`-
`
`PTO/SB/16 (07-05)
`Approved for use through 07/31/2006. OMB 0651-0032
`US.Patent and Trademark Office; U.S. DEPARTMENT OF COMMERCE
`Underqhe Paperwork Reduction Act of 1995, no persons are required to respond to a collection of information unless it displays a valid OMB contro! number.
`PROVISIONAL APPLICATION FOR PATENT COVER SHEET
`,, This is a request for filing a PROVISIONAL APPLICATION FOR PATENTunder 37 CFR 1.53(c).
`press Mail Nabel No. EV 711413775 US
`
`.
`
`-
`
`_o—> F
`
`X
`
`GOLZOLi
`
`:
`INVENTOR(S
`Wen Name(first and middle {ifany])|Family Name or Sumame Residence
`
`vu
`City
`and either State or Foreign Count
`
`fe “_one |
`
`
`
`Additional inventors are being named on the __ separately numbered sheets attached hereto
`TITLE OF THE INVENTION(500 characters max
`
`WIRELESS BROADBAND BY CENTRALLY MANAGEDPEER TO PEER NETWORKING
`
`CORRESPONDENCE ADDRESS
`Direct all correspondenceto:
`x
`The address corresponding to Customer Number:
`021971
`
`OR
`
`C] Firm or
`Individual Name
`Address
`
`:
`
`PTO8918
`3
`yU.S
`D8 )/2
`ry1
`
`02105
`
`State
`Telephone
`
`ais
`
`ip
`ax
`
`
`
`ENCLOSED APPLICATION PARTS(check ail that apply)
`() Application Data Sheet. See 37 CFR 1.76
`1 CD(s), Number
`[X] Specification Number ofPages
`_17
`() Other(specify)
`(J Drawing(s) Number ofSheets
`
`
`
`
`
`
`
`
`
`Fees Due: Filing Fee of $200 ($100 small entity). If the specification and drawings exceed 100 sheets of paper,the application size fee
`is also due which is $250 ($125 for small entity) for each additional 50 sheets or fraction thereof. See 35 U.S.C. 41(a)(1)(G) and 37
`CFR 1.16(s).
`METHOD OF PAYMENTOFFILING FEES AND APPLICATION SIZE FEE FOR THIS PROVISIONAL APPLICATION FOR PATENT
`
`TOTAL FEE AMOUNT(8)
`100.00
`
`{J Applicant claims small entity status. See 37 CFR 1.27.
`() Acheck or moneyorderis enclosed to coverthe filing fee and application size fee (if applicable).
`(] Payment by credit card. Form PTO-2038 is attached.
`{]
`TheDirector is hereby authorized to chargefiling fee and applicable size fee (if applicable) or credit any overpayment to Deposit
`Account Number:
`_23-2415_. A duplicative copy of this form is enclosed for fee processing.
`The invention was made by an agency of the United States Governmentor undera contract with an agency of the United States Government.
`& No.
`
`(J Yes, the nameofthe UAGove Pa ent agency and the Government contract number(s)are:
`
`
`
`g|/ / .
`
`SIGNATURE
`aha\
`Date:
`October 21, 2005
`
`TYPED or PRINTED NAME REGISTRATION NO._39,666__U.P. Peter En
`
`(ifappropriate)
`
`TELEPHONE._650-493-9300 Docket Number: __32354-702.101
`
`
`
`
`
`
`
`USE ONLY FOR FILING A PROVISIONAL APPLICATION FOR PATENT
`This collection of information is required by 37 CFR 1.51. The information is required to obtain or retain a benefit by the public whichis to file (and by the USPTO
`to process) an application. Confidentiality is governed by 35 U.S.C. 122 and 37 CFR 1.11 and 1.14. This collection is estimated to take 8 hours to complete,
`including gathering, preparing, and submitting the completed application form to the USPTO. Timewill vary depending upon the individual case. Any comments
`on the amount oftime you require to complete this form and/or suggestions for reducing this burden, should be sent to the Chief Information Officer, U.S. Patent
`and Trademark Office, U.S. Department of Commerce, P.O. Box 1450, Alexandria, VA 22313-1450. DO NOT SEND FEES OR COMPLETED FORMSTO THIS
`ADDRESS. SEND TO: Commissioner for Patents, P.O. Box 1450, Alexandria, VA 22313-1450.
`
`Ifyou need assistance in completing theform, call 1-800-PTO-9199 and select option 2.
`
`CANrPortbAPALIBI\LCV\2747202_1.DOC
`
`1
`
`APPLE 1007
`
`1
`
`APPLE 1007
`
`
`
`WSGRDocket No. 32354-702.101
`
`PROVISIONAL PATENT APPLICATION
`
`WIRELESS BROADBAND BY CENTRALLY MANAGED
`
`PEER TO PEER NETWORKING
`
`Inventor(s):
`
`Shimon Scherzer,
`Citizen of United States, Residing at
`23185 Old Santa Cruz Hwy
`Los Gatos, CA 95033
`
`Wilson Sonsini Goodrich & Rosati
`PROFESSIONAL CORPORATION
`
`650 Page Mill Road
`Palo Alto, CA 94304
`(650) 493-9300
`(650) 493-6811
`
`’ Express Mail Label No. EV 711413775 US
`
`Confidential and Proprietary
`
`CANrPortbPALIB1\LCW2747392_1.D0C
`
`2
`
`
`
`0 Table of Contents
`
`0=Table of Contents .0..........ccccscsssesssssssserecseessessensessecncnesecsnenensesessesssessenonssates 1
`
`1
`
`IMBOCUCTION ..... 2... eee ce csessesesnectecssnssecoesesensnssscccneeseecescesersesesssesenseaneaseesanssaues 2
`
`2=BaSic Principle... esssssssssssssssssssrecsssnenssececonaeessnesnenseseneeeetenecensssersanes 4
`
`3
`
`Embodiment example ................:cccccccccsseeeseceeeeetseececcccerscesssscsssesssesssscaneerers 5
`
`4=SySteM COMPONENS ............scssseeecssssseeeoeeesesesssenssesssesecssncnsenssseseaesssceeenenens 7
`
`4.1
`4.2
`4.3.
`
`GEMMELL 0... eee ccc eesesececceeeueneeecceceaeseceeseuaeneccueseeeeeseceseuecseeceeueueetesenenens 7
` ClIOnt OPErAations ........... cc eccecsssessessssssssesssseeeeecesceeeeeeeeeeaauecceeseeeeeeeeees 7
`Network controller operations. ...............ccceecsssesesnensensseeeeceeeeeesseesseeesesesees 9
`
`
`
`(5—-Trunking Option..........ssssscssscsssescsssssecssenssrescesseessseenseessanenssseseeeanensensuenens 10
`
`5.1.
`5.2
`5.3
`
`Uplink Trunking (client to serving network)...................c0c0scccesseeeeseeswe 10
`Downlink Trunking.............,.ececceeeeceeeeeeeeeeeeeeeetenenees cessecsaeerereesstesesneneeess 12
`Client to client communications using range extendef’s..............:.e 12
`
`Special case: voice centric MEtWOFKS.........sssccsssesesesssssecsssessesssesenseceses 12
`
`PerFOrMane «0.0... cecessesseescesentsneesseneneesenetanensesunanacsenseserecseaeseneseneeaeasarsesees 14
`
`6
`
`7
`
`Confidential and Proprietary
`
`1
`
`8-6-05
`
`CANrPortbPALIB 1\LCW\2747392_1.DOC
`
`3
`
`
`
`1
`
`Introduction
`
`Providing ubiquos broadband wireless service anywhere is becoming the next -
`big challengefor the cellular industry. Multiple technologies are being promoted
`as potential solutions: 1XEVDO, UMTS, WiMax and others. Broadband wireless
`will become popular onlyif:
`
`1. Quality of service is similar to quality of current wire-line services (DSL,
`cable).
`
`2. The service is ubiquous (everywhere); this is the real advantage of
`wireless..
`
`3. Customers’ expenditure on communication will not grow (as least not
`substantially)
`
`Noneof technologies mentioned above can provide an economical ubiquous
`coverage while using traditional deployment methods dueto lack of spectrum;
`path loss (basic physics). Figure 1 demonstrate the “wireless reality” in urban
`environment: the probability of a good connectinglink is quite low due to
`buildings obstructions. Furthermore, in comparison to wire-line capacity at
`the amountoftraffic that can be supported by any imaginable wireless
`
`service is minuscule.
`
`Toillustrate the problem let consider PCS voice services: PCS networkis already
`quite densely deployed (in urban areas the cells are few hundreds yards apart,
`andstill voice quality is marginal. While voice service requires only about 10Kb/s
`data rate, broadbandservice will need two order of magnitude higher data rate
`which creates a two order of magnitude challenge gap.
`
`Broadband services are currently provided by DSL and cable technologies.
`Typical bandwidth required per 2000 subscribers (similar to a typical cellular cell
`site population) in peak time is about 150Mb/s (at DISLAM uplink). This is way
`higher than any of wireless broad band technologies mentioned above can
`deliver (typical spectrum allocation).
`
`This gap cannot be resolved only bytraditional methods:
`
`e
`
`Increasing deployment density by more than order of magnitude; the cost
`(CAPEX and especially OPEX)will render the service non-economical.
`
`e Antenna technology or “smart antenna”present cost challenge and may
`bridge only small fraction of the gap.
`
`Confidential and Proprietary
`
`2
`
`8-6-05
`
`CANrPortbAPALIB1\LCW2747392_1.D0C
`
`4
`
`
`
`e WiFi static mesh networks require even higher deployment density due to
`transmission powerlimits, radio interference and lowefficiency.
`Consequently they are limited to certain areas and cannot provide for
`ubiquity. These networks (although being experimented by some
`municipalities) cannotjustify themselvesin the long run due to high OPEX
`(need to serve equipmentin many locations)
`
`e Ad-hoc mesh-networks. This approach is aimed to extend the coverage of
`wireless network without adding moreinfrastructure equipment.
`Subscriber terminals canrelaytraffic form traffic sources to terminals that
`are not in range of the serving network hencerangeis effectively —
`multiplied. The down side of this approachisin its inherentinstability:
`critical control signaling is handled over unreliable connections. Ad-hoc |
`mesh networkrouting is calculated through a converging process;
`neighboring nodes are exchanging routing info and routing is repeatedly
`calculated until an optimal solution is found. Once a node becomes
`unavailable (due to power shutdown, radio interference, traffic congestion,
`location change etc.) it would take a considerable time for the system to
`recover.
`If this happen frequently, the system maynot be able to recover
`at all. Hence ad-hoc mesh network has never becomea realalternative to
`fixed infrastructure.
`
`
`
`Figure 1: The “wireless reality”
`
`Confidential and Proprietary
`
`3
`
`‘
`
`8-6-05
`
`C:\NrPortbi\PALIB1\LCV\2747392_1.DOC
`
`BEST AVAILABLE COPY
`
`5
`
`
`
`2 Basic principle
`
`Weconsider a wireless communication network whose aim is to provide high
`speed data to mobile users. The networkconsists of a variety of mobile hand-
`held (ex. cell phones, PDAs) andstationary devices (ex. WiFi access points)
`equipped with wireless transceivers. Each of these devices is capable of wireless
`communications with neighboring devices within communication range. Wewill
`refer to these as “internal connections". Someof these devices also
`communicate via high speedwirelesslinks (ex. 1XEVDO, UMTS, GPRS, EDGE.
`WiMax) or other means(ex. DSL, cable,fiber) with data sources outside the
`network(i.e. the internet). We will refer to these as "external connections".
`Devices which do not have external connections are connectedto the data
`sources by communicating with devices which do have external connections.
`_This communication takes place overthe internal connections.
`
`All of the devices in the network are connected by low rate data links through the
`external network to a network controller. The low data rate connection serves as
`a control channel. Wewill refer to these as "control connections". For
`example, a dual-modecell phone may have a WiFi internal connection and may
`use SMS or 1XRTT as the control connection.
`
`Network
`
`SS
`
`nnections
`
`2 External wire-line
`controller
`“
`
`connection
`
`Control
`
`
`Externalwire-line
`Internal
`connection
`
`connection
`
`
`
`
`LF
`Internal
`connection —
`
`
`
`External wireless
`connection
`
`Figure 2: Network architecture
`
`The external connections provide data at different rate, depending on the type
`and quality of the connection. Becauseof the large variability in quality of
`
`Confidential and Proprietary
`
`4
`
`8-6-05
`
`CANrPortb\PALIB1\LCVW\2747392_1.D0C
`
`BEST AVAILABLE COPY
`
`6
`
`
`
`wireless connections the available data rates may vary greatly from device to
`device and, for a given device, over time. Thus if these devices were to operate
`independently they will not be able to get the data they needat the required rate.
`For example, a device with a wireless external connection may besituated so
`that it can only get a low data rate connection at a certain time. Devices which
`have no external connectionswill be unable to get data.
`
`By using the internal connections we candistribute the data flowing in and out of
`the external connectionsin a time-varying mannerto asto satisfy the needs ofall
`the network devices which are requesting data, in an optimal manner. This is
`accomplished by dynamically configuring the network connectionsto take into
`account: the data needs of each device (data rates, latency), the rates at which
`data can be transmitted over each internal and externallink at any given time,
`the battery status of mobile devices,the traffic load at each device etc.
`
`The control of the network is accomplished by having the devices communicate
`with control servers on the internet, through their control channels. Each device
`transmits status information to the server about its data needs and current
`capabilities.
`It receives instructions from the server as to whoit should
`communicate with, at what data rates, etc. A software client running on each of
`these devices provides the functions necessary for collecting and communicating
`status information to the control server, controlling the data flow, etc. A control
`algorithm running on the servercollects information from all the devicesin a
`given area, calculates the optimal configuration, and generatesinstructions for
`the devices.
`
`The control connections turn the unmanageable ad-hoc mesh network(see
`above)into a manageable network. Once these connectionsare in action, no
`converging routing calculation is needed. Furthermore, a changein the network
`connectivity is instantly reported and dealt with.
`
`3 Embodiment example
`
`The concept described above cantake different embodiments. For example, an
`“under-layer”’ peer to peer network between mobile terminals and fixed WiFi
`access points can be used (see Figure 3). To provide control most mobile
`terminals are permanently connected to network controller (web server) through
`(low data rate) cellular connections (1XRTT, GSM, WiMax etc.). When WiFi
`resourcesare unavailable, the cellular connections are used as data sources as
`well.
`
`Confidential and Proprietary
`
`.
`
`5
`
`8-6-05
`
`C:\NrPortbAPALIB 1\LCV\2747392_1.DOC
`
`7
`
`
`
`Network
`controiler
`
`
`
`
`o
`
`
`Cellular network
`
`Narrow band
`
`
`Controltraffic
`
`
`
` Network with software
`
`clients
`
`Figure 3: Cellular & WiFi implementation
`
`Since the required bandwidth for contro! functionality is by far lower than the
`actualtraffic; consequently this arrangement could use 2G networks, SMS
`messaging etc. Since data rate can below,the control functionality can be
`guaranteed almost everywhere (even whenvoice connection may not be
`feasible).
`
`In this embodiment we capitalize on the introduction of dual mode subscriber
`terminals (cellular and WiFi or Bluetooth). Although peer to peer connection
`between terminals can be done by WiFi on unlicensed spectrum, solution should
`not be limited to this approach.
`
`Once central control is introducedall radio resources may be combinedinto a
`large collaborative network. Subscribers whojoin his network can enjoy the high
`performance broadband transmission capability. Subscriber that is located
`where WiFi radios are heard can identify their identity once they are part of the
`collaboration. Onceidentified, the subscriber can initiate a service request
`through his cellular connection (indicating which radios are in his earshot). The
`network controller than identifies the best radio source (see below) and send a
`~ service request to the selected source.
`If service can be granted, the requesting
`subscriber is notified and executes connection to the selected radio source.
`Oncebeing served, the network controller continues to monitor the service
`conditions and mayinstruct handover of the connection when needed. When
`WiFi sourceis not sufficient (due to poor reception, for example) the broadband
`connection can be switchedto the cellular network.
`Confidential and Proprietary
`6
`
`8-6-05
`
`_ CANrPortbAPALIB1\LCV\2747392_1.DOC
`
`8
`
`
`
`4 System components
`
`4.1 General
`
`In the system described in Figure 3 each client assumed to be able to connectto
`both external connections andto otherclients in its neighborhood (through
`internal connections).
`In one embodiment a client could be a dual mode device
`using 2G or 3G radio (GPRS, 1XRTT1XEVDO, UMTS) or WiMax to
`communicate with the cellular network and using WiFi radio to communicate with
`other clients and access points. Connections to cellular network are used for
`network control and broadband connectivity. The communication with the cellular
`network can use license spectrum while the communication with otherclients
`mayutilize unlicensed spectrum.
`
`4.2 Client operations
`
`To join the collaboration a subscriber must have or download a software module
`(client) from network controller. By communicating with network controller over
`the cellular connection and using the WiFi radio as a sniffer the client module
`executesthe following:
`
`e Acquire the following information:
`
`o Identity of WiFi access points (or any other radio resources)that
`may be usedto connectto wire-line network (sufficiently close).
`For each detected accesspoint path loss is estimated.
`
`o Identity of potential peer clients that can becomebridges to the
`cellular network or wire-line network. For each peerclient path loss
`is estimated using short interchange.
`
`o Traffic load at access point backhaul using webinterface to access
`point (Whenresiding in the computer connected to a WiFi access
`point)
`
`o Traffic load in and outof its associated mobile terminal
`
`o Number of hopsto the selected broadband source
`
`o Type and speed of broadband source
`
`o Level of unlicensed spectrum related interference conditions at the
`mobile terminal
`Confidential and Proprietary
`
`8-6-05
`
`7
`
`C:\NrPortb\PALIB1\LCW\2747392_1.DO0C
`
`9
`
`
`
`o Client's battery status (for battery operated devices)
`
`e Based on the above information, the clientwill:
`o Send connection request via network controller or
`
`o Send connection request directly to peer (when pre-authorization
`has been granted)
`
`o Disconnect from current peer when necessary (traffic load at peer
`is too high, connection quality is too low, interference is above
`threshold etc.)
`
`o Execute quick reconnection to a peer that has been pre-
`conditioned to accept the connection (connection context must be
`pre-downloadedto accepting peer). Quick reconnection is
`essential to maintain un-interruptible streaming serviceslike voice
`and video.
`
`o Report connection quality history to network controller
`
`o Disconnectafter reporting disconnection reasons to network
`controller
`
`Initial user terminal embodiment is shown below:this terminal is based on
`commonly used elements such as laptop and data capable cellphone connected
`either wirelessly or by wire.
`Improved user terminal could use 3G PCMCIA
`adaptor allowing 3G broadbandservice:
`
`If—Bluetooth, WiFi =
`
`Or wire connection
`be)
`FLeeGy:
`
`
`
`
`To cellular
`network
`
`Figure 4: Initial client embodiment
`
`Confidential and Proprietary
`
`8
`
`,
`
`.
`
`8-6-05
`
`CANrPortbPALIB1\LCVW\2747392_1.D0C
`
`10
`
`10
`
`
`
`4.3 Network controller operations
`
`4.3.1 General
`
`The network controller collects the clients’ reports and continuously calculates
`the best routes by which each mobile terminal should be connected to the
`broadband media. This calculation is executed each time a subscriber connects
`or disconnects. Clients reports are mostly arriving through the external
`connections such that reporting reliability is maximized.
`In addition, the network
`controller communicates with the participating WiFi accesspoints via their web
`interface to manageto evaluate their traffic load and managetheir admissionlist
`(for example: list of allowable MAC addresses). When 802.1X capability is
`available on accesspoints, the network controller can provide for 802.1X
`authentication service.
`If 802.1X is not available, the network controller can use
`the WEP and MAClist to implement non 802.1X authentication.
`
`4.3.2 Access of network resources example
`
`Clients can access peersclients or accesspoint as follows:
`
`e Clients that desire to access the WiFi network reports to network controller
`via his cellular external connection all WiFi resourcesin its reach.
`
`e Network controller checks which of the reported WiFi resources,
`participates in the collaboration, and for those evaluates their business
`status (backhaul traffic load).
`
`e Network controller request service form the participating access points or
`otherclients by setting the allowable MAC addresslist to allow the
`requesting client access. When done, networkcontroller informs the
`requesting client a list of available access point and peers
`
`e Client connects to the best radio resource
`
`e Whenserviceis no longer needed, client disconnects form access
`point/peer and informs the network controller.
`
`4.3.3 Routing method
`
`Networkcontroller uses the clients’ reports (see 4.2) to calculate the best routes
`by whichclients are served.
`
`Confidential and Proprietary
`
`C:\NrPortbAPALIB1\LCW2747392_1.D0C
`
`9
`
`11
`
`8-6-05
`
`11
`
`
`
`Path loss betweenclients and serving networkvaries greatly; in outdoor
`environmentthe typical standard deviation is 8 to 10dB. Consequently serving
`networksignallevel at each client location is expected to be a strong function of
`its location.
`
`A possible algorithm can take each of the elements mentioned above:path loss,
`load, battery status etc., attribute some weight to each and calculate a numeric
`value relatedto it. All these values can be collected to create a vector. The
`algorithm calculates the vectors’ length and selects the longest (or shortest) one;
`the network controller instructs the subscriber to connect to the associated radio
`source.
`
`5 Trunking option
`
`Thefollowing section suggests somevariations of the above methodsto further
`enhancewireless connectivity.
`
`5.1 Uplink Trunking (client to serving network)
`
`A typical portable client is greatly transmission powerlimited (mainly due to
`battery constrains). Consequently uplink operation is a much bigger challenge
`than downlink (especially when connected directly to cellular broadband
`network). Using the under-layer network (ex. WiFi) as a trunking switch will allow
`significant increase in uplink ability: client can establish multiple connections via
`multiple clients plus himself with the target destination. The assignmentof the
`various connections can be either on random basis or on amountof data and
`criticality basis: the client that has a betterlink will carry the more challenging
`connection. For example, high capacity streaming video will be served by the
`best channel quality client while voice channel will be served by a client with less
`quality link (one can argue via versa since voice requires stricter delay jitter
`channel). The end result is uplink with a power multiplier, sum of all peers that
`can be tapped).
`
`To furtherclarify the idea, suppose there are 5 clients within under-layer network
`proximity. At each instance oneclient requires uplink communication henceit
`utilizes all clients’ uplink thereby reducing its delay considerably (greatly affecting
`TCP/IP performance). Sameprinciple can be utilized when each of theseclients
`is being served differently; one may execute voice connection while another run
`streaming video and another downloadsa large datafile. Clients can than
`negotiate between themselves whowill carry each of the connectionsfollowing
`their link status and not based on whois being served.
`
`Confidential and Proprietary
`
`C:ANrPortbAPALIB1\LCWW2747392_1.D0C
`
`10
`
`12
`
`8-6-05
`
`12
`
`
`
`
`
`Serving networks
`
`
`
`Network
`
`management
`
`
`
`
`Website Server
`
`
`
`
`Managed
`Ad-hoc
`network
`
`Figure 5: Aggregating uplink
`
`The implementation of this idea is very similar to a trunking switch; theunder-
`layer network (WiFi, ex.) is used to transport the sessions from the originating
`client to the supporting clients and all the clients participating (including the
`originator) are communicating with the serving network. Obviously,to allow
`connectivity to standardnetwork destinations, a proxy router is added (see
`Figure 5).
`
`For example, in 1XEVDO system, where downlink is based on time division the
`. uplink still uses 1XRTT style communication (CDMA). Oneclient can
`communicateits uplink data to multiple clients (through the client to client
`connections, ex. WiFi) and than all the connected clients can concurrently
`transmit the data over their individual uplinks (code channels). With WiMax, sub-
`carriers could be used in exchangefor the CDMAcodes.
`
`Comment: non time division based uplink is very commonwithin mobile packet
`serving networks since fast feedback from clients (downlink quality) can
`dramatically help the downlink scheduling. This feedbackis normally used to
`increase the probability the client will be served whenits downlink conditions are
`at their best.
`
`Confidential and Proprietary
`
`11
`
`8-6-05
`
`C:\NrPortb\PALIB1\LCW2747392_1.DOC
`
`13
`
`
`
`5.2 Downlink Trunking
`
`There one fundamentaldifference between downlink and uplink: in downlink
`transmission a single (or very few) data source (in most cases) communicatesto
`manyclients while in uplink the opposite processexists.
`
`The downlink aggregation can be valuable either in the case described in section
`6 or in case of multiple base stations that can serve or multi-carrier (serving
`networks) case. When multiple service networks is present and consequently
`multiple sets of clients (each belongto different network), a proxy router can
`aggregate downlink as described in section 6.
`
`5.3 Client to client communications using range extenders
`
`Client to client communicationis very critical in the proposed invention. While
`direct connectivity using ad-hoc WiFi method is well knownin the art, the
`connection range can besignificantly enhanced using WiFi range extenders
`located in various locations. The WiFi range extenderis indirectly defined in
`802.11 standards (WDS): the extender does not require the typical Ethernet
`connectionthat is part of WiFi access point. Consequently the range extender
`can be located almost anywhere while on power sourceis required.
`
`Typical range extenders are being sold for less than 100$ and arelight weight
`and small size which makes them ideal companionto laptops and other network
`accessdevices.
`
`The main benefit of the range extenderas part of the proposed schemeis
`increasing the numberof clients that can collaborate in a given location.
`Consequently the probability to locate a client that possesses good connection
`with the serving network increases or conversely, the expected service network
`connection path-loss can be greatly reduced.
`
`6 Special case: voice centric networks
`
`Existing cellular data networks such as 1XRTT, UMTS and GPRSareless
`optimized for data service: each client connectionis limited to data rate that is far
`lower than the data rate possible by adequate link budget. This approachis a
`reminiscent of voice centric networks.
`If we can device a method through which
`
`Confidential and Proprietary
`
`12
`
`8-6-05
`
`CANrPortbAPALIB1\LCW2747392_1.D0C
`
`14
`
`
`
`multiple client channels could be seamlessly aggregated, data service
`performancecould be at par with the data centric networks such as 1XEVDO or
`HSPDA.
`
`Explanation: voice centric traffic is characterized by constant bit rate (CBR) with
`approximately 10Kb/s (not counting for voice activity duty cycle). A serving
`network accommodatescertain numberoftraffic (mainly voice) channels that are
`allocated as needed. The morevoice service is needed, more channels are
`allocated. Data traffic is mostly bursty; the bursts are normally short and could
`use data rate as high as available. Assuming low correlation between different
`subscribers, the data bursts have different time which calls for time division
`multiplex transmission: the newerdata centric wireless systemsare exploiting
`this to increase data rates (1XEVDO, WiMax, HSDPA). Thesesolutions are
`actually aggregating bandwidth to serve each subscriber on time division basis
`
`through common packet channels or similar arrangements. Managed
`
`
`
`
`Ad-hoc
`Website Server
`network
`
`
`
`
`Figure 6: Downlink aggregation network
`
`Existing voice centric network can benefit from the present invention as follows:
`say there are 10 different clients demanding data service. A serving network
`trying to serve one client could split the traffic for each client into 10 parts and
`communicate them through all 10 clients. Using the proposed communication
`_ betweenclients above,all other 9 clients can rout thetraffic to the targeted client
`via the WiFi connection (this connection could be of othertype).
`
`Confidential and Proprietary
`
`C:\NrPortbAPALIB1\LCW\2747392_1.D0C
`
`13 -
`
`15
`
`8-6-05
`
`15
`
`
`
`Obviously, this method requires routing proxy server (one or more)at the core
`network(Figure 6): the traffic source goesto the proxy router that executes the
`traffic splitting (can be done by Trunking switch). Thetraffic is than forwarded to
`the serving networkthat transport the data to/from the clients.
`
`Proxy aggregation servers can beeither part of the core network or handles by
`third party. The clients are loaded with the right proxy sever IP address
`whenever some website are accessed.
`
`This solution can provide legacy serving network with similar capability of new
`common channel based networks thereby saving significant investment.
`
`7 Performance
`
`The proposed solution provides for very large network performance improvement
`through the followings:
`
`e Leveraging on wire-line network resources (through WiFi connectivity).
`
`e
`
`Improving typical link budget betweenclient and cellular network.
`
`Weassumethat each wire-line resourceis intermittently used by its main user so
`the resource can be available to others at most times. Given the fast proliferation
`of WiFi all over the place, it is expected that under sufficient collaboration wire-
`line networkswill provide for most of the traffic bandwidth (unlike the cellular
`networks, these networks indeed have the needed bandwidth). For example, in
`a given neighborhood DSL based network can provide 150Mb/s at peak times
`' while the cellular base station covering same neighborhood can provideless than
`10Mb/s. Whenthe collaboration is sufficiently deep, the potential throughput
`gain can easily exceed 15X!
`
`To evaluate the performance gain contributed by link budget we executed
`simulation that distribute cellular subscriber at a givenarea with various
`subscribers’ densities. We calculate the path loss betweenthe serving base
`station and the subscriber terminals using accepted propagation models for
`urban and suburban environments. The following are the simulation parameters:
`
`@ Poutcoll
`
`= outage probability for collaborative user
`
`@ Pout non coll = outage probability for a non-collaborative user
`
`—@ nump
`
`= maximum numberof parallel transmission
`
`@ rate max
`Confidential and Proprietary
`
`= largest transmission rate
`14
`
`CANrPortbI\PALIB1\LCWW2747392_1.D0C
`
`,
`
`8-6-05
`
`16
`
`
`
`@ rate min
`
`= lowestpossible transmission rate
`
`m@ Db
`
`= Dr
`
`‘™ Lmax
`a model
`
`= density of base-stations per km42
`
`= density of collaborative user per km42
`
`= maximum allowed path-loss to collaborative user
`= propagation model
`
`mB
`
`= bandwidth MHz
`
`@ shadow
`
`= standard deviation of shadowingloss: 8dB
`
`ovnet coll = 0 Pout non coll = 0.005 nump = 5 rate_max = 10 rate_min = 0.1 Db = 0.25 Dr = 200 Lmax = 100 model = Wi4indoor B = 5 shadow = 1
`
`
`
`
`“Tt
`
` fractionofuserswithratelessthanindicated
`
`o = a
`
`So
`
`0,05
`
`1
`
`15
`
`2
`
`No Collaboration
`~-—-~ Collaborative Users - single link
`~~~ Collaborative Users - multiple links
`CO'
`3
`3.5
`4
`45
`
`5
`
`2.5
`RATE [MBPS]
`
` histogram of number of candidate links
`—T
`T
`
`numberof links
`
`Figure 7: CDF for data rate and number of possible under-layer
`connections simulation results for Lmax =100dB
`
`The simulation showsthat achievable data rate improvement can easily exceed
`10X.
`
`Confidential and Proprietary
`
`C:\NrPortb\PALIB1\LCWW2747392_1.D0C
`
`15
`
`17
`
`8-6-05
`
`17
`
`
`
`Combining the two performancegain elements (as described above) we
`can argue that two order of magnitude performance improvementrelative
`to traditional cellular broadband serviceis feasible.
`
`Confidential and Proprietary
`
`CANrPortbiPALIB1\LCW\2747392_1.D0C
`
`16
`
`18
`
`8-6-05
`
`18
`
`
`
`"PATENT APPLICATION SERIAL ‘NO
`
`U.S. DEPARTMENT OF COMMERCE
`PATENT AND TRADEMARK OFFICE
`FEE RECORD SHEET
`
`10/25/2005 ZIUHARL
`
`00000083.232415
`
`60728918
`
`_ 01 FCs2005
`
`100.00 DA
`
`PTO-1556_
`(5/87)
`
`8
`
`“U.S Goverrenert Prraing Office: 2003 — 660-267/00003
`
`19
`
`19
`
`