, Jan. 2005, 68 pages.
`Author Unknown, "Global-Link: KYM over IP," Thinklogical LLC,
`http://www. thinklogical .corn/products/ globalLink. php,
`accessed
`Jul. 13, 2007, 1 page.
`Author Unknown, "HDTV Extender: Extend a HDTV display and
`speakers up to 600 feet from a YPbPr component video source," NTI,
`2005, 2 pages.
`Author Unknown, "Introducing the World's First 'Legal' HDMI Dis(cid:173)
`tribution Amp with HDCP on Every Port!", PureLink Digital
`Extender, Dtrovision LLC, http://www.dtrovision.com, accessed Jul.
`13, 2007, 2 pages.
`Author Unknown, "Kaleidescape Home Page", Kaleidescape, Inc.,
`http://www.kaleidescape.com, accessed Jul. 13, 2007, 1 page.
`Author Unknown, "MediaMax Overview", Axonix Corporation,
`http://www.axonix.com/mediarnax/, accessed Jul. 13, 2007, 2 pages.
`
`Author Unknown, "Series 2 TiVo Home Media Features Guide,"
`TiVo Inc., 2005, 47 pages.
`Author Unknown, "ST-CSDVI-150:150 foot DVI Video Extender,
`"Installation and Operation Manual, Software Version 1.2, Network
`Technologies Inc., 2006, Manual 063 Revision, Oct. 16, 2006, 11
`pages.
`Author Unknown, "Yahoo! Messenger," Yahoo! Inc., 2007, http://
`messenger.yahoo.corn/chat.php, accessed Jan. 9, 2007, 2 pages.
`Degermark, M. et al., "Low-loss TCP/IP Header Compression for
`Wireless Networks," MOBICOM '96, Proceedings of the Second
`Annual International Conference on Mobile Computing and Net(cid:173)
`working, Rye, New York, USA, Nov. 10-12, 1996, ACM 1996, 14
`pages.
`Dittmann, J. et al., "Robust MPEG Video Watermarking Technolo(cid:173)
`gies," ACM Multimedia, Bristol, UK, Aug. 1998, pp. 71-80.
`Fridrich, J., "Applications of Data Hiding in Digital Images," Tutorial
`for the ISPACS '98 Conference in Melbourne, Australia, Nov. 4-6,
`1998, 33 pages.
`Judge, P. et al., "WHIM: Watermarking Multicast Video with a Hier(cid:173)
`archy of Intermediaries," Computer Networks: The International
`Journal of Computer and Telecommunications Networking, Aug. 21,
`2002, vol. 39, Issue 6, pp. 699-712.
`Klyne, G. et al., "Composite Capability/Preference Profiles (CC/PP):
`Structure and Vocabularies 1.0," W3C Recommendation Jan. 15,
`2004, W3C, 2004, http://www.w3.org/TR/2004/REC-CCPP-struct(cid:173)
`vocab-20040115/, accessed Jan. 9, 2007, 61 pages.
`Koch, E. et al., "Towards Robust and Hidden Image Copyright Label(cid:173)
`ing," IEEE Workshop on Nonlinear Signal and Image Processing,
`presented Jun. 20-22, 1995, pp. 452-455.
`Raisinghani, V., "ECLAIR: An Efficient Cross Layer Architecture for
`Wireless Protocol Stacks," 5th World Wireless Congress, San Fran(cid:173)
`cisco, CA, May 25-28, 2004, 6 pages.
`Setton, E. et al., "Cross-Layer Design of Ad Hoc Networks for
`Real-Time Video Streaming," IEEE Wireless Communications, Aug.
`2005, vol. 12, Issue 4, pp. 59-65.
`Srivastava, V. et al., "Cross-Layer Design: A Survey and the Road
`Ahead," IEEE Communications Magazine, Dec. 2005, vol. 43, Issue
`12, pp. 112-119.
`Starn, N., "Router-Based Parental Controls," PC Magazine, Aug. 3,
`2004, Ziff Davis Publishing Holdings Inc., http://www.pcmag.com/
`article2/0,l 759, 1619375,00.asp, accessed Jan. 9, 2007, 6 pages.
`Advisory Action for U.S. Appl. No. 111475,360, mailed Sep. 7, 2010,
`3 pages.
`Final Office Action for U.S. Appl. No. 111475,360, mailed Oct. 15,
`2009, 13 pages.
`Final Office Action for U.S. Appl. No. 111475,360, mailed Jun. 24,
`2010, 17 pages.
`Non-final Office Action for U.S. Appl. No. 111475,360, mailed Apr.
`15, 2009, 10 pages.
`Non-final OfficeActionforU.S.Appl. No.111475,360,mailedJan. 5,
`2010, 11 pages.
`Notice of Allowance for U.S. Appl. No. 111475,360, mailed Jan. 12,
`2011, 6 pages.
`Notice of Allowance for U.S. Appl. No. 111475,360, mailed Sep. 27,
`2011, 7 pages.
`IEEE Computer Society, "IEEE: Amendment 8: Medium Access
`Control (MAC) Quality of Service Enhancements", IEEE Std 802.
`l le, Nov. 11, 2005, 221 pages, Institute of Electrical and Electronics
`Engineers, Inc., New York, NY
`* cited by examiner
`
`DISH, Exh. 1003, p. 3
`
`

`
`10~
`
`1----
`1
`I
`I
`1 CUSTOMER PREMISES
`18
`~
`
`FTTH
`NETWORK
`FIBER
`
`20
`1000 Bt
`
`NETWORK
`INTERFACE
`
`---------
`
`-
`
`-
`
`-
`
`FIG. 1
`
`~
`00 .
`
`~
`~
`~
`
`~ = ~
`
`~
`
`z 0
`~ ...
`0 .... ...
`
`N
`
`('D
`('D
`
`1J1 =(cid:173)
`.....
`....
`0 ..... ...
`
`d
`rJl
`00
`Oo
`-....l
`\C u.
`-....l = "'""
`
`0--,
`
`I
`I
`I
`I
`I
`
`I
`I
`I
`I
`I
`I
`I
`I
`- _I
`
`I
`I
`I
`I
`I
`I
`I
`
`28
`
`USER
`DEVICE
`\ , ______ _
`_____ ,,,
`
`DISH, Exh. 1003, p. 4
`
`

`
`NON-SECURE r38
`DATA
`CACHE
`
`<:=::>
`c::>
`C>
`
`0
`
`ADAPTABLE CROSS-LAYER
`OFFLOAD ENGINE
`
`{32
`
`1000 Bt
`ETHERNET
`NIC
`
`GATEWAY OS
`
`56
`
`~
`00 .
`
`~
`~
`~
`
`~ = ~
`
`SECURE
`DATA
`CACHE
`
`40
`
`{34
`
`__.
`
`802.11X
`RADIO(S)
`
`30
`
`~
`
`~
`
`z 0
`~ ...
`0 .... ...
`
`N
`
`I _1
`
`100061 IE
`
`ETHERNET
`SWITCH
`
`1J1 =-('D
`.....
`N
`
`('D
`
`0 ..... ...
`
`42-.
`
`44-.1
`
`IDS RULES
`
`ยต
`
`46
`
`48
`
`ORM ENCODER/DECODER r
`
`50
`
`52
`
`I
`
`1
`
`ORM RULES
`
`DES ENCRYPTION/DECRYPTION
`
`CONTENT RULES
`
`FILE FORMAT CONVERSION
`
`54
`
`FIG.2
`
`d
`rJl
`00
`Oo
`-....l
`\C u. 0--,
`-....l = """"
`
`DISH, Exh. 1003, p. 5
`
`

`
`0
`
`0
`
`~ c::::>
`
`<:=::>
`r-..
`<:=::>
`~ C> ooo
`11--~-N-ON--S-E-CU_R_E_C-AC_H_E~____,l..--~~S-EC_U_R_E-CA-C-HE~~------.I ~ o
`..--R-U-LE----.
`CHECK
`ENG IN E
`42
`
`:::::X:::
`:::::X:::
`FTP
`FILE CONVERSION
`ORM ENCODING/DECODING
`:::::x:::
`:::::x:::
`:::::x:::
`I T~S I
`I
`
`TCP
`
`UDP
`
`UDP FLOWS
`
`o
`
`~
`
`I ~
`
`LAYER 4 I
`OFFLOAD l LAYER 3
`
`ENGINE
`30
`
`IP
`:::::x:::
`
`IP ROUTER
`:::::x:::
`
`66
`
`LAYER 2
`
`-------I
`
`ETHERNET SWITCH
`SMART MAC
`SIMPLE MAC
`:::::x:::
`:::::x:::
`:::::x:::
`:::::x:::
`:::::x:::
`:::::x:::
`LAYER 1 I 1000 Bt
`I 1000 Bt
`I 1000 Bt
`802.11n
`802.11n
`802.11n
`802.11n
`t
`t
`
`..._____ ____ [~N
`
`WAN]
`
`FIG. 3
`
`~
`00 .
`
`~
`~
`~
`
`~ = ~
`
`z 0
`
`~
`~.i;...
`N
`
`0 ....
`
`.i;...
`
`1J1 =(cid:173)
`.....
`
`('D
`('D
`
`(.H
`
`0 .....
`
`.i;...
`
`d
`rJl
`00
`Oo
`-....l
`\C u. 0--,
`-....l = "'""
`
`DISH, Exh. 1003, p. 6
`
`

`
`,..,,."'"'
`
`I
`I
`
`.,"
`I
`I "
`I"
`
`CROSS-LAYER MESSAGING MATRIX
`
`I
`I
`
`I
`
`,,,.. .
`..
`
`"
`
`...
`
`,, ...
`
`I
`
`"
`
`I
`I
`I
`I
`
`I ..
`......
`
`SNMP-",..., ...
`
`I
`I
`I
`
`I
`I
`I
`I
`
`f
`t
`RSVP AND/OR
`DIFFSERV OTHER ROUTING
`PROTOCOLS
`
`' ' ' '
`
`' ,
`'
`
`,~
`,'
`,
`/ /
`MATRIX
`CONTROL,/
`~,'
`
`'BO
`'82
`'78
`'-----~----------J-----------~-----------'
`WAN
`I
`I I
`FIG. 4
`
`I
`
`I
`
`I
`
`I
`
`I
`
`/
`
`I
`
`WLAN
`
`~
`00 .
`
`~
`~
`~
`
`~ = ~
`
`~
`
`z 0
`~ ...
`0 .... ...
`
`N
`
`('D
`('D
`
`1J1 =(cid:173)
`...... ...
`0 ..... ...
`
`d
`rJl
`00
`Oo
`-....l
`\C u.
`-....l = "'""
`
`0--,
`
`l
`
`DISH, Exh. 1003, p. 7
`
`

`
`US 8,879,567 Bl
`
`1
`HIGH-SPEED WAN TO WIRELESS LAN
`GATEWAY
`
`RELATED APPLICATIONS
`
`The present application is a continuation of U.S. applica(cid:173)
`tion Ser. No. 11/475,360, filed Jun. 27, 2006, the disclosure of
`which is hereby incorporated by reference herein in its
`entirety.
`
`FIELD OF THE INVENTION
`
`The present invention relates to a gateway device and more
`particularly relates to a gateway device interconnecting a high
`speed Wide Area Network (WAN) to a lower speed Wireless
`Local Area Network (WLAN).
`
`BACKGROUND OF THE INVENTION
`
`2
`non-secure cache to the secure cache and thereafter transmit(cid:173)
`ted to an appropriate user device in the WLAN at a lower data
`rate of the WLAN.
`Prior to transmitting the data, the gateway may also per-
`form additional functions such as, but not limited to, file
`format conversion, Digital Rights Management (DRM)
`encoding or decoding, and Data Encryption Standard (DES)
`encryption or decryption.
`Those skilled in the art will appreciate the scope of the
`present invention and realize additional aspects thereof after
`reading the following detailed description of the preferred
`embodiments in association with the accompanying drawing
`figures.
`
`BRIEF DESCRIPTION OF THE DRAWING
`FIGURES
`
`5
`
`10
`
`15
`
`The accompanying drawing figures incorporated in and
`20 forming a part of this specification illustrate several aspects of
`the invention, and together with the description serve to
`explain the principles of the invention.
`FIG. 1 illustrates a system including an adaptable cross(cid:173)
`layer gateway for interconnecting, or bridging, a high speed
`25 Wide Area Network (WAN) to a lower speed Wireless Local
`Area Network (WLAN) according to one embodiment of the
`present invention;
`FIG. 2 is a block diagram of the adaptable cross-layer
`gateway of FIG. 1 according to one embodiment of the
`present invention;
`FIG. 3 is an exemplary protocol stack representation of the
`adaptable cross-layer gateway according to one embodiment
`of the present invention; and
`FIG. 4 illustrates an exemplary cross-messaging matrix
`35 controlled to provide a complete protocol stack having a
`cross-layer architecture for a network connection imple(cid:173)
`mented by the adaptable cross-layer gateway according to
`one embodiment of the present invention.
`
`DETAILED DESCRIPTION OF THE PREFERRED
`EMBODIMENTS
`
`The embodiments set forth below represent the necessary
`information to enable those skilled in the art to practice the
`invention and illustrate the best mode of practicing the inven(cid:173)
`tion. Upon reading the following description in light of the
`accompanying drawing figures, those skilled in the art will
`understand the concepts of the invention and will recognize
`applications of these concepts not particularly addressed
`herein. It should be understood that these concepts and appli(cid:173)
`cations fall within the scope of the disclosure and the accom-
`panying claims.
`FIG.1 illustrates a system 10 including an adaptable cross(cid:173)
`layer gateway 12 interconnecting, or bridging, a high speed
`55 WAN 14 and a lower speed WLAN 16 according to one
`embodiment of the present invention. In addition, as dis(cid:173)
`cussed below, the gateway 12 offloads data to data caches in
`order to take advantage of the high data rate provided by the
`high speed WAN 14. In addition, by using cross-layering
`60 techniques, the gateway 12 improves the performance of the
`WLAN 16 in order to take further advantage of the high speed
`WAN 14. The gateway 12 may be implemented in hardware
`or a combination of hardware and software. For example, the
`gateway 12 may include one or more Application Specific
`65 Integrated Circuits (AS I Cs), one or more Digital Signal Pro(cid:173)
`cessors (DSPs), one or more Field Programmable Gate
`Arrays (FPGAs ), or the like.
`
`Historically, residential gateways provided a routing func(cid:173)
`tion from an in-home Local Area Network (LAN) to a Wide
`Area Network (WAN) based Asynchronous Digital Sub(cid:173)
`scriber Line (ADSL) or Data Over Cable Service Interface
`Specification (DOCSIS) connection. Bandwidth available
`from the WAN ranged from 200 kbps to 6 Mbps. The LAN
`side of the gateway was either a single or multiple 10/100 Bt
`Ethernet connections serving client computers. Eventually,
`these Ethernet connections were replaced with wireless IEEE
`802.11 b/a/g LAN s operating from 6 to 50 Mbps. The smaller 30
`bandwidth capabilities of the WAN versus the LAN kept
`downstream traffic flow simple in the gateway. Upstream
`traffic from the LAN to WAN was seldom an issue because
`users were less sensitive to this bottleneck. A typical upstream
`bottleneck scenario would be sending an email with a large
`attachment. In this situation, the Transfer Control Protocol
`(TCP) service of the gateway would simply throttle the LAN
`connection to the appropriate speed for the WAN.
`With the advent of Fiber-to-the-Home (FTTH) networks,
`the traditional scenario described above has been reversed. In 40
`a FTTH network, a high speed FTTH data connection is
`provided to the residential gateway. The FTTH data connec(cid:173)
`tion provides data rates in the range of 1 to 10 Gbps. In
`contrast, the proposed IEEE 802.1 ln standard for wireless
`LAN s provides data rates in the range ofl 00 to 500 Mbps. As 45
`such, the traditional residential gateway architecture will
`limit overall performance to the wireless LAN bandwidth,
`thereby negating much of the value of the FTTH connection.
`Thus, there is a need for an improved residential gateway
`architecture for interconnecting a high speed WAN to a lower 50
`speed wireless LAN.
`
`SUMMARY OF THE INVENTION
`
`The present invention relates to a gateway interconnecting
`a high speed Wide Area Network (WAN) and a lower speed
`Wireless Local Area Network (WLAN). The high speed
`WAN is preferably connected to the gateway via a Fiber-to(cid:173)
`the-Home (FTTH) connection and associated FTTH modem.
`In general, the gateway includes an adaptable cross-layer
`offload engine operating to manage bandwidth between the
`high speed WAN and the lower speed WLAN. As data enters
`the gateway from the WAN at the high speed data rate of the
`WAN, the offload engine stores the data in a non-secure data
`cache. A rule check engine performs a stateless or stateful
`inspection of the data in the non-secure data cache. Once
`inspected by the rule check engine, the data is moved from the
`
`DISH, Exh. 1003, p. 8
`
`

`
`US 8,879,567 Bl
`
`3
`The WAN 14 may be a distributed public access network
`such as the Internet. Preferably, the WAN 14 provides a Fiber(cid:173)
`to-the-Home (FTTH) connection to a customer premises 18,
`which in this example includes a network interface 20, the
`gateway 12, and the WLAN 16. FTTH generally refers to a 5
`broadband network where a fiber-optic connection is pro(cid:173)
`vided to the home. The FTTH connection provides data rates
`equal to or greater than 1 Gigabit per second (Gbps). For
`example, the FTTH connection may provide data rates in the
`range of and including 1 to 10 Gbps. The network interface 20 10
`may be a FTTH modem providing an interface between the
`FTTH connection and the gateway 12. In this exemplary
`embodiment, the network interface 20 provides an optical to
`electrical Gigabit Ethernet connection (1000 Bt) to the gate(cid:173)
`way 12. It should be noted that while the preferred high speed 15
`connection to the WAN 14 is the FTTH connection discussed
`herein, the present invention is not limited thereto. The gate(cid:173)
`way 12 of the present invention may be used to interconnect,
`or bridge, any high speed WAN to a lower speed LAN regard(cid:173)
`less of the type of connection provided to the WAN. For 20
`example, the gateway 12 may interconnect an OC-192
`(9.95328 Gbps) or 10 Gigabit Ethernet WAN to a multiport
`Gigabit Ethernet (1000 Bt) lower speed LAN.
`The WLAN 16 may operate, for example, according to one
`or more of the suite of IEEE 802.11 standards such as the 25
`IEEE 802.1 la, IEEE 802.11 b, IEEE 802.1 lg, or the proposed
`IEEE 802.1 ln standards. The WLAN 16 is formed by the
`gateway 12 and a number of user devices 22-28 each having
`a wireless interface. The user devices 22-28 may be, for
`example, personal computers, Personal Video Recorders 30
`(PVRs), Personal Digital Assistants (PDAs), other Internet
`Protocol (IP) appliances, or the like, or any combination
`thereof.
`FIG. 2 is a more detailed block diagram of the gateway 12
`according to one embodiment of the present invention. At the
`heart of the gateway 12 is an adaptable cross-layer offload
`engine 30 that manages bandwidth, or traffic flow, between
`the WAN 14 and the WLAN 16. The offload engine 30 utilizes
`cross-layer functionality and is configurable to adapt to vary(cid:173)
`ing conditions in the WLAN 16. The offload engine 30 is
`preferably implemented in hardware, but may alternatively be
`implemented in software or a combination of hardware and
`software.
`The offload engine 30 is communicatively coupled to the
`WAN 14 via, in this example, a Gigabit Ethernet Network
`Interface Card (NIC) 32, which is connected to the WAN 14
`(FIG. 1) via the network interface 20. The NIC 32 may gen(cid:173)
`erally be referred to as a high speed network interface. The
`offload engine 30 is communicatively coupled to the WLAN
`16, and more specifically the user devices 22-28 in the WLAN
`16, via one or more wireless radios 34. In this example, the
`wireless radios 34 are IEEE 802.1 ln wireless radios. How(cid:173)
`ever, the present invention is not limited thereto. The gateway
`12 may also include an Ethernet switch 36 or the like provid(cid:173)
`ing one or more wired connections to additional LAN
`devices.
`The gateway 12 also includes a non-secure data cache 38
`and a secure data cache 40. The non-secure and secure data
`caches 38 and 40 are used to buffer data as needed by the
`offload engine 30. While illustrated separately, the data
`caches 38 and 40 may be implemented in a single physical
`cache where, for example, flags are used to identify secure
`and non-secure data. The non-secure data cache 38 is used to
`store received data from the WAN 14 for inspection and
`processing prior to forwarding the data to the WLAN 16. The
`non-secure data cache 38 may also be used to buffer large data
`sets from the WLAN 16 waiting for transmission over the
`
`4
`WAN 14. By buffering data in the non-secure data cache 38,
`the gateway 12 is enabled to take advantage of the full band(cid:173)
`width provided by the FTTH connection. The secure data
`cache 40 is used to temporarily store data from the non-secure
`data cache 38 that has been inspected and cleared for trans(cid:173)
`mission prior to transmission to the user devices 22-28 in the
`WLAN16.
`A rule check engine 42 operates to inspect the data in the
`non-secure data cache 38 according to a number of rules,
`which in this example include Intrusion Detection System
`(IDS) rules 44, Digital Rights Management (DRM) rules 46,
`and other general or specific content rules 48. The rule check
`engine 42 may perform stateless inspection, stateful inspec(cid:173)
`tion, or both stateless and stateful inspection. The IDS rules
`44 are generally rules for detecting malicious network traffic
`and may include, for example, typical firewall rules. The
`DRM rules 46 may be rules for protecting media files, such as
`videos, songs, and images, stored on the user devices 22-28
`within the WLAN 16 when transmitted over the WAN 14. In
`addition, the DRM rules 46 may include rules for identifying
`incoming content to be encoded as a security feature to pre(cid:173)
`vent unauthorized viewing of the specified content by, for
`example, children within the WLAN 16. The content rules 48
`may include rules regulating the types of content that may be
`accessed by the user devices 22-28 within the WLAN 16. In
`addition, as discussed below, the rule check engine 42 may
`inspect the data passing through the gateway 12 based on
`rules for triggering additional functions provided by the gate(cid:173)
`way 12.
`The gateway 12 may also include various additional func-
`tional components such as, but not limited to, a DRM
`encoder/decoder 50, a Digital Encryption System (DES)
`encryption/decryption function 52, and a file format conver(cid:173)
`sion function 54. The functions 50-54 may be triggered either
`35 directly or indirectly by the rule check engine 42 based on
`associated rules used to inspect data passing through the
`gateway 12.
`The DRM encoder/decoder 50 may be implemented in
`hardware, software, or a combination of hardware and soft-
`40 ware, and may be used to protect content transmitted over the
`WAN 14 from the user devices 22-28 within the WLAN 16. In
`addition or alternatively, the DRM encoder/decoder 50 may
`be used in conjunction with firewall technology to create a
`security feature that prevents unauthorized viewing of speci-
`45 fied content on the user devices 22-28. More specifically, in
`the outgoing direction, the DRM encoder/decoder 50 may
`operate to encode content leaving the WLAN 16. For
`example, personal videos, songs, images, or the like stored by
`the user devices 22-28 may be encoded by the DRM encoder/
`50 decoder 50 such that only desired recipients may view or play
`the content. As for incoming content, the DRM encoder/
`decoder 50 may, for example, encode specified types of con(cid:173)
`tent from the WAN 14 to prevent unauthorized viewing by, for
`example, children. License keys could be distributed by the
`55 gateway 12 to appropriate user devices 22-28 to unlock the
`encoded content. It should be noted that the present invention
`is not limited to DRM encoding or decoding. Other types of
`encoding and decoding may be used as desired.
`The DES encryption/decryption function52 may be imple-
`60 mented in the wireless radios 34. However, the present inven(cid:173)
`tion is not limited thereto. The DES encryption/decryption
`function 52 operates to provide encryption and decryption of
`data transmitted over the WLAN 16 as commonly understood
`in the art. Additionally, DES and DRM may share the same
`65 encryption/decryption functions.
`The file format conversion function 54 may be imple(cid:173)
`mented in hardware, software, or a combination of hardware
`
`DISH, Exh. 1003, p. 9
`
`

`
`US 8,879,567 Bl
`
`5
`and software, and may be used to reduce the size of or other(cid:173)
`wise adapt incoming content in order to reduce the bandwidth
`required to transfer the content to the appropriate user devices
`22-28. More specifically, the file format conversion function
`54 may convert the content from a first file format to a second 5
`file format having reduced bandwidth requirements, reduce
`the quality of the content, or both. For example, the file format
`conversion function 54 may convert a Motion Pictures
`Experts Group (MPEG) Layer 2 (MPEG-2) video file to a
`MPEG Layer 4 (MPEG-4) video file, thereby reducing the 10
`bandwidth required to transfer the video file over t

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket