throbber
PTOISE/16 (07-05)
`Approved for use through 07/310006. 0MB 0651-0032
`US. Patent and Trademark Ofiice; US. DEPARTMENT OF COMMERCE
`Underihe Paperwork Reduction Act of 1995, no persons are required to respond to a collection of information unless it displays a valid OMB control number.
`PROVISIONAL APPLICATION FOR PATENT COVER SHEET
`
`INVENTOR S
`
`'
`
`‘1 This is a request for filing a PROVISIONAL APPLICATION FOR PATENT under 37 CFR 1.53(c).
`.
`E’xpress Mail Nabel No.
`12v 711413775 us
`.
`'
`1ven Name (first and middle [if any])
`
`Family Name or Surname
`
`Residence
`and either State or Forei_ Coun-
`
`Ci
`
`ll1111111111111111111111
`SOLZOL
`
`'USPT”I8 02105
`OR
`
`Additional inventors are being named on the _ separately numbered sheets attached hereto
`TITLE OF THE INVENTION 500 characters max
`
`WIRELESS BROADBAND BY CENTRALLY MANAGED PEER TO PEER NETWORKING
`
`Los Gatos, califomia
`
`i
`
`:
`
`e
`.,—
`l/
`
`,
`
`Direct all correspondence to:
`K4
`
`The address corresponding to Customer Number:
`
`02197]
`
`CORRESPONDENCE ADDRESS
`
`[:1 Firm or
`Indivrdual Name
`Address
`
`'
`
`State
`Telephone
`
`Zip
`Fax
`
`ENCLOSED APPLICATION PARTS (check all that apply)
`
`1:] Application Data Sheet. See 37 CFR 1.76
`X Specification Number ofPages
`17
`E] Drawing(s) Number ofSheets
`
`E] CD(s), Number
`D Other (specify)
`
`
`
`
`
`
`
`Fees Due: Filing Fee of $200 ($100 small entity). If the specification and drawings exceed 100 sheets of paper, the application size fee
`is also due which is $250 ($125 for small entity) for each additional 50 sheets or fraction thereof. See 35 U.S.C. 41(a)(1)(G) and 37
`CFR 116(5).
`ETHOD OF PAYMENT OF FILING FEES AND APPLICATION SIZE FEE FOR THIS PROVISIONAL APPLICATION FOR PATENT
`
`X Applicant claims small entity status. See 37 CFR 1.27.
`1:] A check or money order is enclosed to cover the filing fee and application size fee (if applicable).
`C] Payment by credit card. Form PTO-2038 is attached.
`E The Director is hereby authorized to charge filing fee and applicable size fee (if applicable) or credit any overpayment to Deposit
`Account Number:
`23-2415 . A du-licative co of this form is enclosed for fee Mrocessin.
`
`TOTAL FEE AMOUNT ($)
`100.00
`
`The invention was made by an agency of the United States Government or under a contract with an agency of the United States Government.
`
`
`
`
`
`
`
`» M
`
`X No.
`
`- ent agency and the Government contract number(s) are:
`C] Yes, the name of the U..Gove -I
`
`
`'
`y
`7
`SIGNATURE
`
`AA
`
`.
`
`
`
` Date: October 21 2005
`
`TYPED or PRINTED NAME U.P. Peter En
` REGISTRATION NO.
`(tfappropriate)
`DocketNumber:
`
`TELEPHONE.
`
`650-493-9300
`
`32354-702101
`
`
`39 666
`
`USE ONLY FOR FILING A PROVISIONAL APPLICA TION FOR PA TENT
`This collection of information is required by 37 CFR 1.51. The information is required to obtain or retain a benefit by the public which is to file (and by the USPTO
`to process) an application. Confidentiality is governed by 35 U.S.C. 122 and 37 CFR 1.11 and 1.14. This collection is estimated to take 8 hours to complete,
`including gathering, preparing, and submitting the completed application form to the USPTO. Time will vary depending upon the individual case. Any comments
`on the amount of time you require to complete this form and/or suggestions for reducing this burden, should be sent to the Chief Information Officer, US. Patent
`and Trademark Office, US. Department of Commerce, PO. Box 1450, Alexandria, VA 22313-1450. DO NOT SEND FEES OR COMPLETED FORMS TO THlS
`ADDRESS. SEND TO: Commissioner for Patents, P.0. Box 1450, Alexandria, VA 22313-1450.
`
`Ifyou need assistance in completing theform, call I-800-PTO—9l99 and select option 2.
`
`C:\NrPortbl\PALlB1\LCV\2747202_1 .DOC
`
`APPLE 1007
`
`ii
`
`1
`
`APPLE 1007
`
`

`

`WSGR Docket No. 323 54-702.]01
`
`PROVISIONAL PATENT APPLICATION
`
`WIRELESS BROADBAND BY CENTRALLY MANAGED
`
`PEER TO PEER NETWORKING
`
`Inventor(s):
`
`Shimon Scherzer,
`Citizen of United States, Residing at
`23185 Old Santa Cruz Hwy
`Los Gatos, CA 95033
`
`Wilson Sonsini Goodrich & Rosaiti
`PROFESSIONAL CORPORATION
`
`650 Page Mill Road
`Palo Alto, CA 94304
`
`(650) 493-9300
`(650) 493-6811
`
`' Express Mail Label N0. EV 711413775 US
`
`Confidential and Proprietary
`
`C:\NrPortbRPALIB1\LCV\2747392_1.DOC
`
`2
`
`

`

`1.—
`
`0 Table of Contents
`
`0
`
`1
`
`Table of Contents ........................................................................................ 1
`
`Introduction ................................................................................................. 2
`
`2 Basic principle ............................................................................................. 4
`
`3
`
`4
`
`Embodiment example ................................................................................. 5
`
`System components ................................................................................... 7
`
`4.1
`4.2
`4.3
`
`General ..... , ............................................................................................ 7
`Client operations .................................................................................... 7
`Network controller operations ................................................................. 9
`
`- 5
`
`Trunking option ......................................................................................... 10
`
`5.1
`5.2
`5.3
`
`Uplink Trunking (client to serving network) ......................................-..... 10
`Downlink Trunking .................................................. ‘.............................. 12
`Client to client communications using range extenders ....................... 12
`
`6
`
`Special case: voice centric networks ...................................................... 12
`
`7 Performance ........................................ 14
`
`Confidential and Proprietary
`
`1
`
`86-05
`
`C:\NrPortbl\PALlB1\LCV\2747392_1.DOC
`
`3
`
`

`

`1
`
`Introduction
`
`Providing ubiquos broadband wireless service anywhere is becoming the next .
`big challenge for the cellular industry. Multiple technologies are being promoted
`as potential solutions: 1XEVDO, UMTS, WiMax and others. Broadband wireless
`will become popular only if:
`
`1. Quality of service is similar to quality of current wire-line services (DSL,
`cable).
`
`2. The service is ubiquous (everywhere); this is the real advantage of
`wireless...
`
`3. Customers’ expenditure on communication will not grow (as least not
`substantially)
`‘
`
`None of technologies mentioned above can provide an economical ubiquous
`coverage while Using traditional deployment methods due to lack of spectrum;
`path loss (basic physics). Figure 1 demonstrate the “wireless reality" in urban
`environment: the probability of a good connecting link is quite low due to
`buildings obstructions. Furthermore, in comparison to wire-line capacity at
`the amount of traffic that can be supported by any imaginable wireless
`service is minuscule.
`-
`
`To illustrate the problem let consider PCS voice services: PCS network is already
`quite densely deployed (in urban areas the cells are few hundreds yards apart,
`and still voice quality is marginal. While voice service requires only about 1OKb/s
`data rate, broadband service will need two order of magnitude higher data rate
`which creates a two order of magnitude challenge gap.
`
`Broadband services are currently provided by DSL and cable technologies.
`Typical bandwidth required per 2000 subscribers (similar to a typical cellular cell
`site population) in peak time is about 150Mb/s (at DISLAM uplink). This is way
`higher than any of wireless broad band technologies mentioned above can
`deliver (typical spectrum allocation).
`
`This gap cannot be resolved only by traditional methods:
`
`0
`
`Increasing deployment density by more than order of magnitude; the cost
`(CAPEX and especially OPEX) will render the service non-economical.
`
`. Antenna technology or “smart antenna” present cost challenge and may
`bridge only small fractibn of the gap.
`
`Confidential and Proprietary
`
`2
`
`8-6-05
`
`C:\NrPortbl\PAL|B1\LCV\2747392_1 .DOC
`
`4
`
`

`

`. WiFi static mesh networks require even higher deployment density due to
`transmission power limits, radio interference and low efficiency.
`Consequently they are limited to certain areas and cannot provide for
`ubiquity. These networks (although being experimented by some
`municipalities) cannot justify themselves in the long run due to high OPEX
`(need to serve equipment in many locations)
`
`. Ad-hoc mesh-networks. This approach is aimed to extend the coverage of
`wireless network without adding more infrastructure equipment.
`.
`Subscriber terminals can relay traffic form traffic sources to terminals that
`are not in range of the serving network hence range is effectively '
`multiplied. The down side of this approach is in its inherent instability:
`critical control signaling is handled over unreliable connections. Ad-hoc .
`mesh network routing is calculated through a converging process;
`neighboring nodes are exchanging routing info and routing is repeatedly
`calculated until an optimal solution is found. Once a node becomes
`unavailable (due to power shutdown, radio interference, traffic congestion,
`location change etc.) it would take a considerable time for the system to
`recover.
`If this happen frequently, the system may not be able to recover
`at all. Hence ad-hoc mesh network has never become a real alternative to
`
`fixed infrastructure.
`
`*‘
`
`
`
`Figure 1: The “wireless reality”
`
`Confidential and Proprietary
`
`3
`
`‘
`
`8—6-05
`
`C:\NrPortbl\PALlB1\LCV\2747392_1.DOC
`
`BE§T AVAWLE COPY
`
`5
`
`

`

`2 Basic principle
`
`We consider a wireless communication network whose aim is to provide high
`speed data to mobile users. The network consists of a variety of mobile hand-
`held (ex. cell phones, PDAs) and stationary devices (ex. WiFi access points)
`equipped with wireless transceivers. Each of these devices is capable of wireless
`communications with neighboring devices within communication range. We will
`refer to these as "internal connections". Some of these devices also
`
`communicate via high speed wireless links (ex. 1XEVDO, UMTS, GPRS, EDGE.
`WiMax) or other means (ex. DSL, cable, fiber) with data sources outside the
`network (i.e. the intemet). We will refer to these as "external connections".
`Devices which do not have external connections are connected to the data
`
`sources by communicating with devices which do have external connections.
`,This communication takes place over the internal connections.
`
`All of the devices in the network are connected by low rate data links through the
`external network to a network controller. The low data rate connection serves as
`
`a control channel. We will refer to these as "control connections". For
`
`example, a dual-mode cell phone may have a WiFi internal connection and may
`use SMS or ‘IXRTT as the control connection.
`
`Network ‘ ’
`00::ggicglns
`
`controller Qua,
`
`

`%¢
`
`\/
`
`
`External wire-line
`connection
`
`External wire—line
`connection
`
`
`
`Internal
`
`connection
`
`
`
`Internal
`
`
`connection _
`
`
`
`
`External wireless
`
`connection
`
`Figure 2: Network architecture
`
`The external connections provide data at different rate, depending on the type
`and quality of the connection. Because of the large variability in quality of
`
`Confidential and Proprietary
`
`4
`
`8.6.05
`
`C:\NrPor1bl\PAL|B1\LCV\2747392_1 .DOC
`
`BESJ AVAILABLE COPY
`
`6
`
`

`

`wireless connections the available data rates may vary greatly from device to
`device and, for a given device, over time. Thus if these devices were to operate
`independently they will not be able to get the data they need at the required rate.
`For example, a device with a wireless external connection may be situated so
`that it can only get a low data rate connection at a certain time. Devices which
`have no external connections will be unable to get data.
`
`By using the internal connections we can distribute the data flowing in and out of
`the external connections in a time-varying manner to as to satisfy the needs of all
`the network devices which are requesting data, in an optimal manner. This is
`accomplished by dynamically configuring the network connections to take into
`account: the data needs of each device (data rates, latency), the rates at which
`data can be transmitted over each internal and external link at any given time,
`the battery status of mobile devices, the traffic load at each device etc.
`
`The control of the network is accomplished by having the devices communicate
`with control servers on the internet, through their control channels. Each device
`transmits status information to the server about its data needs and current
`capabilities.
`It receives instructions from the server as to who it should
`communicate with, at what data rates, etc. A software client running on each of
`these devices provides the functions necessary for collecting and communicating
`status information to the control server, controlling the data flow, etc. A control
`algorithm running on the server collects information from all the devices in a
`given area, calculates the optimal configuration, and generates instructibns for
`the devices.
`'
`
`The control connections turn the unmanageable ad-hoc mesh network (see
`above) into a manageable network. Once these connections are in action, no
`converging routing calculation is needed. Furthermore, a change in the network
`connectivity is instantly reported and dealt with.
`
`3 Embodiment example
`
`The concept described above can take different embodiments. For example, an
`“under-layer” peer to peer network between mobile terminals and fixed WiFi
`access points can be used (see Figure 3). To provide control most mobile
`terminals are permanently connected to network controller (web server) through
`(low data rate) cellular connections (1XRTT, GSM, WiMax etc.). When WiFi
`resources are unavailable, the cellular connections are used as data sources as
`well.
`
`Confidential and Proprietary
`
`.
`
`5
`
`8-6-05
`
`C:\NrPortb|\PAL|B1\LCV\2747392_1.DOC
`
`7
`
`

`

`
`
` Network with software
`
`clients
`
`
`
`
`Figure 3: Cellular & WiFi implementation
`
`Since the required bandwidth for control functionality is by far lower than the
`actual traffic; consequently this arrangement could use ZG networks, SMS
`messaging etc. Since data rate can be low, the control functionality can be
`guaranteed almost everywhere (even when voice connection may not be
`feasible).
`
`In this embodiment we capitalize on the introduction of dual mode subscriber
`terminals (cellular and WiFi or Bluetooth). Although peer to peer connection
`between terminals can be done by WiFi on unlicensed spectrum, solution should
`not be limited to this approach.
`'
`
`Once central control is introduced all radio resources may be combined into a
`large collaborative network. Subscribers who join his network can enjoy the high
`performance broadband transmission capability. Subscriber that is located
`where WiFi radios are heard can identify their identity once they are part of the
`collaboration. Once identified, the subscriber can initiate a service request
`through his cellular connection (indicating which radios are in his earshot). The
`network controller than identifies the best radio source (see below) and send a
`' service request to the selected source.
`If service can be granted, the requesting
`subscriber is notified and executes connection to the selected radio source.
`
`Once being served, the network controller continues to monitor the service
`conditions and may instruct handover of the connection when needed. When
`WiFi source is not sufficient (due to poor reception, for example) the broadband
`connection can be switched to the cellular network.
`Confidential and Proprietary
`6
`
`8-6-05
`
`‘ C:\NrPortb|\PAL|B1\LCV\2747392_1.DOC
`
`8
`
`

`

`4 System components
`
`4.1 General
`
`In the system described in Figure 3 each client assumed to be able to connect to
`both external connections and to other clients in its neighborhood (through
`internal connections).
`In one embodiment a client could be a dual mode device
`using ZG or 3G radio (GPRS. 1XRTT1XEVDO, UMTS) or WiMax to
`communicate with the cellular network and using WiFi radio to communicate with
`other clients and access points. Connections to cellular network are used for
`network control and broadband connectivity. The communication with the cellular
`network can use license spectrum while the communication with other clients
`may utilize unlicensed spectrum.
`
`4.2 Client operations
`
`To join the collaboration a subscriber must have or download a software module
`(client) from network controller. By communicating with network controller over
`the cellular connection and using the WiFi radio as a sniffer the client module
`executes the following:
`
`. Acquire the following information:
`
`0 Identity of WiFi access points (or any other radio resources) that
`may be used to connect to wire-line network (sufficiently close).
`For each detected access point path loss is estimated.
`
`0 Identity of potential peer clients that can become bridges to the
`cellular network or wire-line network. For each peer client path loss
`is estimated using short interchange.
`
`0 Traffic load at access point backhaul using web interface to access
`point (When residing in the computer connected to a WiFi access
`point)
`
`0 Traffic load in and out of its associated mobile terminal
`
`0 Number of hops to the selected broadband source
`
`0 Type and speed of broadband source
`
`0 Level of unlicensed spectrum related interference conditions at the
`mobile terminal
`Confidential and Proprietary
`
`8-6-05
`
`7
`
`C:\NrPortbl\PAL|B1\LCV\2747392_1.DOC
`
`9
`
`

`

`O
`
`Client’s battery status (for battery operated devices)
`
`0 Based on the above information, the client will:
`
`Send connection request via network controller or
`
`Send connection request directly to peer (when pre-authorization
`has been granted)
`
`Disconnect from current peer when necessary (traffic load at peer
`is too high, connection quality is too low, interference is above
`threshold etc.)
`-
`
`Execute quick reconnection to a peer that has been pre-
`conditioned to accept the connection (connection context must be
`pre—downloaded to accepting peer). Quick reconnection is
`essential to maintain un-interruptible streaming services like voice
`and video.
`
`0 0
`
`Report connection quality history to network controller
`
`Disconnect after reporting disconnection reasons to network
`controller
`'
`
`Initial user terminal embodiment is shown below: this terminal is based on
`
`commonly used elements such as laptop and data capable cellphone connected
`either wirelessly or by wire.
`Improved user terminal could use 3G PCMCIA
`adaptor allowing 3G broadband service;
`
`To cellular
`network
`
`
`
`i
`
`A
`Bluetooth, mm
`4%
`Or wire connection
`fl ©§
`
`Figure 4: Initial client embodiment
`
`Confidential and Proprietary
`
`8
`
`'
`
`.
`
`8-6-05
`
`C:\NrPortbl\PAL|B1\LCV\2747392_1.DOC
`
`10
`
`10
`
`

`

`4.3 Network controller operations
`
`4.3.1 General
`
`The network controller collects the clients’ reports and continuously calculates
`the best routes by which each mobile terminal should be connected to the
`broadband media. This calculation is executed each time a subscriber connects
`or disconnects. Clients reports are mostly arriving through the external
`connections such that reporting reliabilityIs maximized.
`In addition, the network
`controller communicates with the participating WiFi access points via their web
`interface to manage to evaluate their traffic load and manage their admission list
`(for example: list of allowable MAC addresses). When 802.1X capability is
`available on access points, the network controller can provide for 802.1X
`authentication service.
`If 802.1X is not available, the network controller can use
`the WEP and MAC list to implement non 802.1X authentication.
`
`4.3.2 Access of network resources example
`
`Clients can access peers clients or access point as follows:
`
`. Clients that desire to access the WiFi network reports to network controller
`via his cellular external connection all WiFi resources in its reach.
`
`. Network controller checks which of the reported WiFi resources,
`participates in the collaboration, and for those evaluates their business
`status (backhaul traffic load).
`
`. Network controller request service form the participating access points or
`other clients by setting the allowable MAC address list to allow the
`requesting client access. When done, network controller informs the
`requesting client a list of available access point and peers
`
`0 Client connects to the best radio resource
`
`. When service is no longer needed, client disconnects form access
`point/peer and informs the network controller.
`
`4.3.3 Routing method
`
`Network controller uses the clients' reports (see 4.2) to calculate the best routes
`by which clients are served.
`
`Confidential and Proprietary
`
`C:\NrPortbl\PAL|B1\LCV\2747392_1.DOC
`
`9
`
`11
`
`8-6—05.
`
`11
`
`

`

`Path loss between clients and serving network varies greatly; in outdoor
`environment the typical standard deviation is 8 to 10dB. Consequently serving
`network signal level at each client location is expected to be a strong function of
`its location.
`
`A possible algorithm can take each of the elements mentioned above: path loss,
`load, battery status etc., attribute some weight to each and calculate a numeric
`value related to it. All these values can be collected to create a vector. The
`
`algorithm calculates the vectors’ length and selects the longest (or shortest) one;
`the network Controller instructs the subscriber to connect to the associated radio
`source.
`
`5 Trunking option
`
`The following section suggests some variations of the above methods to further
`enhance wireless connectivity.
`
`5.1 Uplink Trunking (client to serving network)
`
`A typical portable client is greatly transmission power limited (mainly due to
`battery constrains). Consequently uplink operation is a much bigger challenge
`than downlink (especially when connected directly to cellular broadband
`network). Using the under-layer network (ex. WiFi) as a trunking switch will allow
`significant increase in uplink ability: client can establish multiple connections via
`multiple clients plus himself with the target destination. The assignment of the
`various connections can be either on random basis or on amount of data and
`
`criticality basis: the client that has a better link will carrythe more challenging
`connection. For example, high capacity streaming video will be served by the
`best channel quality client while voice channel will be served by a client with less
`quality link (one can argue via versa since voice requires stricter delay jitter
`channel). The end result is' uplink with a power multiplier, sum of all peers that
`can be tapped).
`
`To further clarify the idea, suppose there are 5 clients within under-layer network
`proximity. At each instance one client requires uplink communicatiOn hence it
`utilizes all clients’ uplink thereby reducing its delay considerably (greatly affecting
`TCP/IP performance). Same principle can be utilized when each of these clients
`is being served differently; one may execute voice connection while another run
`streaming video and another downloads a large data file. Clients can than
`negotiate between themselves who will carry each of the connections following
`their link status and not based on who is being served.
`
`Confidential and Proprietary
`
`C:\NrF’ortbl\PAL|B1\LCV\2747392_1.DOC
`
`10
`
`12
`
`8-6-05
`
`12
`
`

`

`
`
`
` Aggregation sewer
`
` Sewing networks
`
`management
`
`
`
`Managed
`Ad-hoc
`network
`
`
`
`
`
`
`Website Server
`
`Figure 5: Aggregating uplink
`
`The implementation of this idea is very similar to a trunking switch; the’under—
`layer network (WiFi, ex.) is used to transport the sessions from the originating
`client to the supporting clients and all the clients participating (including the
`originator) are communicating with the serving network. Obviously, to allow
`connectivity to standard network destinations, a proxy router is added (see
`Figure 5).
`
`For example, in 1XEVDO system, where downlink is based on time division the
`. uplink still uses 1XRTT style communication (CDMA). One client can
`communicate its uplink data to multiple clients (through the client to client
`connections, ex. WiFi) and than all the connected clients can concurrently
`transmit the data over their individual uplinks (code channels). With WiMax, sub-
`carriers could be used in exchange for the CDMA codes.
`
`Comment: non time division based uplink is very common within mobile packet
`serving networks since fast feedback from clients (downlink quality) can
`dramatically help the downlink scheduling. This feedback is normally used to
`increase the probability the client will be served when its downlink conditions are
`at their best.
`
`-
`
`Confidential and Proprietary
`
`C:\NrPortbl\F’AL|B1\LCV\2747392_1.DOC
`
`11
`
`13
`
`8-6-05
`
`13
`
`

`

`5.2 Downlink Trunking
`
`There one fundamental difference between downlink and uplink: in downlink
`transmission a single (or very few) data source (in most cases) communicates to
`many clients while in uplink the opposite process exists.
`
`The downlink aggregation can be valuable either in the case described in section
`6 or in case of multiple base stations that can serve or multi-carrier (serving
`networks) case. When multiple service networks is present and consequently
`multiple sets of clients (each belong to different network), a proxy router can
`aggregate downlink as described in section 6.
`
`5.3 Client to client communications using range extenders
`
`Client to client communication is very critical in the proposed invention. While
`direct connectivity using ad-hoc WiFi method is well known in the art, the
`connection range can be significantly enhanced using WiFi range extenders
`located in various locations. The WiFi range extender is indirectly defined in
`802.11 standards (WDS): the extender does not require the typical Ethernet
`connectionthat is part of WiFi access point. Consequently the range extender
`can be located almost anywhere while on power source isvrequired.
`
`Typical range extenders are being sold for less than 100$ and are light weight
`and small size which makes them ideal companion to laptops and other network
`access devices.
`-
`
`The main benefit of the range extender as part of the proposed scheme is
`increasing the number of clients that can collaborate in a given location.
`Consequently the probability to locate a client that possesses good connection
`with the serving network increases or conversely, the expected service network
`connection path-loss can be greatly reduced.
`
`6 Special case: voice centric netWorks
`
`Existing cellular data networks such as 1XRTT, UMTS and GPRS are less
`optimized for data service: each client connection is limited to data rate that is far
`lower than the data rate possible by adequate link budget. This approach is a
`reminiscent of voice centric networks.
`If we can device a method through which
`
`Confidential and Proprietary
`
`C:\NrPortb|\PAL|B1\LCV\2747392_1.DOC
`
`12
`
`14
`
`8-6-05
`
`14
`
`

`

`multiple client channels could be seamlessly aggregated. data service
`performance could be at par with the data centric networks such as 1XEVDO or
`HSPDA.
`
`Explanation: voice centric traffic is characterized by constant bit rate (CBR) with
`approximately 10Kb/s (not counting for voice activity duty cycle). A serving
`network accommodates certain number of traffic (mainly voice) channels that are
`allocated as needed. The more voice service is needed, more channels are
`allocated. Data traffic is mostly bursty; the bursts are normally short and could
`use data rate as high as available. Assuming low correlation between different
`subscribers, the data bursts have different time which calls for time division
`multiplex transmission: the newer data centric wireless systems are exploiting
`this to increase data rates (1XEVDO, WiMax, HSDPA). These solutions are
`actually aggregating bandwidth to serve each subscriber on time division basis
`through common packet channels or similar arrangements.
`
`Website Server
`
`Figure 6: Downlink aggregation network
`
`Existing voice centric network can benefit from the present invention as follows:
`say there are 10 different clients demanding data service. A serving network
`trying to serve one client could split the traffic for each client into 10 parts and
`communicate them through all 10 clients. Using the proposed communication
`. between clients above, all other 9 clients can rout the traffic to the targeted client
`via the WiFi connection (this connection could be of other type).
`
`Confidential and Proprietary
`
`C:\NrPortbl\PAL|B1\LCV\2747392_1 .000
`
`13 ‘
`
`15
`
`8-6-05
`
`15
`
`

`

`Obviously, this method requires routing proxy server (one or more) at the core
`network (Figure 6): the traffic source goes to the proxy router that executes the
`traffic splitting (can be done by Trunking switch). The traffic is than fonNarded to
`the serving network that transport the data to/from the clients.
`
`Proxy aggregation servers can be either part of the core network or handles by
`third party. The clients are loaded with the right proxy sever IP address
`whenever some website are accessed.
`
`This solution can provide legacy serving network with similar capability of new
`common channel based networks thereby saving significant investment.
`
`7 Performance
`
`The proposed solution provides for very large network performanceimprovement
`through the followings:
`
`. Leveraging on wire-line network resources (through WiFi connectivity).
`
`0
`
`Improving typical link budget between client and cellular network.
`
`We assume that each wire-line resource is intermittently used by its main user so
`the resource can be available to others at most times. Given the fast proliferation
`of WiFi all over the place, it is expected that under sufficient collaboration wire-
`line networks will provide for most of the traffic bandwidth (unlike the cellular
`networks, these networks indeed have the needed bandwidth). For example, in
`a given neighborhood DSL based network can provide 150Mb/s at peak times
`' while the cellular base station covering same neighborhood can provide less than
`10Mb/s. When the collaboration is sufficiently deep, the potential throughput
`gain can easily exceed 15X!
`
`To evaluate the performance gain contributed by link budget we executed
`simulation that distribute cellular subscriber at a given area with various
`subscribers’ densities. We calculate the path loss between the serving base
`station and the subscriber terminals using accepted propagation models for
`urban and suburban environments. The following are the simulation parameters:
`
`l Pout coll
`
`= outage probability for collaborative user
`
`I Pout non coll = outage probability for a nonacollaborative user
`
`I nump
`
`= maximum number of parallel transmission
`
`I rate max
`Confidential and Proprietary
`
`largest transmission rate
`14
`
`C:\NrPortbl\PAL|B1\LCV\2747392__1 .000
`
`16
`
`'
`
`8-6-05
`
`16
`
`

`

`I rate min
`
`= lowest possible transmission rate
`
`I Db
`
`I Dr
`
`= density of base-stations per km"2
`
`= density of collaborative user per km"2
`
`'I Lmax
`
`= maximum allowed path-loss to collaborative user
`
`I' model
`
`= propagation model
`
`I B
`
`= bandwidth MHz
`
`I shadow
`
`= standard deviation ol‘ shadowing loss: 8dB
`
`t coll = 0 Pout non coll = 0.005 nump= 5 lale_rnax =10 rate_min = 0.1 DD = 0.25 Dr = 200 Lmax = 100 model = WI-indoor B = 5 shadow = 1
`
`o1:302
`
`0.15
`
`0
`
`0.05
`
`I
`
`
`
`
`
`fractionofuserswithratelessthanindicated
`
`'
`
`05
`
`'
`
`1
`
`'
`
`1.5
`
`‘
`
`2
`
`No Collaboration
`' _ Collaborative Users - single link
`*— Collaborative Users - multiple links
`3
`3.5
`4
`4.5
`
`2.5
`RATE [MBPS]
`
`5
`
` 0
`o_.
`
`
`
`histogram of number of candidate links
`‘r
`”r
`"r—
`
`number of links
`
`Figure 7: CDF for data rate and number of possible under-layer
`connections simulation results for Lmax =1 OOdB
`
`The simulation shows that achievable data rate improvement can easily exceed
`10X.
`
`Confidential and Proprietary
`
`C:\NrPortb|\PAL|B1\LCV\2747392_1.DOC
`
`15
`
`17
`
`8-6-05
`
`17
`
`

`

`Combining the two performance gain elements (as described above) we
`can argue that two order of magnitude performance improvement relative
`to traditional cellular broadband service is feasible.
`
`Confidential and Proprietary
`
`C:\NrPortbl\PAL|B1\LCV\2747392_1.DOC
`
`16
`
`18
`
`8-6-05
`
`18
`
`

`

`' PATENT APPLICATION SERIAL No
`
`us. DEPARTMENT OF COMMERCE
`PATENT AND TRADEMARK OFFICE
`FEE RECORD SHEET
`
`10/25/2005 ZJUHARI
`
`00000033 232415
`
`60728918
`
`. 01 FC:2005
`
`100.00 DA
`
`PTO-1556 ‘
`. (5/87)
`
`a
`
`11.8 WM”: anon—mm
`
`19
`
`19
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket