`Approved for use through 07/310006. 0MB 0651-0032
`US. Patent and Trademark Ofiice; US. DEPARTMENT OF COMMERCE
`Underihe Paperwork Reduction Act of 1995, no persons are required to respond to a collection of information unless it displays a valid OMB control number.
`PROVISIONAL APPLICATION FOR PATENT COVER SHEET
`
`INVENTOR S
`
`'
`
`‘1 This is a request for filing a PROVISIONAL APPLICATION FOR PATENT under 37 CFR 1.53(c).
`.
`E’xpress Mail Nabel No.
`12v 711413775 us
`.
`'
`1ven Name (first and middle [if any])
`
`Family Name or Surname
`
`Residence
`and either State or Forei_ Coun-
`
`Ci
`
`ll1111111111111111111111
`SOLZOL
`
`'USPT”I8 02105
`OR
`
`Additional inventors are being named on the _ separately numbered sheets attached hereto
`TITLE OF THE INVENTION 500 characters max
`
`WIRELESS BROADBAND BY CENTRALLY MANAGED PEER TO PEER NETWORKING
`
`Los Gatos, califomia
`
`i
`
`:
`
`e
`.,—
`l/
`
`,
`
`Direct all correspondence to:
`K4
`
`The address corresponding to Customer Number:
`
`02197]
`
`CORRESPONDENCE ADDRESS
`
`[:1 Firm or
`Indivrdual Name
`Address
`
`'
`
`State
`Telephone
`
`Zip
`Fax
`
`ENCLOSED APPLICATION PARTS (check all that apply)
`
`1:] Application Data Sheet. See 37 CFR 1.76
`X Specification Number ofPages
`17
`E] Drawing(s) Number ofSheets
`
`E] CD(s), Number
`D Other (specify)
`
`
`
`
`
`
`
`Fees Due: Filing Fee of $200 ($100 small entity). If the specification and drawings exceed 100 sheets of paper, the application size fee
`is also due which is $250 ($125 for small entity) for each additional 50 sheets or fraction thereof. See 35 U.S.C. 41(a)(1)(G) and 37
`CFR 116(5).
`ETHOD OF PAYMENT OF FILING FEES AND APPLICATION SIZE FEE FOR THIS PROVISIONAL APPLICATION FOR PATENT
`
`X Applicant claims small entity status. See 37 CFR 1.27.
`1:] A check or money order is enclosed to cover the filing fee and application size fee (if applicable).
`C] Payment by credit card. Form PTO-2038 is attached.
`E The Director is hereby authorized to charge filing fee and applicable size fee (if applicable) or credit any overpayment to Deposit
`Account Number:
`23-2415 . A du-licative co of this form is enclosed for fee Mrocessin.
`
`TOTAL FEE AMOUNT ($)
`100.00
`
`The invention was made by an agency of the United States Government or under a contract with an agency of the United States Government.
`
`
`
`
`
`
`
`» M
`
`X No.
`
`- ent agency and the Government contract number(s) are:
`C] Yes, the name of the U..Gove -I
`
`
`'
`y
`7
`SIGNATURE
`
`AA
`
`.
`
`
`
` Date: October 21 2005
`
`TYPED or PRINTED NAME U.P. Peter En
` REGISTRATION NO.
`(tfappropriate)
`DocketNumber:
`
`TELEPHONE.
`
`650-493-9300
`
`32354-702101
`
`
`39 666
`
`USE ONLY FOR FILING A PROVISIONAL APPLICA TION FOR PA TENT
`This collection of information is required by 37 CFR 1.51. The information is required to obtain or retain a benefit by the public which is to file (and by the USPTO
`to process) an application. Confidentiality is governed by 35 U.S.C. 122 and 37 CFR 1.11 and 1.14. This collection is estimated to take 8 hours to complete,
`including gathering, preparing, and submitting the completed application form to the USPTO. Time will vary depending upon the individual case. Any comments
`on the amount of time you require to complete this form and/or suggestions for reducing this burden, should be sent to the Chief Information Officer, US. Patent
`and Trademark Office, US. Department of Commerce, PO. Box 1450, Alexandria, VA 22313-1450. DO NOT SEND FEES OR COMPLETED FORMS TO THlS
`ADDRESS. SEND TO: Commissioner for Patents, P.0. Box 1450, Alexandria, VA 22313-1450.
`
`Ifyou need assistance in completing theform, call I-800-PTO—9l99 and select option 2.
`
`C:\NrPortbl\PALlB1\LCV\2747202_1 .DOC
`
`APPLE 1007
`
`ii
`
`1
`
`APPLE 1007
`
`
`
`WSGR Docket No. 323 54-702.]01
`
`PROVISIONAL PATENT APPLICATION
`
`WIRELESS BROADBAND BY CENTRALLY MANAGED
`
`PEER TO PEER NETWORKING
`
`Inventor(s):
`
`Shimon Scherzer,
`Citizen of United States, Residing at
`23185 Old Santa Cruz Hwy
`Los Gatos, CA 95033
`
`Wilson Sonsini Goodrich & Rosaiti
`PROFESSIONAL CORPORATION
`
`650 Page Mill Road
`Palo Alto, CA 94304
`
`(650) 493-9300
`(650) 493-6811
`
`' Express Mail Label N0. EV 711413775 US
`
`Confidential and Proprietary
`
`C:\NrPortbRPALIB1\LCV\2747392_1.DOC
`
`2
`
`
`
`1.—
`
`0 Table of Contents
`
`0
`
`1
`
`Table of Contents ........................................................................................ 1
`
`Introduction ................................................................................................. 2
`
`2 Basic principle ............................................................................................. 4
`
`3
`
`4
`
`Embodiment example ................................................................................. 5
`
`System components ................................................................................... 7
`
`4.1
`4.2
`4.3
`
`General ..... , ............................................................................................ 7
`Client operations .................................................................................... 7
`Network controller operations ................................................................. 9
`
`- 5
`
`Trunking option ......................................................................................... 10
`
`5.1
`5.2
`5.3
`
`Uplink Trunking (client to serving network) ......................................-..... 10
`Downlink Trunking .................................................. ‘.............................. 12
`Client to client communications using range extenders ....................... 12
`
`6
`
`Special case: voice centric networks ...................................................... 12
`
`7 Performance ........................................ 14
`
`Confidential and Proprietary
`
`1
`
`86-05
`
`C:\NrPortbl\PALlB1\LCV\2747392_1.DOC
`
`3
`
`
`
`1
`
`Introduction
`
`Providing ubiquos broadband wireless service anywhere is becoming the next .
`big challenge for the cellular industry. Multiple technologies are being promoted
`as potential solutions: 1XEVDO, UMTS, WiMax and others. Broadband wireless
`will become popular only if:
`
`1. Quality of service is similar to quality of current wire-line services (DSL,
`cable).
`
`2. The service is ubiquous (everywhere); this is the real advantage of
`wireless...
`
`3. Customers’ expenditure on communication will not grow (as least not
`substantially)
`‘
`
`None of technologies mentioned above can provide an economical ubiquous
`coverage while Using traditional deployment methods due to lack of spectrum;
`path loss (basic physics). Figure 1 demonstrate the “wireless reality" in urban
`environment: the probability of a good connecting link is quite low due to
`buildings obstructions. Furthermore, in comparison to wire-line capacity at
`the amount of traffic that can be supported by any imaginable wireless
`service is minuscule.
`-
`
`To illustrate the problem let consider PCS voice services: PCS network is already
`quite densely deployed (in urban areas the cells are few hundreds yards apart,
`and still voice quality is marginal. While voice service requires only about 1OKb/s
`data rate, broadband service will need two order of magnitude higher data rate
`which creates a two order of magnitude challenge gap.
`
`Broadband services are currently provided by DSL and cable technologies.
`Typical bandwidth required per 2000 subscribers (similar to a typical cellular cell
`site population) in peak time is about 150Mb/s (at DISLAM uplink). This is way
`higher than any of wireless broad band technologies mentioned above can
`deliver (typical spectrum allocation).
`
`This gap cannot be resolved only by traditional methods:
`
`0
`
`Increasing deployment density by more than order of magnitude; the cost
`(CAPEX and especially OPEX) will render the service non-economical.
`
`. Antenna technology or “smart antenna” present cost challenge and may
`bridge only small fractibn of the gap.
`
`Confidential and Proprietary
`
`2
`
`8-6-05
`
`C:\NrPortbl\PAL|B1\LCV\2747392_1 .DOC
`
`4
`
`
`
`. WiFi static mesh networks require even higher deployment density due to
`transmission power limits, radio interference and low efficiency.
`Consequently they are limited to certain areas and cannot provide for
`ubiquity. These networks (although being experimented by some
`municipalities) cannot justify themselves in the long run due to high OPEX
`(need to serve equipment in many locations)
`
`. Ad-hoc mesh-networks. This approach is aimed to extend the coverage of
`wireless network without adding more infrastructure equipment.
`.
`Subscriber terminals can relay traffic form traffic sources to terminals that
`are not in range of the serving network hence range is effectively '
`multiplied. The down side of this approach is in its inherent instability:
`critical control signaling is handled over unreliable connections. Ad-hoc .
`mesh network routing is calculated through a converging process;
`neighboring nodes are exchanging routing info and routing is repeatedly
`calculated until an optimal solution is found. Once a node becomes
`unavailable (due to power shutdown, radio interference, traffic congestion,
`location change etc.) it would take a considerable time for the system to
`recover.
`If this happen frequently, the system may not be able to recover
`at all. Hence ad-hoc mesh network has never become a real alternative to
`
`fixed infrastructure.
`
`*‘
`
`
`
`Figure 1: The “wireless reality”
`
`Confidential and Proprietary
`
`3
`
`‘
`
`8—6-05
`
`C:\NrPortbl\PALlB1\LCV\2747392_1.DOC
`
`BE§T AVAWLE COPY
`
`5
`
`
`
`2 Basic principle
`
`We consider a wireless communication network whose aim is to provide high
`speed data to mobile users. The network consists of a variety of mobile hand-
`held (ex. cell phones, PDAs) and stationary devices (ex. WiFi access points)
`equipped with wireless transceivers. Each of these devices is capable of wireless
`communications with neighboring devices within communication range. We will
`refer to these as "internal connections". Some of these devices also
`
`communicate via high speed wireless links (ex. 1XEVDO, UMTS, GPRS, EDGE.
`WiMax) or other means (ex. DSL, cable, fiber) with data sources outside the
`network (i.e. the intemet). We will refer to these as "external connections".
`Devices which do not have external connections are connected to the data
`
`sources by communicating with devices which do have external connections.
`,This communication takes place over the internal connections.
`
`All of the devices in the network are connected by low rate data links through the
`external network to a network controller. The low data rate connection serves as
`
`a control channel. We will refer to these as "control connections". For
`
`example, a dual-mode cell phone may have a WiFi internal connection and may
`use SMS or ‘IXRTT as the control connection.
`
`Network ‘ ’
`00::ggicglns
`
`controller Qua,
`
`
`§
`%¢
`
`\/
`
`
`External wire-line
`connection
`
`External wire—line
`connection
`
`
`
`Internal
`
`connection
`
`
`
`Internal
`
`
`connection _
`
`
`
`
`External wireless
`
`connection
`
`Figure 2: Network architecture
`
`The external connections provide data at different rate, depending on the type
`and quality of the connection. Because of the large variability in quality of
`
`Confidential and Proprietary
`
`4
`
`8.6.05
`
`C:\NrPor1bl\PAL|B1\LCV\2747392_1 .DOC
`
`BESJ AVAILABLE COPY
`
`6
`
`
`
`wireless connections the available data rates may vary greatly from device to
`device and, for a given device, over time. Thus if these devices were to operate
`independently they will not be able to get the data they need at the required rate.
`For example, a device with a wireless external connection may be situated so
`that it can only get a low data rate connection at a certain time. Devices which
`have no external connections will be unable to get data.
`
`By using the internal connections we can distribute the data flowing in and out of
`the external connections in a time-varying manner to as to satisfy the needs of all
`the network devices which are requesting data, in an optimal manner. This is
`accomplished by dynamically configuring the network connections to take into
`account: the data needs of each device (data rates, latency), the rates at which
`data can be transmitted over each internal and external link at any given time,
`the battery status of mobile devices, the traffic load at each device etc.
`
`The control of the network is accomplished by having the devices communicate
`with control servers on the internet, through their control channels. Each device
`transmits status information to the server about its data needs and current
`capabilities.
`It receives instructions from the server as to who it should
`communicate with, at what data rates, etc. A software client running on each of
`these devices provides the functions necessary for collecting and communicating
`status information to the control server, controlling the data flow, etc. A control
`algorithm running on the server collects information from all the devices in a
`given area, calculates the optimal configuration, and generates instructibns for
`the devices.
`'
`
`The control connections turn the unmanageable ad-hoc mesh network (see
`above) into a manageable network. Once these connections are in action, no
`converging routing calculation is needed. Furthermore, a change in the network
`connectivity is instantly reported and dealt with.
`
`3 Embodiment example
`
`The concept described above can take different embodiments. For example, an
`“under-layer” peer to peer network between mobile terminals and fixed WiFi
`access points can be used (see Figure 3). To provide control most mobile
`terminals are permanently connected to network controller (web server) through
`(low data rate) cellular connections (1XRTT, GSM, WiMax etc.). When WiFi
`resources are unavailable, the cellular connections are used as data sources as
`well.
`
`Confidential and Proprietary
`
`.
`
`5
`
`8-6-05
`
`C:\NrPortb|\PAL|B1\LCV\2747392_1.DOC
`
`7
`
`
`
`
`
` Network with software
`
`clients
`
`
`
`
`Figure 3: Cellular & WiFi implementation
`
`Since the required bandwidth for control functionality is by far lower than the
`actual traffic; consequently this arrangement could use ZG networks, SMS
`messaging etc. Since data rate can be low, the control functionality can be
`guaranteed almost everywhere (even when voice connection may not be
`feasible).
`
`In this embodiment we capitalize on the introduction of dual mode subscriber
`terminals (cellular and WiFi or Bluetooth). Although peer to peer connection
`between terminals can be done by WiFi on unlicensed spectrum, solution should
`not be limited to this approach.
`'
`
`Once central control is introduced all radio resources may be combined into a
`large collaborative network. Subscribers who join his network can enjoy the high
`performance broadband transmission capability. Subscriber that is located
`where WiFi radios are heard can identify their identity once they are part of the
`collaboration. Once identified, the subscriber can initiate a service request
`through his cellular connection (indicating which radios are in his earshot). The
`network controller than identifies the best radio source (see below) and send a
`' service request to the selected source.
`If service can be granted, the requesting
`subscriber is notified and executes connection to the selected radio source.
`
`Once being served, the network controller continues to monitor the service
`conditions and may instruct handover of the connection when needed. When
`WiFi source is not sufficient (due to poor reception, for example) the broadband
`connection can be switched to the cellular network.
`Confidential and Proprietary
`6
`
`8-6-05
`
`‘ C:\NrPortb|\PAL|B1\LCV\2747392_1.DOC
`
`8
`
`
`
`4 System components
`
`4.1 General
`
`In the system described in Figure 3 each client assumed to be able to connect to
`both external connections and to other clients in its neighborhood (through
`internal connections).
`In one embodiment a client could be a dual mode device
`using ZG or 3G radio (GPRS. 1XRTT1XEVDO, UMTS) or WiMax to
`communicate with the cellular network and using WiFi radio to communicate with
`other clients and access points. Connections to cellular network are used for
`network control and broadband connectivity. The communication with the cellular
`network can use license spectrum while the communication with other clients
`may utilize unlicensed spectrum.
`
`4.2 Client operations
`
`To join the collaboration a subscriber must have or download a software module
`(client) from network controller. By communicating with network controller over
`the cellular connection and using the WiFi radio as a sniffer the client module
`executes the following:
`
`. Acquire the following information:
`
`0 Identity of WiFi access points (or any other radio resources) that
`may be used to connect to wire-line network (sufficiently close).
`For each detected access point path loss is estimated.
`
`0 Identity of potential peer clients that can become bridges to the
`cellular network or wire-line network. For each peer client path loss
`is estimated using short interchange.
`
`0 Traffic load at access point backhaul using web interface to access
`point (When residing in the computer connected to a WiFi access
`point)
`
`0 Traffic load in and out of its associated mobile terminal
`
`0 Number of hops to the selected broadband source
`
`0 Type and speed of broadband source
`
`0 Level of unlicensed spectrum related interference conditions at the
`mobile terminal
`Confidential and Proprietary
`
`8-6-05
`
`7
`
`C:\NrPortbl\PAL|B1\LCV\2747392_1.DOC
`
`9
`
`
`
`O
`
`Client’s battery status (for battery operated devices)
`
`0 Based on the above information, the client will:
`
`Send connection request via network controller or
`
`Send connection request directly to peer (when pre-authorization
`has been granted)
`
`Disconnect from current peer when necessary (traffic load at peer
`is too high, connection quality is too low, interference is above
`threshold etc.)
`-
`
`Execute quick reconnection to a peer that has been pre-
`conditioned to accept the connection (connection context must be
`pre—downloaded to accepting peer). Quick reconnection is
`essential to maintain un-interruptible streaming services like voice
`and video.
`
`0 0
`
`Report connection quality history to network controller
`
`Disconnect after reporting disconnection reasons to network
`controller
`'
`
`Initial user terminal embodiment is shown below: this terminal is based on
`
`commonly used elements such as laptop and data capable cellphone connected
`either wirelessly or by wire.
`Improved user terminal could use 3G PCMCIA
`adaptor allowing 3G broadband service;
`
`To cellular
`network
`
`
`
`i
`
`A
`Bluetooth, mm
`4%
`Or wire connection
`fl ©§
`
`Figure 4: Initial client embodiment
`
`Confidential and Proprietary
`
`8
`
`'
`
`.
`
`8-6-05
`
`C:\NrPortbl\PAL|B1\LCV\2747392_1.DOC
`
`10
`
`10
`
`
`
`4.3 Network controller operations
`
`4.3.1 General
`
`The network controller collects the clients’ reports and continuously calculates
`the best routes by which each mobile terminal should be connected to the
`broadband media. This calculation is executed each time a subscriber connects
`or disconnects. Clients reports are mostly arriving through the external
`connections such that reporting reliabilityIs maximized.
`In addition, the network
`controller communicates with the participating WiFi access points via their web
`interface to manage to evaluate their traffic load and manage their admission list
`(for example: list of allowable MAC addresses). When 802.1X capability is
`available on access points, the network controller can provide for 802.1X
`authentication service.
`If 802.1X is not available, the network controller can use
`the WEP and MAC list to implement non 802.1X authentication.
`
`4.3.2 Access of network resources example
`
`Clients can access peers clients or access point as follows:
`
`. Clients that desire to access the WiFi network reports to network controller
`via his cellular external connection all WiFi resources in its reach.
`
`. Network controller checks which of the reported WiFi resources,
`participates in the collaboration, and for those evaluates their business
`status (backhaul traffic load).
`
`. Network controller request service form the participating access points or
`other clients by setting the allowable MAC address list to allow the
`requesting client access. When done, network controller informs the
`requesting client a list of available access point and peers
`
`0 Client connects to the best radio resource
`
`. When service is no longer needed, client disconnects form access
`point/peer and informs the network controller.
`
`4.3.3 Routing method
`
`Network controller uses the clients' reports (see 4.2) to calculate the best routes
`by which clients are served.
`
`Confidential and Proprietary
`
`C:\NrPortbl\PAL|B1\LCV\2747392_1.DOC
`
`9
`
`11
`
`8-6—05.
`
`11
`
`
`
`Path loss between clients and serving network varies greatly; in outdoor
`environment the typical standard deviation is 8 to 10dB. Consequently serving
`network signal level at each client location is expected to be a strong function of
`its location.
`
`A possible algorithm can take each of the elements mentioned above: path loss,
`load, battery status etc., attribute some weight to each and calculate a numeric
`value related to it. All these values can be collected to create a vector. The
`
`algorithm calculates the vectors’ length and selects the longest (or shortest) one;
`the network Controller instructs the subscriber to connect to the associated radio
`source.
`
`5 Trunking option
`
`The following section suggests some variations of the above methods to further
`enhance wireless connectivity.
`
`5.1 Uplink Trunking (client to serving network)
`
`A typical portable client is greatly transmission power limited (mainly due to
`battery constrains). Consequently uplink operation is a much bigger challenge
`than downlink (especially when connected directly to cellular broadband
`network). Using the under-layer network (ex. WiFi) as a trunking switch will allow
`significant increase in uplink ability: client can establish multiple connections via
`multiple clients plus himself with the target destination. The assignment of the
`various connections can be either on random basis or on amount of data and
`
`criticality basis: the client that has a better link will carrythe more challenging
`connection. For example, high capacity streaming video will be served by the
`best channel quality client while voice channel will be served by a client with less
`quality link (one can argue via versa since voice requires stricter delay jitter
`channel). The end result is' uplink with a power multiplier, sum of all peers that
`can be tapped).
`
`To further clarify the idea, suppose there are 5 clients within under-layer network
`proximity. At each instance one client requires uplink communicatiOn hence it
`utilizes all clients’ uplink thereby reducing its delay considerably (greatly affecting
`TCP/IP performance). Same principle can be utilized when each of these clients
`is being served differently; one may execute voice connection while another run
`streaming video and another downloads a large data file. Clients can than
`negotiate between themselves who will carry each of the connections following
`their link status and not based on who is being served.
`
`Confidential and Proprietary
`
`C:\NrF’ortbl\PAL|B1\LCV\2747392_1.DOC
`
`10
`
`12
`
`8-6-05
`
`12
`
`
`
`
`
`
` Aggregation sewer
`
` Sewing networks
`
`management
`
`
`
`Managed
`Ad-hoc
`network
`
`
`
`
`
`
`Website Server
`
`Figure 5: Aggregating uplink
`
`The implementation of this idea is very similar to a trunking switch; the’under—
`layer network (WiFi, ex.) is used to transport the sessions from the originating
`client to the supporting clients and all the clients participating (including the
`originator) are communicating with the serving network. Obviously, to allow
`connectivity to standard network destinations, a proxy router is added (see
`Figure 5).
`
`For example, in 1XEVDO system, where downlink is based on time division the
`. uplink still uses 1XRTT style communication (CDMA). One client can
`communicate its uplink data to multiple clients (through the client to client
`connections, ex. WiFi) and than all the connected clients can concurrently
`transmit the data over their individual uplinks (code channels). With WiMax, sub-
`carriers could be used in exchange for the CDMA codes.
`
`Comment: non time division based uplink is very common within mobile packet
`serving networks since fast feedback from clients (downlink quality) can
`dramatically help the downlink scheduling. This feedback is normally used to
`increase the probability the client will be served when its downlink conditions are
`at their best.
`
`-
`
`Confidential and Proprietary
`
`C:\NrPortbl\F’AL|B1\LCV\2747392_1.DOC
`
`11
`
`13
`
`8-6-05
`
`13
`
`
`
`5.2 Downlink Trunking
`
`There one fundamental difference between downlink and uplink: in downlink
`transmission a single (or very few) data source (in most cases) communicates to
`many clients while in uplink the opposite process exists.
`
`The downlink aggregation can be valuable either in the case described in section
`6 or in case of multiple base stations that can serve or multi-carrier (serving
`networks) case. When multiple service networks is present and consequently
`multiple sets of clients (each belong to different network), a proxy router can
`aggregate downlink as described in section 6.
`
`5.3 Client to client communications using range extenders
`
`Client to client communication is very critical in the proposed invention. While
`direct connectivity using ad-hoc WiFi method is well known in the art, the
`connection range can be significantly enhanced using WiFi range extenders
`located in various locations. The WiFi range extender is indirectly defined in
`802.11 standards (WDS): the extender does not require the typical Ethernet
`connectionthat is part of WiFi access point. Consequently the range extender
`can be located almost anywhere while on power source isvrequired.
`
`Typical range extenders are being sold for less than 100$ and are light weight
`and small size which makes them ideal companion to laptops and other network
`access devices.
`-
`
`The main benefit of the range extender as part of the proposed scheme is
`increasing the number of clients that can collaborate in a given location.
`Consequently the probability to locate a client that possesses good connection
`with the serving network increases or conversely, the expected service network
`connection path-loss can be greatly reduced.
`
`6 Special case: voice centric netWorks
`
`Existing cellular data networks such as 1XRTT, UMTS and GPRS are less
`optimized for data service: each client connection is limited to data rate that is far
`lower than the data rate possible by adequate link budget. This approach is a
`reminiscent of voice centric networks.
`If we can device a method through which
`
`Confidential and Proprietary
`
`C:\NrPortb|\PAL|B1\LCV\2747392_1.DOC
`
`12
`
`14
`
`8-6-05
`
`14
`
`
`
`multiple client channels could be seamlessly aggregated. data service
`performance could be at par with the data centric networks such as 1XEVDO or
`HSPDA.
`
`Explanation: voice centric traffic is characterized by constant bit rate (CBR) with
`approximately 10Kb/s (not counting for voice activity duty cycle). A serving
`network accommodates certain number of traffic (mainly voice) channels that are
`allocated as needed. The more voice service is needed, more channels are
`allocated. Data traffic is mostly bursty; the bursts are normally short and could
`use data rate as high as available. Assuming low correlation between different
`subscribers, the data bursts have different time which calls for time division
`multiplex transmission: the newer data centric wireless systems are exploiting
`this to increase data rates (1XEVDO, WiMax, HSDPA). These solutions are
`actually aggregating bandwidth to serve each subscriber on time division basis
`through common packet channels or similar arrangements.
`
`Website Server
`
`Figure 6: Downlink aggregation network
`
`Existing voice centric network can benefit from the present invention as follows:
`say there are 10 different clients demanding data service. A serving network
`trying to serve one client could split the traffic for each client into 10 parts and
`communicate them through all 10 clients. Using the proposed communication
`. between clients above, all other 9 clients can rout the traffic to the targeted client
`via the WiFi connection (this connection could be of other type).
`
`Confidential and Proprietary
`
`C:\NrPortbl\PAL|B1\LCV\2747392_1 .000
`
`13 ‘
`
`15
`
`8-6-05
`
`15
`
`
`
`Obviously, this method requires routing proxy server (one or more) at the core
`network (Figure 6): the traffic source goes to the proxy router that executes the
`traffic splitting (can be done by Trunking switch). The traffic is than fonNarded to
`the serving network that transport the data to/from the clients.
`
`Proxy aggregation servers can be either part of the core network or handles by
`third party. The clients are loaded with the right proxy sever IP address
`whenever some website are accessed.
`
`This solution can provide legacy serving network with similar capability of new
`common channel based networks thereby saving significant investment.
`
`7 Performance
`
`The proposed solution provides for very large network performanceimprovement
`through the followings:
`
`. Leveraging on wire-line network resources (through WiFi connectivity).
`
`0
`
`Improving typical link budget between client and cellular network.
`
`We assume that each wire-line resource is intermittently used by its main user so
`the resource can be available to others at most times. Given the fast proliferation
`of WiFi all over the place, it is expected that under sufficient collaboration wire-
`line networks will provide for most of the traffic bandwidth (unlike the cellular
`networks, these networks indeed have the needed bandwidth). For example, in
`a given neighborhood DSL based network can provide 150Mb/s at peak times
`' while the cellular base station covering same neighborhood can provide less than
`10Mb/s. When the collaboration is sufficiently deep, the potential throughput
`gain can easily exceed 15X!
`
`To evaluate the performance gain contributed by link budget we executed
`simulation that distribute cellular subscriber at a given area with various
`subscribers’ densities. We calculate the path loss between the serving base
`station and the subscriber terminals using accepted propagation models for
`urban and suburban environments. The following are the simulation parameters:
`
`l Pout coll
`
`= outage probability for collaborative user
`
`I Pout non coll = outage probability for a nonacollaborative user
`
`I nump
`
`= maximum number of parallel transmission
`
`I rate max
`Confidential and Proprietary
`
`largest transmission rate
`14
`
`C:\NrPortbl\PAL|B1\LCV\2747392__1 .000
`
`16
`
`'
`
`8-6-05
`
`16
`
`
`
`I rate min
`
`= lowest possible transmission rate
`
`I Db
`
`I Dr
`
`= density of base-stations per km"2
`
`= density of collaborative user per km"2
`
`'I Lmax
`
`= maximum allowed path-loss to collaborative user
`
`I' model
`
`= propagation model
`
`I B
`
`= bandwidth MHz
`
`I shadow
`
`= standard deviation ol‘ shadowing loss: 8dB
`
`t coll = 0 Pout non coll = 0.005 nump= 5 lale_rnax =10 rate_min = 0.1 DD = 0.25 Dr = 200 Lmax = 100 model = WI-indoor B = 5 shadow = 1
`
`o1:302
`
`0.15
`
`0
`
`0.05
`
`I
`
`
`
`
`
`fractionofuserswithratelessthanindicated
`
`'
`
`05
`
`'
`
`1
`
`'
`
`1.5
`
`‘
`
`2
`
`No Collaboration
`' _ Collaborative Users - single link
`*— Collaborative Users - multiple links
`3
`3.5
`4
`4.5
`
`2.5
`RATE [MBPS]
`
`5
`
` 0
`o_.
`
`
`
`histogram of number of candidate links
`‘r
`”r
`"r—
`
`number of links
`
`Figure 7: CDF for data rate and number of possible under-layer
`connections simulation results for Lmax =1 OOdB
`
`The simulation shows that achievable data rate improvement can easily exceed
`10X.
`
`Confidential and Proprietary
`
`C:\NrPortb|\PAL|B1\LCV\2747392_1.DOC
`
`15
`
`17
`
`8-6-05
`
`17
`
`
`
`Combining the two performance gain elements (as described above) we
`can argue that two order of magnitude performance improvement relative
`to traditional cellular broadband service is feasible.
`
`Confidential and Proprietary
`
`C:\NrPortbl\PAL|B1\LCV\2747392_1.DOC
`
`16
`
`18
`
`8-6-05
`
`18
`
`
`
`' PATENT APPLICATION SERIAL No
`
`us. DEPARTMENT OF COMMERCE
`PATENT AND TRADEMARK OFFICE
`FEE RECORD SHEET
`
`10/25/2005 ZJUHARI
`
`00000033 232415
`
`60728918
`
`. 01 FC:2005
`
`100.00 DA
`
`PTO-1556 ‘
`. (5/87)
`
`a
`
`11.8 WM”: anon—mm
`
`19
`
`19
`
`