throbber
US 7,110,783 B2
`(10) Patent No:
`a2) United States Patent
`
`Bahlet al. Sep. 19, 2006 (45) Date of Patent:
`
`
`US007110783B2
`
`(75)
`
`73)
`
`(73)
`*)
`(")
`
`e
`Notice:
`Notice
`
`(54) POWER EFFICIENT CHANNEL
`SCHEDULING IN A WIRELESS NETWORK
`.
`.
`Inventors: Paramvir Bahl, Sammamish, WA (US);
`Atul Adya, Redmond, WA (US);
`Jitendra D. Padhye, Kirkland, WA
`(US)
`P
`(US)
`Assignee: Microsoft Corporation, Redmond, WA
`Subject t
`disclai
`the
`t
`f thi
`en seen eg ae
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 607 days.
`(21) Appl. No.: 10/124,721
`(22)
`Filed:
`Apr. 17, 2002
`(65)
`Prior Publication Data
`US 2003/0203740 Al
`Oct. 30, 2003
`Int. CL
`(2006.01)
`HOAR 7/00
`(2006.01)
`HO4B 7/212
`(2006.01)
`H040 7/20
`(2006.01)
`HO4s 1100
`(2006.01)
`G06F 15/16
`(52) US. Ch. ceccccssssseseeeeee 455/516; 370/208; 370/347,
`709/200
`
`(51)
`
`(58) Field of Classification Search ................ 455/434,
`455/516; 370/347, 208; 709/200
`See application file for complete search history.
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`5,241,542 A
`8/1993 Natarajan et al.
`.
`(Continued)
`FOREIGN PATENT DOCUMENTS
`1089500 A2
`4/2001
`
`EP
`
`OTHER PUBLICATIONS
`
`Nandagopal, T., et al., “A Unified Architecture for the Design and
`Evaluation of Wireless Fair Queueing Algorithms”, ACM
`MobiCom 1999,
`in proceedings of The Fifth Annual ACM/AEE
`International Conference on Mobile Computing andNetworking pp.
`132-173 (Aug. 1999).
`
`.
`
`(Continued)
`Primary Examiner—William D. Cumming
`(74) Attorney, Agent, or Firm—Wolf, Greenfield & Sacks,
`PC.
`(57)
`
`ABSTRACT
`
`A method and system for optimizing channel access sched-
`uling for multiple wireless computing devices over a wire-
`less network improves channel access efficiency with
`respect to a primary channel. An access point, or host
`computer, includes a host transceiver for receiving control
`information from the wireless computing devices over a low
`power channel. Upon receiving the control information, the
`access point applies a scheduling algorithm to schedule
`Channel access forthe wireless computing devices to trans-
`mit data over the primary communication channel. The
`wireless computing devices include a low powerradio for
`receiving scheduling information via the low power channel
`during idle periods. When the scheduling information is
`received, the wireless computing device activates its pri-
`mary channel network interface components to communi-
`cate data through the primary channel. When the computing
`device is idle, the device is configured to power downall of
`its components with the exception of the circuitry required
`to power the low power channel. As such, the low power
`channel is maintained in an active state for receiving sched-
`uling information, such as an access schedule, during both
`idle and non-idle periods.
`
`(Continued)
`
`15 Claims, 9 Drawing Sheets
`
`. i
`
`—
`
`
`
`ae
`
`Wireless computing device sends control
`information over low power channel
`
`Hosttransceiver at access point transmits
`
`
`
`
`scheduling information (i.e. 802.11 standard Protocol408
`
`
`scheduling information over low power a 404/406
`
`channel
`

`
`Transmit data over the primary channel based upon
`
`channel)
`
`1
`1
`
`DELL EX. 1011
`
`DELL EX. 1011
`
`

`

`US 7,110,783 B2
`
`Page 2
`
`U.S. PATENT DOCUMENTS
`
`1/1994 Mabeyet al.
`5,278,831 A
`4/1995 Diepstraten et al.
`5,410,738 A
`5/1996 Gilhousen
`5,519,761 A
`1/1997 Reissner
`5,594,731 A
`4/1997 Rochester et al.
`5,621,735 A
`4/1998 Siepet al.
`5,740,363 A
`8/1998 Mahanyetal.
`5,790,536 A
`12/1998 Gollnick et al.
`5,844,893 A
`12/1998 Heinrich et al.
`5,850,181 A
`4/1999 Wang
`5,898,904 A
`7/1999 Akhavan
`5,920,815 A
`9/1999 Mahanyet al.
`5,949,776 A
`9/1999 Mahany
`5,960,344 A
`6/2001 Ohyamaetal.
`6,243,575 Bl
`8/2001 Choi
`6,278,883 Bl
`3/2002 Menardetal.
`6,356,192 Bl
`3/2004 Wanget al.
`6,711,418 Bl
`6,807,165 B1* 10/2004 Belcea ou... eee 370/347
`2001/0055275 Al
`12/2001 Herrmann etal.
`2002/0132603 Al
`9/2002 Lindskoget al.
`2003/0198196 Al
`10/2003 Bahlet al.
`2003/0203740 Al* 10/2003 Bahlet al. .......... 455/516
`2004/0179469 Al*
`9/2004 Attar et al.
`..
`370/208
`
`2004/0181569 Al*
`9/2004 Attar et al. we. 709/200
`2005/0059347 Al
`3/2005 Haartsen
`
`FOREIGN PATENT DOCUMENTS
`
`EP
`
`1137226 A2
`
`9/2001
`
`OTHER PUBLICATIONS
`
`Keshav, S., “On the Efficient Implementation of Fair Queueing”
`Internetworking, Research and Experience, vol. 2, No. 3., 157-173
`(1991).
`Barghavan, V., et al., “Fair Queuing in Wireless Networks: Issues
`and Approaches”, IEEE Personal Communications Magazine, pp.
`44-53 (Feb. 1999).
`Parekh, A.K., et al., “A Generalized Processor Sharing Approach to
`Flow Control in Integrated Services Networks: The Single-Node
`Case”, IEEE/ACM Transactions on Networking, vol. 1, No. 3, pp.
`344-357 (Jun. 1993).
`Parekh, A.K., et al., “A Generalized Processor Sharing Approach to
`Flow Control in Integrated Services Networks: The Multiple Node
`Case”, IEEE/ACM Transactions on Networking, vol. 1, No. 2, pp.
`137-150 (Mar. 1994).
`NG,T.S., “Packet Fair Queueing: Algorithms for Wireless Networks
`with Location-Dependent Errors”, Proceedings ofINFOCOM ’98,
`The Conference on Computer Commications vol. 3, Seventh Annual
`Joint Conference of the IEEE Computer and Communications
`Societies, pp. 1103-1111 (Mar. 1998).
`Benini, L., et al., “System-Level Dynamic Power Management’,
`Low-Power Design, 1999; Proceedings. IEEE ALessandro Volta
`Memorial Workshop On Como, Italy Mar. 4-5, 1999, Los Alamitos,
`CA USA, IEEE Comput. Soc. US, Mar. 4, 1999, pp. 23-41.
`Benini, Luca et al., “Monitoring System Activity for OS-Directed
`Dynamic Power Management”,
`In Proceedings of 1998 ACM
`ISLPED, pp. 185-19.
`Benini, L. et al., Dynamic Power Management of Electronic Sys-
`tems, in Proceedings of the 1998 IEEE/ACM ICCAD,Nov.8-12,
`1998, San Jose CA, pp. 696-702.
`Hinckley, K., et al., “Sensing Techniques for Mobile Interaction”,
`ACM UIST 2000 Symposium on User Interface Software & Tech-
`nology, CHIletters 2(2), pp. 91-100.
`Intel Microsoft Toshiba, “Advanced Configuration and PowerInter-
`face’, Revision 1.0 Feb. 2, 1999, 323 pages.
`Simunic, Tajana,et al., “Dynamic Power Managementfor Portable
`Systems”, In Proceedings of ACM MOBICOM 2000, Aug. 2000,
`Boston, MA pp. 11-19.
`Simunic, Tajana, et al., “Dynamic Voltage Scaling and Power
`Management for Portable Systems”, In Proceedings ofACM DAC
`2001, Aug. 2001, pp. 524-529.
`
`Fleishman, Glenn, New Wireless Standards Challenge 802.11b, The
`O'Reilly Network,
`at
`oreillynet.com/Ipt/a//wireless
`/2001/05/
`O8standards.html (Jun. 8, 2001), pp. 1-4.
`Flickenger, Rob, 802.//B Tips, Tricks and Facts, The O'Reilly
`Network, retrieved from oreillynet.com/Ipt/a//wireless/2001/03/02/
`802.11b_facts_html (Mar. 2, 2001), pp. 1-3.
`Press Release, “Atheros Ships Combo Rolling Three WLAN Stan-
`dards into a Single Solution”, Atheros Communication retrieved
`from atheros.com/news/combo.html (Mar. 11, 2002) pp. 1-3.
`Atheros Communications, AR500LX Combo WLAN Solution Bro-
`chure, retrieved from atheros.com pp. 1-2.
`Nobel , Carmel, For WLAN, It’s 802.11bm Eweek retrieved from
`eweek.com/print_article /0.3668.a=18648.00.asp (Nov. 19, 2001)
`pp. 1-2.
`Liu,Jun,et al., “Using Loss Pairs to Discover Network Properties”,
`ACM SIGCOM Internet Measurement Workshop, 2001, 12 pages.
`Zhang, Yin, et al., “On the Constancy ofInternet Path Properties”,
`SIGCOM Internet Measurement Workshop, 2001, 15 pages.
`Lai, Kevin,et al., “Measuring Link Bandwidths Using A Determin-
`istic Model of Packet Delay”, In Proceedings of ACM SIGCOM
`2000, 12 pages.
`Balakrishnan, Hari, et al., “Analyzing Stability in Wide-Area Net-
`work Performance”, In Proceedings of CAN SIGMETRICS Con-
`ference on Measurement & Modeling of Computer Systems, Seattle,
`WA Jun. 1997, 11 pages.
`Yavatkar, R., et al., “SBM (Subnet Bandwidth Manager): A Protocol
`for RSVP-based Admission Control Oveer IEEE 802-style Net-
`works”, IETF RFC 2814, retrieved from faws.org/rfcs/rfc28 14 html
`on May 19, 2002.
`Breslau, Lee, eet al., “Endpoint Admission Control: Architectural
`Issues and Performance”, In Proceedings of ACM SIGCOMM
`2000, pp. 57-69.
`Chiasserini, Carla, F.. “Combining Paging with Dynamic Power
`Management’, in IEEE INFOCOM 2001, pp. 996-1004.
`Shih, Eugene,et al., “Wake on Wireless: An Event Driven Energy
`Saving Strategy for Battery Operated Devices”, MOBICOM ’02,
`Sep. 23-26, 2002, pp. 1-12.
`Yung-Hsiang, Lu, “Reguester-Aware Power Reduction”, IEEE, Sep.
`20, 2000, pp. 18-23.
`Lettieri, Paul, “Advances in Wireless Terminals”, JEEE Personal
`Communications, Feb. 1999, pp. 6-19.
`Kleynhans, Steve, “JBM: Back in the PC Game”, retrieved from
`techupdate.zdnet.com/techupdate/stories/main/0,14179,2868907-
`2,00html (last visited Sep. 16, 2002).
`“Wayports Successful Trail of Microsoft Windows XP and 802. 1x
`Forecasts a More Secure Environmentfor Wireless Users”, HITCH
`Online 2002 edition at online.hitec.org/news/4009856,20000343.
`htm (last visited Sep. 16, 2002).
`“Wireless LAN Computing with IBM Personal Device”, IBM White
`papers, IBM Personal Systems Group, Dec. 2001, 9 pages.
`Bowman, Barb,“Unplugged and Unwired”, Microsoft Corporation
`at microsoft.com/windowsxp/expertzone/columns/bowman/june11.
`asp (last visited Sep. 16, 2002).
`“Windows XP Segment Analysis of the IBM ThinkPad Notebook
`Platform”, Strategic Relationship Marketing Oct. 2001, 1 page.
`Boingo Launches Nationwide WI-FI Service, Boingo Press Releases
`at boingo.com/pr/pr3/html (last visited Sep. 20, 2002).
`Boingo Wireless Announces Founding and Funding, Boingo Press
`Releases at boingo.com/pr/pr1/html (last visited Sep. 20, 2002).
`802.11b has reached ’escape Velocity Boingo Wireless Market
`Overview at boingo.com/marketoverview.html(last visited Sep. 20,
`2002).
`Chan, Sharon Pian, Wireless where you want: WI-FT is the guerrilla
`revolution of wireless computing, Seattle Times Wireless where you
`want
`it
`at
` seattletimes.nwsource.com/htm/businesstechnology/
`1344028 14wirelesslan11-html last visited Sep. 20, 2002.
`Wireless Technology, Wireless Technology at microsoft.com/hwdev/
`wireless (last visited Dec. 8, 2000).
`Lough, Daniel, L., et al., A Short Tutorial on Wireless LANs and
`IEEE 802.11 at computer.org/students/looking/summer97/iece8702.
`htm (last visited Dec. 12, 2000), 5 pages.
`
`2
`
`

`

`US 7,110,783 B2
`Page 3
`
`Mubashir, Alam, Descriptive Analysis ofIEEE 802.11 Standardfor
`Wireless Networks, at triton.cc.gatech.edu/ubicomp.257 (last visited
`Dec. 12, 2000).
`Zero Configuration Networking (zeroconf) at zeroconf.org (last
`visited Dec. 12, 2000).
`Cheshire, Stuart, “Dynamic Configuration of IPv4 Link-local
`Addresses”, Apple Computer Oct. 8, 2000 at zeroconf.org/draft-
`ietf-zeroconf-ipv4-linklocal-00.txt (last visited Dec. 12, 2000).
`Hattig, M., Zeroconf Requirements draft-ietf-zeroconf-reqts-06. txt
`(Dec. 12, 2002).
`“Enabling IEEE 802.11 Networks with Windows “Whistler”, at
`microsoft.com/hwdev/wireless/ieee802Net.-htm (last visited Dec. 8,
`2000).
`Specification of the Bluetooth System, vol. 1, Dec. 1, 1999, pp.
`(1,082 pages).
`Miller, Brent, et al., Mapping Salutation Architecture APIs to
`Bluetooth Service Discovery Layer (White Paper), vol. 1.0, IBM
`Corporation, Jul. 1, 1999, pp. (pp. 1-26).
`IEEE Standard, 802.11, Part 11: Wireless LAN Medium Access
`Control (MAC) and Physical Layer (PHY) Specifications, \** Edition
`1999 (512 pages).
`O’Hara, Bob, et al., JEEE 802.11 Handbook A Designer’s Com-
`panion, Dec. 1999, (174 pages).
`Rigney, C., et al., “Remote Authentication Dial in User Service
`(Radiusy’, The INternet Society, Jun. 2000, (pp. 1-59).
`Aboda, B., et al. RFC 2716, “PPP EAP TLS Authentication
`Protocol’. The Internet Society, Oct. 1999, (pp. 1-19).
`Blunk,L., et al., RFC 2284, PPP Extensible Authentication Protocol
`(EAP), The Internet Society, Mar. 15, 2000, (pp. 1-12).
`
`IEEE 802.11 Security White Paper, vol. 1., Windows Network
`Infrastructure team, Microsoft Corporation, Mar. 15, 2000, pp.
`IEEE 802.1X Supported Scenarios, Windows Network Infrastruc-
`ture team, Microsoft Corporation, vol. 1, Apr. 7, 2000, (7 pages).
`Mettala, Riku, et al., “Bluetooth Protocol Architecture” (White
`paper), vol. 1.0, Nokia Mobile Phones, Sep. 29, 1999.
`Muller, T., Bluetooth Security Architecture, (White paper), vol. 1.0,
`Jul. 15, 1999.
`Chunlong Guo et al., Low Power Distributed MAC for AD Hoc
`Sensor Radio Networks, TEEE Online! 2001, pp. 2944-2948,
`XP0023 16297, no month listed.
`Intel Wireless Gateway,
`Intel: Sample Installation Scenarios,
`Online! Oct. 9, 2001, pp. 103, XP0023 16298.
`Olofsson et al., “Performance Evaluation of Different Random
`Access Power Ramping Proposals For The WCDMA System,”,
`Proceedings of PIMRC ’99: International Symposium on Personal
`and Indoor Mobile Radio Communications Sep. 12-15, 1999 Osaka,
`Japan, Online! vol. 3, Sep.
`12,
`1999, pp. 1505-1509, vol.
`XP002317518 10 International Symposium on Personal, Indoor
`and Mobile Radio Communications (PIMRC’99). Proceedings
`Osaka
`Univ
`Odsaka;
`s3.kth.se/radio(COURSES/
`OPACKETRADIO32E5503 ,32004/Slides/PIMRC99 ,,RA.pd.
`Jorgen Bach Andersen: “Antenna Arrays in Mobile Communica-
`tions: Gain, Diversity, and channel Capacity” TEE Antennas and.
`Propagation Magazine, vol. 42, No. 2, Apr. 2000; pp. 12-16,
`XP002334673.
`
`* cited by examiner
`
`3
`
`

`

`U.S. Patent
`
`Sep. 19, 2006
`
`Sheet 1 of 9
`
`US 7,110,783 B2
`
`029
`
`Jelndwo
`
`0ztoD
`
`Jainduwio
`
`02
`
`\YJayndwos==)
`
`0z1o
`
`Jeyndwo
`
`|“bi4
`
`02
`
`dayndwog
`
`0c
`
`sayndwoy
`
`02
`
`4
`
`

`

`U.S. Patent
`
`Sep. 19, 2006
`
`Sheet 2 of 9
`
`US 7,110,783 B2
`
`LV
`
`
`
`(s)ad1IAeqjndu|
`
`uonHeolunwuwos)
`
`(s)uo]oeuU0yD
`
`ebei0js
`
`S|QeAOLWSY-UON
`
`a6eJO}S
`
`
`
`(s)ed1AeqIndino
`
`B|GeAowsay c‘ble
`
`OS
`
`Asayeg
`
`S/}E|OA-UON
`
`
`
`
`
`WiuUf)Buisse90l¢SIHEOA
`
`
`
`Aloweywayshs
`
`5
`
`
`
`
`

`

`U.S. Patent
`
`abeyoA
`
`Joyeinbay
`
` OOL
`
`MO}
`
`JOMOd
`
`Areyeg
`
`Sep. 19, 2006
`
`Sheet 3 of 9
`
`US 7,110,783 B2
`
`
`
`ZHING/6olpey
`
` (sdqyZ61)
`
`Ld-pOLL419}
`
`JId
`
`
`
`(d|AEpSSalalIM0})ZEZSY
`
`
`
`SJUBUOULUOJEUIO
`
`€bi4
`
`
`
`6
`
`
`
`
`
`

`

`U.S. Patent
`
`Sep. 19, 2006
`
`Sheet 4 of 9
`
`US 7,110,783 B2
`
`
`
`
`
`so1naqBunndwogjualD
`
`CCC
`
`pybi
`
`0c
`
`\oot
`
`SSeSee
`
`2OuUeseld
`
`JOAIOS
`
`oeLay
`
`OLZ
`
`
`
`
`
`JUIOdSSBDDVSSA/QIIAA
`
`7
`
`
`
`
`

`

`U.S. Patent
`
`Sep. 19, 2006
`
`Sheet 5 of 9
`
`US 7,110,783 B2
`
`cOV
`
`vOv
`
`907
`
`
`
`007eBuraeyao!AepBuljndwodssajasiAA
`
`
`
`
`
`
`____(84)YIMsiajsibolJaAlsosued}JamodMo}
`
`
`
`-
`
`
`
`‘JOAIOSyOUg
`
`
`
`SU}O}JBUUBYOJamodMoO]SU}BIAUOHPEWJOJU!
`
`
`
`‘julodssaa0e
`
`
`
`PULUONEWJOJUIJO4JUODOU}SOAIBDEJUIOdsseooy
`
`
`
`
`
`
`
`
`
`
`
`BunndwosssajeJimJO}sse00eJ|BUUBYOSeiNnpEeyos
`
`
`
`
`
`
`
`
`
`|OUJUODSPUSSBdIASPBuljndwodssajaulAA
`
`
`
`
`
`
`
`‘WyywobjeBuljnpayosuodnpaseqseoihep
`
`
`
`
`
`
`
`G‘bl
`
`
`
`907JidnpasamodsiaoiAepBulyjndwiodssajesiA\
`
`
`
`
`[ieday}yBnosu}asjeyoedejep(SAAI900JJO)sIgysues}pueAlesseoeu
`uodnpaesegjeuueyo
`
`
`
`
`
`
`
`‘uolyeuOjuUlHullnpayos
`
`
`
`‘aolaapBurndwosssajeulm0}j|aUUeYSJemodMO}
`
`
`
`
`
`
`
`
`
`
`
`yBnoiy}uonewuoju!Buljnpeyosspuesjulodssesoy
`
`
`
`
`
`8
`
`
`
`
`

`

`U.S. Patent
`
`Sep. 19, 2006
`
`Sheet 6 of 9
`
`US 7,110,783 B2
`
`022
`
`g0z—”
`
`NLOOL
`
`LOZ
`
`
`
`
`
`JUIOdSSED0'YSSEIOUI\
`
`\—zo
`
`L-°208Sal
`
`
`
`
`
`9“Biz
`
`CCS
`
`JBAISOSUBILAY
`
`
`
`g91AaqBuljndwoy
`
`}SOH
`
`9
`
`
`
`
`
`
`

`

`U.S. Patent
`
`Sep. 19, 2006
`
`Sheet 7 of 9
`
`US 7,110,783 B2
`
`cOV-
`
`
`
`
`
`[O4JU0dSpuasadIAepBuljndwioossejeuiA
`
`
`
`
`
`
`
`
`90r/rOrJamodmojJ8A0UOHeUWOjUBulinpeyos
`_/jauueyo
`
`
`
`
`
`
`SJILUSUBI]JUIOdSS8d0eJeJAAISOSUEI}JSOH
`
`
`
`
`
`[auUeYSaMmodMOJSAOUOELWOJUI
`
`
`
`uodnpasegjouueyoAewuidoy}JeaoByepyWsuUeL
`
`
`
`
`
`80¢_soyoudPJEPURIS|1°Z08°9'!)UONeWWOjUGuljnpauos
`
`
`
`
`
`
`
`Z‘bid
`
`(jauueYo
`
`10
`
`10
`
`
`
`
`

`

`U.S. Patent
`
`Sep. 19, 2006
`
`Sheet 8 of 9
`
`US 7,110,783 B2
`
`90¢
`
`yore
`
`eg
`614
`
`JOAsosues]+YCo
`
`
`00€
`
`
`JUIOgSSSo0VySSOIAUI/A
`
`ZOE
`
`80&
`
`
`
`OlZ
`
`11
`
`11
`
`
`
`

`

`U.S. Patent
`
`Sep. 19, 2006
`
`Sheet 9 of 9
`
`US 7,110,783 B2
`
`00€
`
`Oe
`
`Iw)
`(=ady
`
`
`JUlIOgSSE00YSS3ISUIM,
`
`—-Oe
`
`qg“bl
`
`12
`
`12
`
`
`
`

`

`US 7,110,783 B2
`
`1
`POWER EFFICIENT CHANNEL
`SCHEDULING IN A WIRELESS NETWORK
`
`TECHNICAL FIELD OF THE INVENTION
`
`10
`
`30
`
`40
`
`45
`
`50
`
`55
`
`The present invention relates generally to wireless com-
`puting devices, and more particularly,
`to power efficient
`channel access scheduling for wireless computing devices
`using multiple radios.
`
`BACKGROUND OF THE INVENTION
`
`Many wireless computing devices, such as laptop com-
`puters, personal digital assistant devices, etc., may act as
`client devices in a wireless networking environment. Often
`these multiple clients all communicate via the network
`through shared radio frequency channels to a shared access
`point. However, when a large numberof such client devices
`attempt to access the network, this sharing of network access
`points often leads to congestion and a wasting of bandwidth.
`Congestion often leads to collisions in the channel between
`data signals and hence to delay.
`To overcomethese challenges, various control techniques
`have been implemented with respect to wireless networksto
`aid in scheduling to avoid collisions. For example, clients
`may engagein listen-before-transmit (“LBT’’) mechanisms,
`such as the CSMA-CA channel access mechanism,vying for
`space in the shared channel before transmitting. LBT tech-
`niques are a type of distributed coordinated function.
`CSMA-CAis a particular Ethernet LAN access method.
`However, with all LBT schemes, if one client device is
`currently transmitting signals (i.e. data packets) in the chan-
`nel, other senders are forced to back off and wait a random
`amountof time before attempting access again. Additionally,
`even if the client devices detect that the network is free, two
`such devices may access the channel at exactly the same
`time, causing a signal collision. When this type of collision
`is detected, both client devices are forced to back off and
`wait a random amount of time before attempting transmis-
`sion again. While the client devices are waiting, channel
`bandwidth is wasted, packet transmission is delayed, and
`battery power on the client machine is wasted.
`Other mechanisms exist for aiding in scheduling and
`avoiding collision between data signals over a shared chan-
`nel. Another example is a point-coordinated function
`(“PCF”), which repeatedly polls the client devices in order
`to avoid collisions of signals. However, while PCF tech-
`niques avoid the constant back and forth between the
`competing data signals, the constant polling on the primary
`channel wastes a large amount of bandwidth, thus making
`this technique highly inefficient.
`While current wireless channel access techniques do
`produce collision avoidance, they also waste bandwidth on
`the primary channel used to send data packets because these
`techniques use the channel both to transmit control and
`scheduling information and to send useful data. Distributed
`coordinated functions, such as CSMA-CA,are further inef-
`ficient for real-time data because of the forced waiting
`period. Real-time audio data may no longer be useful, or
`sufficient, after a forced delay, such as a 100-millisecond
`delay. Additionally, there is no guarantee of channel access
`by any of these techniques and there is no mechanism to
`assure that high priority data signals are transferred in a
`timely manner.
`However, if the access point knows the exact state of
`every client it is servicing (e.g. number of packets pending
`in the queue, the packets deadlines, and packet priorities), it
`
`2
`independently on the channel.
`can schedule each client
`While researchers have attempted to build true work con-
`serving fair queuing algorithms based upon this premise,
`these algorithms have not been truly work conserving
`because part of the bandwidth on the channel is used up in
`transmitting control
`information to the scheduler and in
`many cases the media-access control (MAC)protocol has to
`be changed. Therefore, even with such techniques band-
`width is wasted.
`
`Additionally, while largely avoiding signal collisions,
`these techniques cause inefficient use of power because they
`often use a high-powered channel to send control data in
`addition to useful data. A particular componentof a wireless
`device that consumes a significant amount of power is the
`network interface card (NIC), which handles the wireless
`transmission and reception of network communication data.
`It has been estimated that on average, about 20% of the total
`poweravailable to a wireless device is dissipated as a result
`of the connection of a NIC, or other wireless LAN interface
`component. This phenomenonis dueto the fact that the NIC
`and wireless device must be in a constant“listening”state in
`order to receive and transmit data via the network. Since the
`amount of power a battery can provide is rather limited,
`minimizing the power consumption of a mobile device in
`order to extend its operation time is an important consider-
`ation in the design of battery operated wireless devices, and
`any communication systems involving such devices.
`
`SUMMARY OF THE INVENTION
`
`To address the challenges described above, a method and
`system are disclosed for powerefficient channel scheduling
`of wireless client devices in a wireless network using
`multiple radios. This method and system lead to optimum
`use of channel bandwidth and power in wireless computing
`devices. Therefore, true work conserving algorithms can be
`implemented. Such wireless computing devices include, but
`are not limited to, personal data assistants (““PDAs’’), cellular
`phones, and laptop computers having network interface
`capabilities.
`In accordance with an embodiment of the invention, a
`wireless computing device enables a low power control
`channel to exchange information including control informa-
`tion for a network interface card (NIC), and other power
`consuming components of the computing device, with a host
`transceiver, referred to as a smartbrick. Initially, the low
`powertransceiver registers with the host transceiver, such as
`a host transceiver located at a network wireless access point.
`The low powertransceiver operated by the wireless com-
`puting device then sends control information data signals to
`the host transceiver. This information may be, but is not
`limited to, state information, the numberof data packets in
`a queue, the packetpriority, and/or packet deadline. The host
`transceiver then responds by transmitting scheduling infor-
`mation back to the low power transceiver. This scheduling
`information may include, among other things, channel
`access information.
`
`Prior to receiving scheduling information from a host
`transceiver component,
`the high power wireless network
`interface components, such as associated with an ordinary
`wireless NIC, are idle. Idle periods are periods when a low
`powerstate of operation is employed by the wireless com-
`puting device, or periods when no substantive network
`activity (e.g., sending or receiving of data) is being engaged
`in by the wireless computing device via its high frequency
`communication channel(e.g., IEEE 802.11 based channel).
`After receiving the scheduling information on the low power
`
`13
`
`13
`
`

`

`US 7,110,783 B2
`
`3
`control channel, the full power NIC and necessary circuitry
`are automatically activated consistent with the scheduling
`information. For example, in one embodiment, upon receiv-
`ing channel access information, such as a message that the
`channel is free for transmission, the NIC and other compo-
`nents of the wireless computing device are powered up. The
`network interface component, such as the NIC, then trans-
`mits or receives data over the high power channel.
`The low power control channel is implemented via an
`internal or external radio frequency (RF) transceiver com-
`ponent, referred to as a minibrick, which preferably operates
`at a low frequency (such as lowerthan that of the full power
`NIC) and low powerlevel. In operation, when the comput-
`ing device is idle, the device is configured to power down
`substantially all of its components with the exception of the
`circuitry required to power the low power transceiver. As
`such, the control channel is maintained in an active state for
`receiving signals during both idle and non-idle periods.
`In accordance with another embodiment of the invention,
`the smartbrick is implemented as a host transceiver that
`operates at a host computer, or network access point, to
`communicate with the minibrick. The host computer may
`also be equipped with an IEEE 802.11 based NIC for
`supporting wireless communication to access the network
`through a wireless access point (AP). The wireless AP acts
`as an interface to a network infrastructure, such as a wired
`enterprise LAN. When a requesting device wishes to com-
`municate with a wireless computing device,
`it queries a
`server in order to determine the location and presence of the
`wireless computing device. In response, the server submits
`the query to the host computer. The smartbrick operating on
`the host computer receives the query from the server, and
`communicates with the minibrick via the low power channel
`to begin scheduling and operation of full power communi-
`cations. The wireless computing device receives this signal
`and powers up the NIC and other components accordingly,
`resulting in activation of the wireless device prior to any
`actual transmission of data by the requesting device.
`Additional features and advantages of the invention will
`be made apparent from the following detailed description of
`illustrative embodiments that proceeds with reference to the
`accompanying figures.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`While the appended claims set forth the features of the
`present invention with particularity, the invention and its
`advantages may be best understood from the following
`detailed description taken in conjunction with the accom-
`panying drawings, of which:
`FIG. 1 is a schematic diagram of an exemplary computer
`network within which embodiments of the invention may be
`implemented;
`FIG.2 is a schematic diagram illustrating the architecture
`of an exemplary computing device in which an embodiment
`of the invention may be implemented;
`FIG. 3 is a schematic diagram illustrating an architecture
`of a transceiver component operated by a computing device
`for maintaining a low powercontrol channel in an embodi-
`ment of the invention;
`FIG. 4 is a schematic diagram illustrating an exemplary
`operating environment for optimum channel scheduling
`through a low power control channel according to an
`embodiment of the invention;
`FIG. 5 is a flowchart illustrating the operation of a host
`transceiver for communicating with a wireless computing
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`4
`device via a low power control channel according to an
`embodiment of the invention;
`FIG. 6 is a schematic diagram illustrating an operating
`environmentfor optimizing channel scheduling wherein the
`host transceiver is logically connected to a host computer
`according to an embodiment of the invention;
`FIG. 7 is a channel diagram illustrating bi-directional
`communications in a two-channel system;
`FIG. 8a is a schematic diagram illustrating a networked
`environment wherein the multiple wireless network devices
`vying for channel space are out-of-range of the wireless
`access point; and
`FIG. 86 is a schematic diagram illustrating a multi-hop
`network operating environment
`for optimizing channel
`scheduling when one or more of the multiple wireless
`devices vying for channel space are out-of-range, according
`to an embodimentof the invention.
`
`DETAILED DESCRIPTION OF THE
`INVENTION
`
`The invention relates to a method and system fortraffic
`handling of computing devices that are capable of commu-
`nicating over a wireless link. Wireless computing devices
`usable within embodiments of the invention include, but are
`not limited to, personal data assistants, cellular phones, and
`laptop computers having wireless network interface capa-
`bilities. In the context of the invention, wireless communi-
`cation is the transmission of data between computing
`devices using radio frequency (RF) and electromagnetic
`waves rather than wires. To facilitate wireless communica-
`tion, a computing device may be equipped with a network
`interface component, such as a network interface card (NIC)
`that interfaces the device to the network. Typically, the NIC
`is implementedas a plug andplay device that can be inserted
`into a network card slot of the computing device or that can
`be otherwise interfaced to the device. Alternatively, the NIC
`can be built integrally as part of the circuitry of the com-
`puting device.
`To facilitate wireless communication, the NIC supports a
`wireless protocol, such as pursuant to the JEEE 802.11
`standard. General reference will be made throughout the
`course ofthis description to 802.11 as a suitable protocol for
`facilitating wireless communication between devices. How-
`ever, those skilled in the art will recognize that 802.11 is
`only one protocol for facilitating wireless communication,
`and that
`the invention is not
`limited to any particular
`wireless protocol. Indeed, other wireless protocols may be
`utilized alternatively or additionally in connection with the
`invention. It will also be recognized by those skilled in the
`art that the designation 802.11 refers to other protocols
`within the same family,
`including 802.1la, 802.11b or
`802.11g.
`An example of a networked environment in which the
`invention may be used is shown in FIG. 1. The example
`network includes several computing devices 20 communi-
`cating with one another over a network 30, such as the
`Internet, as represented in the figure by a cloud. Network 30
`may include one or more well-known components, such as
`routers, gateways, hubs, etc. and may allow the computers
`20 to communicate via wired and/or wireless media.
`
`Referring to FIG. 2, an example of a basic configuration
`for a computing device on which the system described
`herein may be implemented is shown. In its most basic
`configuration, the computing device 20 typically includesat
`least one processing unit 42 and memory 44 although such
`is not required. Depending on the exact configuration and
`
`14
`
`14
`
`

`

`US 7,110,783 B2
`
`5
`type of the computing device 20, the memory 44 may be
`volatile (such as RAM), non-volatile (such as ROM orflash
`memory) or some combination of the two. The most basic
`general configuration is illustrated in FIG. 2 by dashed line
`46. Additionally, the computing device may also have other
`features/functionality. For example, computer 20 may also
`include additional data storage components (removable and/
`or non-removable) including, but not limited to, magnetic or
`optical disks or tape. Computer storage media includes
`volatile and non-volatile, removable and non-removable
`media implemented in any method or technology for storage
`of information such as computer-readable instructions, data
`structures, program modules, or other data. Computer stor-
`age media includes, but is not limited to, RAM, ROM,
`EEPROM,flash memory or other memory technology, CD-
`ROM,digital versatile disk (DVD)or other optical storage,
`magnetic cassettes, magnetic tape, magnetic disk storage or
`other magnetic storage devices, or any other medium which
`can be used to store the desired information and which can
`
`be accessed by the computing device 20. Any such computer
`storage media may bepart of the computing device 20.
`The computing device 20 also preferably contains com-
`munication connections 48 that allow the device to commu-
`nicate with other devices. A communication connection is an
`example of a communication medium. Communication
`media typically embodies readable instructions, data struc-
`tures, program modules or other data in a modulated data
`signal such as a carrier wave or other transport mechanism
`and includes any information delivery media. By way of
`example, and not limitation, communication media includes
`wired media such as a wired network or direct-wired con-
`nection, and wireless media such as acoustic, RF, infrared
`and other wireless media. The term computer readable
`media as used herein includes both storage media and
`communication media.
`
`25
`
`35
`
`Acomputing device 20 may also have input devices such
`as a keyboard, mouse, pen, voice input device, touch input
`device, etc. Output devices such as a display 48, speakers, a
`printer, etc. may also be included. Furthermore, for wireless
`mobile devices,
`the computing device 20 is preferably
`provided with a portable power source 50, such as a battery
`pack, fuel cell or other power module. The power source 50
`acts as a primary source of power for computations and
`wireless data transmissions to be performed by the device.
`All the aforementioned components and features are well
`knownin theart.
`
`The device 20 preferably supports an operating system,
`for example stored in nonvolatile memory and executed by
`the processing unit 42 from volatile memory. According to
`an embodiment of the invention, the operating system con-
`tains instructions for interfacing the device 20 to a full power
`wireless network and to a low power wireless network. In
`this manner, scheduling information usable to schedule
`access of the device 20 to the full power wireless network
`may be sent over the low power wireless network, saving
`device power and saving bandwidth in the full power
`channel, according to the techniques to be more fully
`discussed elsewhere

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket