throbber
.
`-
`
`PTO/SB/16 (07-05)
`Approved for use through 07/31/2006. OMB 0651-0032
`US.Patent and Trademark Office; U.S. DEPARTMENT OF COMMERCE
`Underqhe Paperwork Reduction Act of 1995, no persons are required to respond to a collection of information unless it displays a valid OMB contro! number.
`PROVISIONAL APPLICATION FOR PATENT COVER SHEET
`,, This is a request for filing a PROVISIONAL APPLICATION FOR PATENTunder 37 CFR 1.53(c).
`press Mail Nabel No. EV 711413775 US
`
`.
`
`-
`
`_o—> F
`
`X
`
`GOLZOLi
`
`:
`INVENTOR(S
`Wen Name(first and middle {ifany])|Family Name or Sumame Residence
`
`vu
`City
`and either State or Foreign Count
`
`fe “_one |
`
`
`
`Additional inventors are being named on the __ separately numbered sheets attached hereto
`TITLE OF THE INVENTION(500 characters max
`
`WIRELESS BROADBAND BY CENTRALLY MANAGEDPEER TO PEER NETWORKING
`
`CORRESPONDENCE ADDRESS
`Direct all correspondenceto:
`x
`The address corresponding to Customer Number:
`021971
`
`OR
`
`C] Firm or
`Individual Name
`Address
`
`:
`
`PTO8918
`3
`yU.S
`D8 )/2
`ry1
`
`02105
`
`State
`Telephone
`
`ais
`
`ip
`ax
`
`
`
`ENCLOSED APPLICATION PARTS(check ail that apply)
`() Application Data Sheet. See 37 CFR 1.76
`1 CD(s), Number
`[X] Specification Number ofPages
`_17
`() Other(specify)
`(J Drawing(s) Number ofSheets
`
`
`
`
`
`
`
`
`
`Fees Due: Filing Fee of $200 ($100 small entity). If the specification and drawings exceed 100 sheets of paper,the application size fee
`is also due which is $250 ($125 for small entity) for each additional 50 sheets or fraction thereof. See 35 U.S.C. 41(a)(1)(G) and 37
`CFR 1.16(s).
`METHOD OF PAYMENTOFFILING FEES AND APPLICATION SIZE FEE FOR THIS PROVISIONAL APPLICATION FOR PATENT
`
`TOTAL FEE AMOUNT(8)
`100.00
`
`{J Applicant claims small entity status. See 37 CFR 1.27.
`() Acheck or moneyorderis enclosed to coverthe filing fee and application size fee (if applicable).
`(] Payment by credit card. Form PTO-2038 is attached.
`{]
`TheDirector is hereby authorized to chargefiling fee and applicable size fee (if applicable) or credit any overpayment to Deposit
`Account Number:
`_23-2415_. A duplicative copy of this form is enclosed for fee processing.
`The invention was made by an agency of the United States Governmentor undera contract with an agency of the United States Government.
`& No.
`
`(J Yes, the nameofthe UAGove Pa ent agency and the Government contract number(s)are:
`
`
`
`g|/ / .
`
`SIGNATURE
`aha\
`Date:
`October 21, 2005
`
`TYPED or PRINTED NAME REGISTRATION NO._39,666__U.P. Peter En
`
`(ifappropriate)
`
`TELEPHONE._650-493-9300 Docket Number: __32354-702.101
`
`
`
`
`
`
`
`USE ONLY FOR FILING A PROVISIONAL APPLICATION FOR PATENT
`This collection of information is required by 37 CFR 1.51. The information is required to obtain or retain a benefit by the public whichis to file (and by the USPTO
`to process) an application. Confidentiality is governed by 35 U.S.C. 122 and 37 CFR 1.11 and 1.14. This collection is estimated to take 8 hours to complete,
`including gathering, preparing, and submitting the completed application form to the USPTO. Timewill vary depending upon the individual case. Any comments
`on the amount oftime you require to complete this form and/or suggestions for reducing this burden, should be sent to the Chief Information Officer, U.S. Patent
`and Trademark Office, U.S. Department of Commerce, P.O. Box 1450, Alexandria, VA 22313-1450. DO NOT SEND FEES OR COMPLETED FORMSTO THIS
`ADDRESS. SEND TO: Commissioner for Patents, P.O. Box 1450, Alexandria, VA 22313-1450.
`
`Ifyou need assistance in completing theform, call 1-800-PTO-9199 and select option 2.
`
`CANrPortbAPALIBI\LCV\2747202_1.DOC
`
`1
`
`APPLE 1007
`
`1
`
`APPLE 1007
`
`

`

`WSGRDocket No. 32354-702.101
`
`PROVISIONAL PATENT APPLICATION
`
`WIRELESS BROADBAND BY CENTRALLY MANAGED
`
`PEER TO PEER NETWORKING
`
`Inventor(s):
`
`Shimon Scherzer,
`Citizen of United States, Residing at
`23185 Old Santa Cruz Hwy
`Los Gatos, CA 95033
`
`Wilson Sonsini Goodrich & Rosati
`PROFESSIONAL CORPORATION
`
`650 Page Mill Road
`Palo Alto, CA 94304
`(650) 493-9300
`(650) 493-6811
`
`’ Express Mail Label No. EV 711413775 US
`
`Confidential and Proprietary
`
`CANrPortbPALIB1\LCW2747392_1.D0C
`
`2
`
`

`

`0 Table of Contents
`
`0=Table of Contents .0..........ccccscsssesssssssserecseessessensessecncnesecsnenensesessesssessenonssates 1
`
`1
`
`IMBOCUCTION ..... 2... eee ce csessesesnectecssnssecoesesensnssscccneeseecescesersesesssesenseaneaseesanssaues 2
`
`2=BaSic Principle... esssssssssssssssssssrecsssnenssececonaeessnesnenseseneeeetenecensssersanes 4
`
`3
`
`Embodiment example ................:cccccccccsseeeseceeeeetseececcccerscesssscsssesssesssscaneerers 5
`
`4=SySteM COMPONENS ............scssseeecssssseeeoeeesesesssenssesssesecssncnsenssseseaesssceeenenens 7
`
`4.1
`4.2
`4.3.
`
`GEMMELL 0... eee ccc eesesececceeeueneeecceceaeseceeseuaeneccueseeeeeseceseuecseeceeueueetesenenens 7
` ClIOnt OPErAations ........... cc eccecsssessessssssssesssseeeeecesceeeeeeeeeeaauecceeseeeeeeeeees 7
`Network controller operations. ...............ccceecsssesesnensensseeeeceeeeeesseesseeesesesees 9
`
`
`
`(5—-Trunking Option..........ssssscssscsssescsssssecssenssrescesseessseenseessanenssseseeeanensensuenens 10
`
`5.1.
`5.2
`5.3
`
`Uplink Trunking (client to serving network)...................c0c0scccesseeeeseeswe 10
`Downlink Trunking.............,.ececceeeeceeeeeeeeeeeeeeeetenenees cessecsaeerereesstesesneneeess 12
`Client to client communications using range extendef’s..............:.e 12
`
`Special case: voice centric MEtWOFKS.........sssccsssesesesssssecsssessesssesenseceses 12
`
`PerFOrMane «0.0... cecessesseescesentsneesseneneesenetanensesunanacsenseserecseaeseneseneeaeasarsesees 14
`
`6
`
`7
`
`Confidential and Proprietary
`
`1
`
`8-6-05
`
`CANrPortbPALIB 1\LCW\2747392_1.DOC
`
`3
`
`

`

`1
`
`Introduction
`
`Providing ubiquos broadband wireless service anywhere is becoming the next -
`big challengefor the cellular industry. Multiple technologies are being promoted
`as potential solutions: 1XEVDO, UMTS, WiMax and others. Broadband wireless
`will become popular onlyif:
`
`1. Quality of service is similar to quality of current wire-line services (DSL,
`cable).
`
`2. The service is ubiquous (everywhere); this is the real advantage of
`wireless..
`
`3. Customers’ expenditure on communication will not grow (as least not
`substantially)
`
`Noneof technologies mentioned above can provide an economical ubiquous
`coverage while using traditional deployment methods dueto lack of spectrum;
`path loss (basic physics). Figure 1 demonstrate the “wireless reality” in urban
`environment: the probability of a good connectinglink is quite low due to
`buildings obstructions. Furthermore, in comparison to wire-line capacity at
`the amountoftraffic that can be supported by any imaginable wireless
`
`service is minuscule.
`
`Toillustrate the problem let consider PCS voice services: PCS networkis already
`quite densely deployed (in urban areas the cells are few hundreds yards apart,
`andstill voice quality is marginal. While voice service requires only about 10Kb/s
`data rate, broadbandservice will need two order of magnitude higher data rate
`which creates a two order of magnitude challenge gap.
`
`Broadband services are currently provided by DSL and cable technologies.
`Typical bandwidth required per 2000 subscribers (similar to a typical cellular cell
`site population) in peak time is about 150Mb/s (at DISLAM uplink). This is way
`higher than any of wireless broad band technologies mentioned above can
`deliver (typical spectrum allocation).
`
`This gap cannot be resolved only bytraditional methods:
`
`e
`
`Increasing deployment density by more than order of magnitude; the cost
`(CAPEX and especially OPEX)will render the service non-economical.
`
`e Antenna technology or “smart antenna”present cost challenge and may
`bridge only small fraction of the gap.
`
`Confidential and Proprietary
`
`2
`
`8-6-05
`
`CANrPortbAPALIB1\LCW2747392_1.D0C
`
`4
`
`

`

`e WiFi static mesh networks require even higher deployment density due to
`transmission powerlimits, radio interference and lowefficiency.
`Consequently they are limited to certain areas and cannot provide for
`ubiquity. These networks (although being experimented by some
`municipalities) cannotjustify themselvesin the long run due to high OPEX
`(need to serve equipmentin many locations)
`
`e Ad-hoc mesh-networks. This approach is aimed to extend the coverage of
`wireless network without adding moreinfrastructure equipment.
`Subscriber terminals canrelaytraffic form traffic sources to terminals that
`are not in range of the serving network hencerangeis effectively —
`multiplied. The down side of this approachisin its inherentinstability:
`critical control signaling is handled over unreliable connections. Ad-hoc |
`mesh networkrouting is calculated through a converging process;
`neighboring nodes are exchanging routing info and routing is repeatedly
`calculated until an optimal solution is found. Once a node becomes
`unavailable (due to power shutdown, radio interference, traffic congestion,
`location change etc.) it would take a considerable time for the system to
`recover.
`If this happen frequently, the system maynot be able to recover
`at all. Hence ad-hoc mesh network has never becomea realalternative to
`fixed infrastructure.
`
`
`
`Figure 1: The “wireless reality”
`
`Confidential and Proprietary
`
`3
`
`‘
`
`8-6-05
`
`C:\NrPortbi\PALIB1\LCV\2747392_1.DOC
`
`BEST AVAILABLE COPY
`
`5
`
`

`

`2 Basic principle
`
`Weconsider a wireless communication network whose aim is to provide high
`speed data to mobile users. The networkconsists of a variety of mobile hand-
`held (ex. cell phones, PDAs) andstationary devices (ex. WiFi access points)
`equipped with wireless transceivers. Each of these devices is capable of wireless
`communications with neighboring devices within communication range. Wewill
`refer to these as “internal connections". Someof these devices also
`communicate via high speedwirelesslinks (ex. 1XEVDO, UMTS, GPRS, EDGE.
`WiMax) or other means(ex. DSL, cable,fiber) with data sources outside the
`network(i.e. the internet). We will refer to these as "external connections".
`Devices which do not have external connections are connectedto the data
`sources by communicating with devices which do have external connections.
`_This communication takes place overthe internal connections.
`
`All of the devices in the network are connected by low rate data links through the
`external network to a network controller. The low data rate connection serves as
`a control channel. Wewill refer to these as "control connections". For
`example, a dual-modecell phone may have a WiFi internal connection and may
`use SMS or 1XRTT as the control connection.
`
`Network
`
`SS
`
`nnections
`
`2 External wire-line
`controller
`“
`
`connection
`
`Control
`
`
`Externalwire-line
`Internal
`connection
`
`connection
`
`
`
`
`LF
`Internal
`connection —
`
`
`
`External wireless
`connection
`
`Figure 2: Network architecture
`
`The external connections provide data at different rate, depending on the type
`and quality of the connection. Becauseof the large variability in quality of
`
`Confidential and Proprietary
`
`4
`
`8-6-05
`
`CANrPortb\PALIB1\LCVW\2747392_1.D0C
`
`BEST AVAILABLE COPY
`
`6
`
`

`

`wireless connections the available data rates may vary greatly from device to
`device and, for a given device, over time. Thus if these devices were to operate
`independently they will not be able to get the data they needat the required rate.
`For example, a device with a wireless external connection may besituated so
`that it can only get a low data rate connection at a certain time. Devices which
`have no external connectionswill be unable to get data.
`
`By using the internal connections we candistribute the data flowing in and out of
`the external connectionsin a time-varying mannerto asto satisfy the needs ofall
`the network devices which are requesting data, in an optimal manner. This is
`accomplished by dynamically configuring the network connectionsto take into
`account: the data needs of each device (data rates, latency), the rates at which
`data can be transmitted over each internal and externallink at any given time,
`the battery status of mobile devices,the traffic load at each device etc.
`
`The control of the network is accomplished by having the devices communicate
`with control servers on the internet, through their control channels. Each device
`transmits status information to the server about its data needs and current
`capabilities.
`It receives instructions from the server as to whoit should
`communicate with, at what data rates, etc. A software client running on each of
`these devices provides the functions necessary for collecting and communicating
`status information to the control server, controlling the data flow, etc. A control
`algorithm running on the servercollects information from all the devicesin a
`given area, calculates the optimal configuration, and generatesinstructions for
`the devices.
`
`The control connections turn the unmanageable ad-hoc mesh network(see
`above)into a manageable network. Once these connectionsare in action, no
`converging routing calculation is needed. Furthermore, a changein the network
`connectivity is instantly reported and dealt with.
`
`3 Embodiment example
`
`The concept described above cantake different embodiments. For example, an
`“under-layer”’ peer to peer network between mobile terminals and fixed WiFi
`access points can be used (see Figure 3). To provide control most mobile
`terminals are permanently connected to network controller (web server) through
`(low data rate) cellular connections (1XRTT, GSM, WiMax etc.). When WiFi
`resourcesare unavailable, the cellular connections are used as data sources as
`well.
`
`Confidential and Proprietary
`
`.
`
`5
`
`8-6-05
`
`C:\NrPortbAPALIB 1\LCV\2747392_1.DOC
`
`7
`
`

`

`Network
`controiler
`
`
`
`
`o
`
`
`Cellular network
`
`Narrow band
`
`
`Controltraffic
`
`
`
` Network with software
`
`clients
`
`Figure 3: Cellular & WiFi implementation
`
`Since the required bandwidth for contro! functionality is by far lower than the
`actualtraffic; consequently this arrangement could use 2G networks, SMS
`messaging etc. Since data rate can below,the control functionality can be
`guaranteed almost everywhere (even whenvoice connection may not be
`feasible).
`
`In this embodiment we capitalize on the introduction of dual mode subscriber
`terminals (cellular and WiFi or Bluetooth). Although peer to peer connection
`between terminals can be done by WiFi on unlicensed spectrum, solution should
`not be limited to this approach.
`
`Once central control is introducedall radio resources may be combinedinto a
`large collaborative network. Subscribers whojoin his network can enjoy the high
`performance broadband transmission capability. Subscriber that is located
`where WiFi radios are heard can identify their identity once they are part of the
`collaboration. Onceidentified, the subscriber can initiate a service request
`through his cellular connection (indicating which radios are in his earshot). The
`network controller than identifies the best radio source (see below) and send a
`~ service request to the selected source.
`If service can be granted, the requesting
`subscriber is notified and executes connection to the selected radio source.
`Oncebeing served, the network controller continues to monitor the service
`conditions and mayinstruct handover of the connection when needed. When
`WiFi sourceis not sufficient (due to poor reception, for example) the broadband
`connection can be switchedto the cellular network.
`Confidential and Proprietary
`6
`
`8-6-05
`
`_ CANrPortbAPALIB1\LCV\2747392_1.DOC
`
`8
`
`

`

`4 System components
`
`4.1 General
`
`In the system described in Figure 3 each client assumed to be able to connectto
`both external connections andto otherclients in its neighborhood (through
`internal connections).
`In one embodiment a client could be a dual mode device
`using 2G or 3G radio (GPRS, 1XRTT1XEVDO, UMTS) or WiMax to
`communicate with the cellular network and using WiFi radio to communicate with
`other clients and access points. Connections to cellular network are used for
`network control and broadband connectivity. The communication with the cellular
`network can use license spectrum while the communication with otherclients
`mayutilize unlicensed spectrum.
`
`4.2 Client operations
`
`To join the collaboration a subscriber must have or download a software module
`(client) from network controller. By communicating with network controller over
`the cellular connection and using the WiFi radio as a sniffer the client module
`executesthe following:
`
`e Acquire the following information:
`
`o Identity of WiFi access points (or any other radio resources)that
`may be usedto connectto wire-line network (sufficiently close).
`For each detected accesspoint path loss is estimated.
`
`o Identity of potential peer clients that can becomebridges to the
`cellular network or wire-line network. For each peerclient path loss
`is estimated using short interchange.
`
`o Traffic load at access point backhaul using webinterface to access
`point (Whenresiding in the computer connected to a WiFi access
`point)
`
`o Traffic load in and outof its associated mobile terminal
`
`o Number of hopsto the selected broadband source
`
`o Type and speed of broadband source
`
`o Level of unlicensed spectrum related interference conditions at the
`mobile terminal
`Confidential and Proprietary
`
`8-6-05
`
`7
`
`C:\NrPortb\PALIB1\LCW\2747392_1.DO0C
`
`9
`
`

`

`o Client's battery status (for battery operated devices)
`
`e Based on the above information, the clientwill:
`o Send connection request via network controller or
`
`o Send connection request directly to peer (when pre-authorization
`has been granted)
`
`o Disconnect from current peer when necessary (traffic load at peer
`is too high, connection quality is too low, interference is above
`threshold etc.)
`
`o Execute quick reconnection to a peer that has been pre-
`conditioned to accept the connection (connection context must be
`pre-downloadedto accepting peer). Quick reconnection is
`essential to maintain un-interruptible streaming serviceslike voice
`and video.
`
`o Report connection quality history to network controller
`
`o Disconnectafter reporting disconnection reasons to network
`controller
`
`Initial user terminal embodiment is shown below:this terminal is based on
`commonly used elements such as laptop and data capable cellphone connected
`either wirelessly or by wire.
`Improved user terminal could use 3G PCMCIA
`adaptor allowing 3G broadbandservice:
`
`If—Bluetooth, WiFi =
`
`Or wire connection
`be)
`FLeeGy:
`
`
`
`
`To cellular
`network
`
`Figure 4: Initial client embodiment
`
`Confidential and Proprietary
`
`8
`
`,
`
`.
`
`8-6-05
`
`CANrPortbPALIB1\LCVW\2747392_1.D0C
`
`10
`
`10
`
`

`

`4.3 Network controller operations
`
`4.3.1 General
`
`The network controller collects the clients’ reports and continuously calculates
`the best routes by which each mobile terminal should be connected to the
`broadband media. This calculation is executed each time a subscriber connects
`or disconnects. Clients reports are mostly arriving through the external
`connections such that reporting reliability is maximized.
`In addition, the network
`controller communicates with the participating WiFi accesspoints via their web
`interface to manageto evaluate their traffic load and managetheir admissionlist
`(for example: list of allowable MAC addresses). When 802.1X capability is
`available on accesspoints, the network controller can provide for 802.1X
`authentication service.
`If 802.1X is not available, the network controller can use
`the WEP and MAClist to implement non 802.1X authentication.
`
`4.3.2 Access of network resources example
`
`Clients can access peersclients or accesspoint as follows:
`
`e Clients that desire to access the WiFi network reports to network controller
`via his cellular external connection all WiFi resourcesin its reach.
`
`e Network controller checks which of the reported WiFi resources,
`participates in the collaboration, and for those evaluates their business
`status (backhaul traffic load).
`
`e Network controller request service form the participating access points or
`otherclients by setting the allowable MAC addresslist to allow the
`requesting client access. When done, networkcontroller informs the
`requesting client a list of available access point and peers
`
`e Client connects to the best radio resource
`
`e Whenserviceis no longer needed, client disconnects form access
`point/peer and informs the network controller.
`
`4.3.3 Routing method
`
`Networkcontroller uses the clients’ reports (see 4.2) to calculate the best routes
`by whichclients are served.
`
`Confidential and Proprietary
`
`C:\NrPortbAPALIB1\LCW2747392_1.D0C
`
`9
`
`11
`
`8-6-05
`
`11
`
`

`

`Path loss betweenclients and serving networkvaries greatly; in outdoor
`environmentthe typical standard deviation is 8 to 10dB. Consequently serving
`networksignallevel at each client location is expected to be a strong function of
`its location.
`
`A possible algorithm can take each of the elements mentioned above:path loss,
`load, battery status etc., attribute some weight to each and calculate a numeric
`value relatedto it. All these values can be collected to create a vector. The
`algorithm calculates the vectors’ length and selects the longest (or shortest) one;
`the network controller instructs the subscriber to connect to the associated radio
`source.
`
`5 Trunking option
`
`Thefollowing section suggests somevariations of the above methodsto further
`enhancewireless connectivity.
`
`5.1 Uplink Trunking (client to serving network)
`
`A typical portable client is greatly transmission powerlimited (mainly due to
`battery constrains). Consequently uplink operation is a much bigger challenge
`than downlink (especially when connected directly to cellular broadband
`network). Using the under-layer network (ex. WiFi) as a trunking switch will allow
`significant increase in uplink ability: client can establish multiple connections via
`multiple clients plus himself with the target destination. The assignmentof the
`various connections can be either on random basis or on amountof data and
`criticality basis: the client that has a betterlink will carry the more challenging
`connection. For example, high capacity streaming video will be served by the
`best channel quality client while voice channel will be served by a client with less
`quality link (one can argue via versa since voice requires stricter delay jitter
`channel). The end result is uplink with a power multiplier, sum of all peers that
`can be tapped).
`
`To furtherclarify the idea, suppose there are 5 clients within under-layer network
`proximity. At each instance oneclient requires uplink communication henceit
`utilizes all clients’ uplink thereby reducing its delay considerably (greatly affecting
`TCP/IP performance). Sameprinciple can be utilized when each of theseclients
`is being served differently; one may execute voice connection while another run
`streaming video and another downloadsa large datafile. Clients can than
`negotiate between themselves whowill carry each of the connectionsfollowing
`their link status and not based on whois being served.
`
`Confidential and Proprietary
`
`C:ANrPortbAPALIB1\LCWW2747392_1.D0C
`
`10
`
`12
`
`8-6-05
`
`12
`
`

`

`
`
`Serving networks
`
`
`
`Network
`
`management
`
`
`
`
`Website Server
`
`
`
`
`Managed
`Ad-hoc
`network
`
`Figure 5: Aggregating uplink
`
`The implementation of this idea is very similar to a trunking switch; theunder-
`layer network (WiFi, ex.) is used to transport the sessions from the originating
`client to the supporting clients and all the clients participating (including the
`originator) are communicating with the serving network. Obviously,to allow
`connectivity to standardnetwork destinations, a proxy router is added (see
`Figure 5).
`
`For example, in 1XEVDO system, where downlink is based on time division the
`. uplink still uses 1XRTT style communication (CDMA). Oneclient can
`communicateits uplink data to multiple clients (through the client to client
`connections, ex. WiFi) and than all the connected clients can concurrently
`transmit the data over their individual uplinks (code channels). With WiMax, sub-
`carriers could be used in exchangefor the CDMAcodes.
`
`Comment: non time division based uplink is very commonwithin mobile packet
`serving networks since fast feedback from clients (downlink quality) can
`dramatically help the downlink scheduling. This feedbackis normally used to
`increase the probability the client will be served whenits downlink conditions are
`at their best.
`
`Confidential and Proprietary
`
`11
`
`8-6-05
`
`C:\NrPortb\PALIB1\LCW2747392_1.DOC
`
`13
`
`

`

`5.2 Downlink Trunking
`
`There one fundamentaldifference between downlink and uplink: in downlink
`transmission a single (or very few) data source (in most cases) communicatesto
`manyclients while in uplink the opposite processexists.
`
`The downlink aggregation can be valuable either in the case described in section
`6 or in case of multiple base stations that can serve or multi-carrier (serving
`networks) case. When multiple service networks is present and consequently
`multiple sets of clients (each belongto different network), a proxy router can
`aggregate downlink as described in section 6.
`
`5.3 Client to client communications using range extenders
`
`Client to client communicationis very critical in the proposed invention. While
`direct connectivity using ad-hoc WiFi method is well knownin the art, the
`connection range can besignificantly enhanced using WiFi range extenders
`located in various locations. The WiFi range extenderis indirectly defined in
`802.11 standards (WDS): the extender does not require the typical Ethernet
`connectionthat is part of WiFi access point. Consequently the range extender
`can be located almost anywhere while on power sourceis required.
`
`Typical range extenders are being sold for less than 100$ and arelight weight
`and small size which makes them ideal companionto laptops and other network
`accessdevices.
`
`The main benefit of the range extenderas part of the proposed schemeis
`increasing the numberof clients that can collaborate in a given location.
`Consequently the probability to locate a client that possesses good connection
`with the serving network increases or conversely, the expected service network
`connection path-loss can be greatly reduced.
`
`6 Special case: voice centric networks
`
`Existing cellular data networks such as 1XRTT, UMTS and GPRSareless
`optimized for data service: each client connectionis limited to data rate that is far
`lower than the data rate possible by adequate link budget. This approachis a
`reminiscent of voice centric networks.
`If we can device a method through which
`
`Confidential and Proprietary
`
`12
`
`8-6-05
`
`CANrPortbAPALIB1\LCW2747392_1.D0C
`
`14
`
`

`

`multiple client channels could be seamlessly aggregated, data service
`performancecould be at par with the data centric networks such as 1XEVDO or
`HSPDA.
`
`Explanation: voice centric traffic is characterized by constant bit rate (CBR) with
`approximately 10Kb/s (not counting for voice activity duty cycle). A serving
`network accommodatescertain numberoftraffic (mainly voice) channels that are
`allocated as needed. The morevoice service is needed, more channels are
`allocated. Data traffic is mostly bursty; the bursts are normally short and could
`use data rate as high as available. Assuming low correlation between different
`subscribers, the data bursts have different time which calls for time division
`multiplex transmission: the newerdata centric wireless systemsare exploiting
`this to increase data rates (1XEVDO, WiMax, HSDPA). Thesesolutions are
`actually aggregating bandwidth to serve each subscriber on time division basis
`
`through common packet channels or similar arrangements. Managed
`
`
`
`
`Ad-hoc
`Website Server
`network
`
`
`
`
`Figure 6: Downlink aggregation network
`
`Existing voice centric network can benefit from the present invention as follows:
`say there are 10 different clients demanding data service. A serving network
`trying to serve one client could split the traffic for each client into 10 parts and
`communicate them through all 10 clients. Using the proposed communication
`_ betweenclients above,all other 9 clients can rout thetraffic to the targeted client
`via the WiFi connection (this connection could be of othertype).
`
`Confidential and Proprietary
`
`C:\NrPortbAPALIB1\LCW\2747392_1.D0C
`
`13 -
`
`15
`
`8-6-05
`
`15
`
`

`

`Obviously, this method requires routing proxy server (one or more)at the core
`network(Figure 6): the traffic source goesto the proxy router that executes the
`traffic splitting (can be done by Trunking switch). Thetraffic is than forwarded to
`the serving networkthat transport the data to/from the clients.
`
`Proxy aggregation servers can beeither part of the core network or handles by
`third party. The clients are loaded with the right proxy sever IP address
`whenever some website are accessed.
`
`This solution can provide legacy serving network with similar capability of new
`common channel based networks thereby saving significant investment.
`
`7 Performance
`
`The proposed solution provides for very large network performance improvement
`through the followings:
`
`e Leveraging on wire-line network resources (through WiFi connectivity).
`
`e
`
`Improving typical link budget betweenclient and cellular network.
`
`Weassumethat each wire-line resourceis intermittently used by its main user so
`the resource can be available to others at most times. Given the fast proliferation
`of WiFi all over the place, it is expected that under sufficient collaboration wire-
`line networkswill provide for most of the traffic bandwidth (unlike the cellular
`networks, these networks indeed have the needed bandwidth). For example, in
`a given neighborhood DSL based network can provide 150Mb/s at peak times
`' while the cellular base station covering same neighborhood can provideless than
`10Mb/s. Whenthe collaboration is sufficiently deep, the potential throughput
`gain can easily exceed 15X!
`
`To evaluate the performance gain contributed by link budget we executed
`simulation that distribute cellular subscriber at a givenarea with various
`subscribers’ densities. We calculate the path loss betweenthe serving base
`station and the subscriber terminals using accepted propagation models for
`urban and suburban environments. The following are the simulation parameters:
`
`@ Poutcoll
`
`= outage probability for collaborative user
`
`@ Pout non coll = outage probability for a non-collaborative user
`
`—@ nump
`
`= maximum numberof parallel transmission
`
`@ rate max
`Confidential and Proprietary
`
`= largest transmission rate
`14
`
`CANrPortbI\PALIB1\LCWW2747392_1.D0C
`
`,
`
`8-6-05
`
`16
`
`

`

`@ rate min
`
`= lowestpossible transmission rate
`
`m@ Db
`
`= Dr
`
`‘™ Lmax
`a model
`
`= density of base-stations per km42
`
`= density of collaborative user per km42
`
`= maximum allowed path-loss to collaborative user
`= propagation model
`
`mB
`
`= bandwidth MHz
`
`@ shadow
`
`= standard deviation of shadowingloss: 8dB
`
`ovnet coll = 0 Pout non coll = 0.005 nump = 5 rate_max = 10 rate_min = 0.1 Db = 0.25 Dr = 200 Lmax = 100 model = Wi4indoor B = 5 shadow = 1
`
`
`
`
`“Tt
`
` fractionofuserswithratelessthanindicated
`
`o = a
`
`So
`
`0,05
`
`1
`
`15
`
`2
`
`No Collaboration
`~-—-~ Collaborative Users - single link
`~~~ Collaborative Users - multiple links
`CO'
`3
`3.5
`4
`45
`
`5
`
`2.5
`RATE [MBPS]
`
` histogram of number of candidate links
`—T
`T
`
`numberof links
`
`Figure 7: CDF for data rate and number of possible under-layer
`connections simulation results for Lmax =100dB
`
`The simulation showsthat achievable data rate improvement can easily exceed
`10X.
`
`Confidential and Proprietary
`
`C:\NrPortb\PALIB1\LCWW2747392_1.D0C
`
`15
`
`17
`
`8-6-05
`
`17
`
`

`

`Combining the two performancegain elements (as described above) we
`can argue that two order of magnitude performance improvementrelative
`to traditional cellular broadband serviceis feasible.
`
`Confidential and Proprietary
`
`CANrPortbiPALIB1\LCW\2747392_1.D0C
`
`16
`
`18
`
`8-6-05
`
`18
`
`

`

`"PATENT APPLICATION SERIAL ‘NO
`
`U.S. DEPARTMENT OF COMMERCE
`PATENT AND TRADEMARK OFFICE
`FEE RECORD SHEET
`
`10/25/2005 ZIUHARL
`
`00000083.232415
`
`60728918
`
`_ 01 FCs2005
`
`100.00 DA
`
`PTO-1556_
`(5/87)
`
`8
`
`“U.S Goverrenert Prraing Office: 2003 — 660-267/00003
`
`19
`
`19
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket