throbber
PCT
`
`WORLD INTELLECTUAL PROPERTY ORGANIZATION
`International Bureau
`
`
`
`INTERNATIONAL APPLICATION PUBLISHED UNDER THE PATENT COOPERATION TREATY(PCT)
`(51) International Patent Classification 7 :
`
`(11) International Publication Number:
`
`WO 00/48373
`
`HO4L 29/06
`
`(43) International Publication Date:
`17 August 2000 (17.08.00)
`
`(22) International Filing Date:
`
`9 February 2000 (09.02.00)
`
`(30) Priority Data:
`990264
`
`10 February 1999 (10.02.99)
`
`FI
`
`(21) International Application Number:
`PCT/FI00/00090|(81) Designated States: AE, AL, AM, AT, AU, AZ, BA, BB, BG,
`BR, BY, CA, CH, CN, CR, CU, CZ, DE, DK, DM,EE,
`ES, FI, GB, GD, GE, GH, GM, HR, HU,ID,IL, IN, IS, JP,
`KE,KG, KP, KR, KZ, LC, LK, LR, LS, LT, LU, LV, MA,
`MD, MG, MK, MN, MW,MX, NO,NZ,PL, PT, RO, RU,
`SD, SE, SG, SI, SK, SL, TJ, TM, TR, TT, TZ, UA, UG,
`US, UZ, VN, YU, ZA, ZW, ARIPO patent (GH, GM,KE,
`LS, MW,SD, SL, SZ, TZ, UG, ZW), Eurasian patent (AM,
`AZ, BY, KG, KZ, MD, RU, TJ, TM), European patent (AT,
`BE, CH, CY, DE, DK, ES, FI, FR, GB, GR, IE, IT, LU,
`MC, NL, PT, SE), OAPI patent (BF, BJ, CF, CG, Cl, CM,
`GA, GN, GW, ML, MR,NE, SN, TD, TG).
`
`(71) Applicant (for all designated States except US): NOKIA MO-
`BILE PHONESLTD.[FI/FI]; Keilalahdentie 4, FIN-02150
`Espoo (FI).
`
`(72) Inventors; and
`(75) Inventors/Applicants (for US only): RINNE, Mika [FI/FI];
`Kourakuja 3 B 10, FIN-02320 Espoo (FI). KALLIOKULIJU,
`Juha [FI/FI]; Jokioistentie 5, FIN-37470 Vesilahti (FI).
`
`(74) Agent; BERGGREN OY AB; P.O. Box 16, FIN-00101
`Helsinki (FI).
`
`Published
`With international search report.
`Before the expiration of the time limit for amending the
`claims and to be republished in the event of the receipt of
`amendments,
`
`(54) Titles. METHOD FOR INFORMING LAYERS OF A PROTOCOL STACK ABOUT THE PROTOCOLIN USE
`
`203
`
`204
`
`the first protocol layers of said protocol stack and which is delivered to the second protocol layers of said protocol stack.
`
`(57) Abstract
`
`A method for transferring information over a data connection in accordance with a protocol stack (206, 210) comprising first and
`second protocol layers. The method is characterized in that a protocol identifier is created the value of which is determined by meansof
`
`Samsung- Exhibit 1019 - Page 1
`
`Samsung - Exhibit 1019 - Page 1
`
`

`

`FOR THE PURPOSES OF INFORMATION ONLY
`
`Codes used to identify States party to the PCT on the front pages of pamphlets publishing international applications under the PCT.
`
`Zimbabwe
`
`Albania
`Armenia
`Austria
`Australia
`Azerbaijan
`Bosnia and Herzegovina
`Barbados
`Belgium
`Burkina Faso
`Bulgaria
`Benin
`Brazil
`Belarus
`Canada
`Central African Republic
`Congo
`Switzerland
`Céte d'Ivoire
`Cameroon
`China
`Cuba
`Czech Republic
`Germany
`Denmark
`Estonia
`
`SI
`SK
`SN
`SZ
`TD
`TG
`TJ
`
`Slovenia
`Slovakia
`Senegal
`Swaziland
`Chad
`Togo
`Tajikistan
`Turkmenistan
`Turkey
`Trinidad and Tobago
`Ukraine
`Uganda
`United States of America
`Uzbekistan
`Viet Nam
`Yugoslavia
`
`™T
`
`R
`IT
`UA
`UG
`us
`UZ
`VN
`YU
`Zw
`
`ES
`FI
`FR
`GA
`GB
`GE
`GH
`GN
`GR
`HU
`IE
`IL
`IS
`IT
`JP
`KE
`KG
`KP
`
`KR
`KZ
`LC
`LI
`LK
`LR
`
`Spain
`Finland
`France
`Gabon
`United Kingdom
`Georgia
`Ghana
`Guinea
`Greece
`Hungary
`Treland
`Israel
`Iceland
`Italy
`Japan
`Kenya
`Kyrgyzstan
`Democratic People’s
`Republic of Korea
`Republic of Korea
`Kazakstan
`Saint Lucia
`Liechtenstein
`Sri Lanka
`Liberia
`
`LS
`LT
`LU
`LV
`MC
`MD
`MG
`MK
`
`ML
`MN
`MR
`MW
`MX
`NE
`NL
`NO
`NZ
`PL
`PT
`RO
`RU
`SD
`SE
`SG
`
`Lesotho
`Lithuania
`Luxembourg
`Latvia
`Monaco
`Republic of Moldova
`Madagascar
`The former Yugoslav
`Republic of Macedonia
`Mali
`Mongolia
`Mauritania
`Malawi
`Mexico
`Niger
`Netherlands
`Norway
`New Zealand
`Poland
`Portugal
`Romania
`Russian Federation
`Sudan
`Sweden
`Singapore
`
`Samsung- Exhibit 1019 - Page 2
`
`Samsung - Exhibit 1019 - Page 2
`
`

`

`WO 00/48373
`
`PCT/FI00/00090
`
`Methodfor informing layers of a protocol stack about the protocol in use
`
`The invention relates in general to communications protocol stacks. In particular the
`invention relates to information about the protocols used, which information is
`communicated between protocol layers.
`
`Data communication connections and the protocols used in them are usually de-
`picted using the Open Systems Interconnection (OSI) reference model which com-
`prises seven protocol layers. The idea of having protocol layers is that the functions
`of the layers and the interfaces between them are specified in detail, and a protocol
`in use in a given layer of the protocol stack may be changed into another one when
`desired. To ensure the interchangeability, the protocol layers only operate on the
`basis of information contained in the fields of their own particular protocol frames.
`
`Future communications networks, especially wireless networks, will employ termi-
`nals which will have different characteristics and some of which will be more ver-
`satile than current terminals. As there will be terminals of different qualities, the
`application software must to a certain extent be able to adapt to the characteristics
`of the terminals. Some applications may only be used on certain terminals and with
`certain protocols, but some of the programs will know how to adapt to the charac-
`teristics of the terminal and the data connection in use.If a terminal supports multi-
`ple protocolstacks, the protocols used can be negotiated when establishing the data
`connection. So, an application program does not necessarily have knowledge of the
`protocol stack on whichit is running.
`
`Resources management for data networks will be more complicated because of a
`wider selection of terminals, increased numberof applications, simultaneous use of
`different protocol stacks and increased use of the wireless network for packet
`switched data connections, among other things. Problems will be caused especially
`by the fact that for a reason or another data networks comprise heterogeneousparts.
`A packet switched data network, for example, may comprise a fixed and wireless
`part, or a private subnetwork in addition to the public fixed packet data network.
`Specifications of connections must be communicatedacross the interfaces, between
`the different parts of the network: for instance, if one part has less resources than
`another, it may be necessary to limit the amountofinformation transferred between
`them, or if different parts of the network use different meters for the quality of the
`conection, these quality parameters will have to be replaced by others. If a con-
`
`10
`
`15
`
`20
`
`25
`
`30
`
`Samsung- Exhibit 1019 - Page 3
`
`Samsung - Exhibit 1019 - Page 3
`
`

`

`WO 00/48373
`
`PCT/FI00/00090
`
`nection passes through a different part of the network and returns to a network of
`the original kind, the connection after that second interface should be as much as
`possible like the original connection. So, resources management at the interfaces
`and connection mappings acrosstheinterfaces should be coordinated.
`
`1 shows a packet switched data connection according to the prior art over a
`Fig.
`radio link. The protocol stacks used in the equipment are shown at the bottom, and
`the top of the protocol stack may be dynamically negotiated. The lowest two proto-
`col layers 103 and 104 are always the same both in the transmitter (TX) 101 and in
`the receiver (RX) 102. These protocol layers are associated with the physical link
`and its control, in this example with radio wave frequencies, transmission power
`and possible error correction and retransmission methods.In the transmitter of Fig.
`1, the top of the protocol stack may be selected from among threealternatives (105,
`106, 107), so the transmitter may connect with receivers that support any of these
`alternatives. In the receiver of Fig. 1, the top of the protocol stack may be selected
`from among twoalternatives (105, 106). The protocols used are negotiated during
`the connection setup stage so that both apparatus in Fig. 1 will use the same top of
`the protocol stack, either 105 or 106.
`
`Fig. 2 showsa prior-art packet switched data connectionat the interface between a
`fixed network and a wireless mobile radio access network. The radio access network
`comprises base stations and radio network controllers. A wireless terminal 201 is
`connected via a base station 202 to a radio network controller 203. The radio
`network controller is connected to a network node 204 at the border of the radio
`access network and the fixed network. By way of example, a second terminal 205 is
`shown connected directly to the network node. Morelikely it will be connected to
`the network node via routers and other network elements.
`
`Fig. 2 shows, at the bottom, the protocol stacks 206-210 of the apparatus. Each
`protocol layer’s protocol is denoted by the letter L plus the numberofthe protocol
`layer. In the lowest two protocol layers, which are different for the fixed network
`and wireless network, the protocols are marked by symbols in which the letter C
`refers to a fixed network and the letter R stands for radio access network.
`
`The radio access network employs two differentfirst-layer protocols, which are in
`Fig. 2 denoted by symbols L1/R1 and L1/R2. Protocol L1/R1is associated with the
`radio interface between a wireless terminal and base station, so it is used in the
`protocol stack 206 of the wireless terminal andin the protocol stack 207 of the base
`station at the radio interface side. Protocol L1/R2 is associated with radio access
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`Samsung- Exhibit 1019 - Page 4
`
`Samsung - Exhibit 1019 - Page 4
`
`

`

`WO 00/48373
`
`PCT/FI00/00090
`
`network connections over a fixedline, so it is used in the basestation protocol stack
`at the radio network controller side, in the radio network controller’s protocol stack,
`and in the protocol stack 209 of the network node 204 at the radio access network
`side. All radio access network elements as well as the wireless terminal use the
`same protocol L2/R in the second protocol layer or, if there are sublayers in the
`second protocollayer, at least its highest sublayer uses the same protocol. In the
`radio access network elements, protocol stacks 207 and 208 often cover only the
`lowest twolayers.
`
`At the fixed network side, between apparatus 204 and 205, the packet switched data
`connection is carried on top of a so-called core network bearer service. The term
`bearer service refers in this context mainly to the second layer of the protocolstack.
`The characteristics, say, data transfer capacity or quality, of this core network
`bearer service are influenced by the physical connections used and the methods
`associated therewith. The quality of the packet switched data connection properis
`usually specified at a higher level, e.g. as quality of service in the IPv6 protocol in
`the third protocol layer, and the bearer service is chosen such that it can meet the
`connection quality requirements.
`
`In the network node 203 or alternatively in node 204 the packet switched data
`connection carried upon a core network bearer service has to be taken on top of a
`radio access bearer service. In a wireless mobile radio access network there are a
`certain number of different radio access bearer services, and the qualities that
`describe them includee.g. the transferrate, bit error rate (BER) and whetheror not
`the reception of a transferred packet is verified as well as the size of the transfer
`window used for the verification. The network node must map the core network
`bearer service to a radio access bearer service that has enough capacity to guarantee
`a desired connection quality but without wasting radio resources, however. The
`network node’s protocol stack 209 uses in the lowest two layers of the protocol
`stack fixed network protocols at the fixed network side, and radio access network
`protocols at the radio access networkside.
`
`The third-layer protocol is determined on the basis of the protocol used in the
`packet switched data network. When a packet switched data connection is estab-
`lished, terminals 201 and 205 may negotiate the protocols used for the end-to-end
`connection. These protocols usually are protocols on top of the third protocollayer,
`and they are identical (or at least compatible) in the protocol stack 206 of the wire-
`less terminal and protocol stack 210 of the second terminal. The upper protocol
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`Samsung- Exhibit 1019 - Page 5
`
`Samsung - Exhibit 1019 - Page 5
`
`

`

`WO00/48373
`
`PCT/FI00/00090
`
`layers do not know that the end-to-end connection between the terminals has
`crossed a radio interface at some point; as far as they are concerned, the connection
`could as well be an end-to-end fixed connection.
`
`Prior-art end-to-end connections capable ofutilizing dynamically negotiated proto-
`col stacks involve certain problems. For example, in situations where an application
`knows how to present data as either text, pictures or video, it could exclude the
`video if it knew that the capacity of the data connectionis insufficientto transfer a
`video image. Moreover, the lower protocol layers do not have knowledge of the
`capabilities of the upper protocollayers as regards reception of data packets that are
`in disarray and some of which are missing. If a lower protocol layer does not make
`sure that the data packets are in order and a higher protocol expects them to be,
`problemsarelikely to occur.
`
`A prior-art multimedia application may useeither one or more data connections for
`the transfer of data. For example, data in text format may be transferred via one
`connection, a video image via a second and soundvia a third one, and, in addition,
`the application may all the time have a connection open through which to transfer
`commands associated with the synchronization of the objects presented. Another
`alternative is that these data travel through a single data connection,i.e. the applica-
`tion multiplexes the data streamsinto a single data stream andan application at the
`other end of the connection demultiplexes them so that they become separate again.
`If an application uses multiple separate data connections, problemsarise if the lower
`protocol layers do not understand that these connections belongto one andthe same
`application. In a situation where only part of the data can be delivered because of
`scarce resources, this may result in that the most important packet switched data
`connection, in which the control commandsare transferred, is slowed down or even
`disconnected.
`
`For prior-art packet switched data network interfaces it is often necessary to either
`prioritize the data to be transferred, because of scarcity of data transfer resources, or
`map the connection quality defined in a certain manner to a connection defined by
`means of other parameters. In these situations, decision-makingin the lower proto-
`col layers would benefit if those layers had knowledge of the information trans-
`ferred over the connection. For example, knowledgeofthe typical data transferrate
`for the connection would help decide how much resources should be reserved for
`the connection. In the case ofprioritization, more detailed knowledge about the in-
`formation transferred (whetherit is, say, control commandsassociated with the ap-
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`Samsung- Exhibit 1019 - Page 6
`
`Samsung - Exhibit 1019 - Page 6
`
`

`

`WO 00/48373
`
`PCT/F100/00090
`
`plication software or presentable data) would help in deciding what is the most im-
`portant information.
`
`An object of the invention is to provide a method with which it is possible to char-
`acterize data for lower protocol layers and the characteristics of the data connection
`for upper protocol layers. It is advantageous that the methodis a hierarchical one,
`i.e. it is first given a rough description which can then beparticularized. It is also
`advantageousthat the description is short.
`
`The objects of the invention are achieved by a method with which it is possible to
`indicate the protocols or parts of protocols used in given protocol layers to other
`layers of a protocol stack.
`
`The method according to the invention for transferring information over a data con-
`nection in accordance with a protocol stack comprising first and second protocol
`layers
`
`is characterized in that
`
`15
`
`- a protocolidentifier is created,
`
`- a value for said protocol identifier is determined by meansofthe first protocol
`layers in said protocol stack, and
`
`- said protocol identifier is delivered to the second protocol layers in said protocol
`stack.
`
`20
`
`25
`
`30
`
`The upper-layer protocols or their coding methods, for example, characterize the
`amount of data transferred over a connection as well as burstiness of data, for
`example. Thus they describe the requirements on the data transfer and, thereby, on
`the lower protocol layers. The protocols alsotell, at least partly, what kind of data
`flow through the packet switched data connection. A method according to the
`invention, which identifies the protocols of an upper layer or layers, thustells the
`lowerprotocol layers what kind of data they are transferring. Thus it becomes pos-
`sible to handle the data packets according to their contents. For example, if the
`upper-layer protocols are such that they operate better when the data packets are
`delivered reliably and in the correct order, the lower-layer protocols may make sure
`that this happens.
`
`Samsung- Exhibit 1019 - Page 7
`
`Samsung - Exhibit 1019 - Page 7
`
`

`

`WO 00/48373
`
`PCT/FI00/00090
`
`Correspondingly, certain lower-layer protocols are associated with data connections
`that have a limited transfer capacity. Thus, using the method according to the
`invention the upper-layer protocols may obtain information about the data connec-
`tion. For example, the transfer rate for a high-speed data connection in a GSM
`(Global System for Mobile Communications) network is a multiple of 9.6 or 14.4
`kbps and normally not more than 28.8 kbps. In a third-generation UMTS (Universal
`Mobile Telecommunications System) network the maximum data transfer capacity
`is 2 Mbps.If a terminal that can operate in both UMTS and GSM uses the method
`according to the invention to indicate to an application at the other end of the con-
`nection the protocol usedin the link layer, the application may use video to present
`the data, depending on the data transferrate.
`
`If the method according to the invention is used to communicate information from
`the upper protocols to the lower protocol layers, the information about the protocol
`may be added to the protocol frame. Advantageously a field is reserved in the frame
`for this purpose. Information in the protocol frame reachesall lower protocol layers
`in the same terminal, network element, network interface and/or terminal at the
`other end of the connection. If information is to be sent from the lower protocols to
`the higher ones, it has to be done indirectly. In a terminal, for example, the infor-
`mation about the lower protocols can be locally signaled to a higher protocol which
`places that information in its protocol frame or inserts it in the data to be trans-
`ferred. So the information travels over the connection and reaches the upper proto-
`col layers in the network element, network interface and/or terminal at the other end
`of the connection.
`
`In the method according to the invention the information about protocols, protocol
`versions or protocol elements may be transferred in protocol frames of a certain
`protocol layer, in a field reserved for that purpose. The advantage of using a special
`field is that the lower protocols need not go through and analyze the whole contents
`of the packets, but an identifier found at a certain location of a packet identifies the
`protocols. Another alternative is to communicate this information whensetting up
`the connection.In that case it may be transferred either in a data packet (say, proto-
`col field) associated with the handshake procedure or in a control connection sepa-
`rate from the packet switched data connection used for the data transfer if such a
`connectionis provided.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`Since the protocols used in data communications networks are widely known and
`ratified by standardizing bodies or corresponding organizations, information about
`
`35
`
`Samsung- Exhibit 1019 - Page 8
`
`Samsung - Exhibit 1019 - Page 8
`
`

`

`WO 00/48373
`
`PCT/FI00/00090
`
`them may be communicated using short identifiers. In addition, the identifier ac-
`cording to the invention for communicating protocol information is advantageously
`a hierarchical data structure, ie. a protocol or protocols is/are first
`identified
`roughly, whereafter a more detailed definition is given. Such a hierarchical data
`structure is flexible and fast to process as it quickly indicates whether the more de-
`tailed part contains relevant information.
`
`Information communicated by the method according to the invention may beutil-
`ized locally in the same terminal, in a network element at the network interface or in
`a terminal at the other end of the connection. The invention takes no position on
`how to decide in whichlayers the protocols are the most important as regards data
`transfer or data presentation formats, for instance, or where and how this informa-
`tion is utilized in the other protocollayers.
`
`10
`
`The invention is below described in greater detail referring to the preferred em-
`bodiments of the invention and to the appended drawing, in which
`
`15
`
`Fig. 1
`
`showsa prior-art packet switched data connection overa radio link with
`the protocolstacks,
`
`20
`
`Fig. 2
`
`Fig. 3
`
`Fig. 4
`
`Fig. 5
`
`showsa prior-art packet switched data connection over the air interface
`of a wireless mobile network with the protocol stacks,
`
`shows a data communication method according to two preferred em-
`bodiments of the invention,
`
`showsin greater detail a protocol layer associated with a third preferred
`embodimentofthe invention,
`
`showsa data structure used for communicating protocol information ac-
`cording to a fourth preferred embodimentof the invention, and
`
`25
`
`Fig. 6
`
`shows a schematic of an apparatus that employs the method accordingto
`a preferred embodimentofthe invention.
`
`Reference was already made to Figs. 1 and 2 in the description ofthe priorart.
`
`Fig. 3 schematically illustrates two methods according to a preferred embodiment of
`the invention for communicating information aboutthe protocols in use. The figure
`shows protocol frames associated with a certain packet switched data connection:
`the packet at the far right has been sentfirst. In each protocol frame, oblique lines
`
`30
`
`Samsung- Exhibit 1019 - Page 9
`
`Samsung - Exhibit 1019 - Page 9
`
`

`

`WO 00/48373
`
`PCT/F100/00090
`
`indicate that portion of the protocol frame which communicates information about
`the protocols in use.
`
`The upper part of Fig. 3 shows a method in which the protocol frames 301-306 used
`for the data transfer proper carry protocol information as well. By way of example,
`each protocol frame in the figure contains a protocol identifier 307 (say, a protocol
`field). Depending on thesituation, the identifier may be in every protocol frame or
`only in part of the frames, e.g. in every hundredth frame.
`
`The bottom part of Fig. 3 shows a method in which the information about the proto-
`cols used is communicatedat the beginning of the connection. The packets 308-313
`associated with the data transfer are in chronological order from rightto left. In this
`case the information about the protocols used is in identifier 314 whichis in the first
`protocol frame 308 of the packet switched data connection, but it is more common
`that the information is transferred in one or more handshaking messages at the be-
`ginning of the connection. Anotheralternative is that the information is communi-
`cated via a separate control connection at the beginning of the connection. For
`example, in mobile networks a terminal usually has a control connection overthe air
`interface and radio access network to a network node on the border of the radio
`access network,i.e. the contro! connection exists between the terminal 201 and net-
`work element 204 in Fig. 2. This connection may be one of the so-called call
`control, session management, mobility management or radio resource management
`(L3) connections andit relates e.g. to the mobility management of the terminal, to
`the session management and/or
`to the management of the frequencies and
`transmission power used in the radio transmission. It may also be established
`between the terminal and a switch (not shown in Fig. 2) or another apparatus per-
`forming control functions. The information about the protocols used in the packet
`switched data connection may also betransferred via this control connection when
`opening the packet switched data connection.
`
`Fig. 4 showsa situation whichutilizes a preferred embodimentof the invention. Fig.
`4 depicts in more detail the structure of the second protocol layer of a radio access
`network in the packet switched data connection of Fig. 2 in an UMTSnetwork. In
`an UMTSnetwork, the packet switched data connections associated with a certain
`terminal or application may be linked together by means of an identifier called a
`packet switched data protocol context.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`At the radio access network side the second protocol layer comprises two sublayers:
`a link access control (LAC) protocol and media access control (MAC) protocol. Fig.
`
`35
`
`Samsung - Exhibit 1019 - Page 10
`
`Samsung - Exhibit 1019 - Page 10
`
`

`

`WO00/48373
`
`PCT/FI00/00090
`
`4 illustrates the operation of the LAC protocol: the third protocol layer is above in-
`terface 401 and the MAClayer is below interface 423. The layer 3 compatibility
`entity (L3CE;essentially equal to PDCP or Packet Data Convergence Protocol) 407
`adjacent to the third protocol layer comprises an administrative unit 408 and the
`compatibility unit 409 proper. The L3CE is responsible for recognizing the data
`transfer needs of the packet switched data protocol contexts and for presenting said
`needsto radio bearer services. Network service access points 403-406 are specified
`for the upper interface of the L3CE such that each access point has a network
`service access point identifier (NSAPI) of its own. Fig. 4 shows four network
`service access points by way of example. The L3CE administrative unit 408 has a
`network service access point 402 ofits own.
`
`Each packet switched data protocol context has at its disposal at least one network
`service access point via which data are transferred to the compatibility unit. At the
`lower interface 410 of the L3CE there are service access points 412-415 via which
`data are transferred to radio access bearer services. Each service access point with
`its characteristics corresponds to a certain type of radio access bearer service and
`there are as manyofthem asthere are possible different radio access bearer services
`(Fig. 4 shows four service access points corresponding to four different radio access
`bearer services), Service access point 411 is associated with data communications
`between the administrative units of the variouslayers.
`
`Operation of the compatibility unit 409 is controlled through the administrative unit
`408 and it has knowledgeof the packet switched data protocol contexts’ data trans-
`fer quality and quantity requirements agreed during the connection setup stage.
`However its main function is to flexibly map the network service access points to
`the service access points accordingto the data transfer needs of each particular net-
`work service access point andto limit the data transfer if an attempt is made to use a
`transfer rate that exceeds the resources reserved for the packet switched data proto-
`col context in question. It distributes the data packets coming through the network
`service access points to several service accesspoints if they have different connec-
`tion quality requirements.It is possible to direct data packets from multiple network
`service access points to one and the sameservice access point, ie. a single radio
`access bearer service may carry information arriving through several network serv-
`ice access points. The compatibility unit may also perform data or protocol field
`packing.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`Samsung - Exhibit 1019 - Page 11
`
`Samsung - Exhibit 1019 - Page 11
`
`

`

`WO 00/48373
`
`PCT/F100/00090
`
`10
`
`Logical link entities 419-422 in the logical link control (LLC) layer 416 control the
`data transfer over individual radio access bearer services. There is one logical link
`entity per each service access point. These entities use their own protocol structures
`into the data fields of which they place the data coming from the compatibility unit
`409 via the service access point. A logical link management (LLM) entity 417
`which controls the logical link entities is responsible, among other things, for the
`establishment and termination of the logical link connections, setting of initial pa-
`rameters ofa logical link, handling of certain error conditions and for the communi-
`cation of logical link control parameters between terminals. It communicates with
`the LLM entities of other network elements in the radio access network through a
`Jogical control link unit 418. From the LLC layer the LLC protocol frames are
`transferred across the LAC-MACinterface 423 at point 424.
`
`In a preferred embodiment of the invention a network node 204 at the interface of
`the fixed network and radio access network analyzes what protocols are used in the
`packet switched data connections. Eachlogical link entity of this network node adds
`to its protocol frame (all or just part of them or only during the handshake) a proto-
`col identifier which indicates the higher protocols used. Information about these
`protocols arrives at the logical link entities via the LLM entity 417. A protocol
`identifier may be utilized both for selecting a radio access bearer service for a
`packet switched data connection and for managing radio access bearer services. The
`protocol identifier may be especially helpful when solving in the MAClayer prob-
`lems such as repeated retransmissions caused by traffic congestion or transmission
`deadlocks. For example, selection of retransmission mode, size of possible ac-
`knowledge window and adjustmentofthat size, management of LLC packets, and
`estimation of the quantity of data transferred are functions where the identification
`of higher protocols is useful. If, for example,it is known that an application requires
`real-time data transfer, the radio access bearerservice will not carry out retransmis-
`sions andtries to send the packets in correctorder.
`
`Fig. 5 showsa hierarchical data structure 500 according to a preferred embodiment
`of the invention which identifies protocols in a multiprotocol environment. It is used
`e.g. in a radio access network to communicate information between the LLC and
`MAClayers shown in Fig. 4. The protocol identifier may be placed either in a
`special field in the protocol frame or within the data proper. The protocol identifier
`shown in Fig. 5 is two bytes long: the bytes are represented as horizontal rows and
`bits as vertical columns, the least significant bit being farthestto the right.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`Samsung - Exhibit 1019 - Page 12
`
`Samsung - Exhibit 1019 - Page 12
`
`

`

`WO 00/48373
`
`PCT/FI100/00090
`
`11
`
`The most significant bit 501 in the first byte is a so-called poll/final (PF) bit the
`meaning of which depends on the type of protocol frame in the protocol field of
`which the protocol identifier is placed. The next four bits 502 are used for rough
`protocol identification, so the field could be called a protocol contentidentifier, for
`example. Each of these four bits is a so-called flag, indicating whethera given pro-
`tocol is in use. The bottom part of Fig. 5 showsthe structure of the protocol content
`identifier 502 in more detail. The protocols chosen are data communication proto-
`cols typically used in packet switched networks. For example, the first IP (Internet
`Protocol) identifier in the protocol content identifier is associated with the network-
`layer protocol: 0 indicates that the network protocol used is not IP, and 1 indicates
`that the protocol is IP. The second PR (Packet Radio) identifier is associated with
`the wireless packet switched network used: 0 indicates that a GPRS (General Packet
`Radio Service) network is not used, and 1 indicates that a GPRS networkis used.
`The third TU (Transmission Control Protocol / User Datagram Protocol) identifier
`distinguishes between the TCP and UDPprotocols: 0 corresponds to the use of UDP
`and 1 corresponds to the use of TCP. The fourth AP (Application Protocol)
`identifier indicates whetheror not the data structure describes the application proto-
`col in more detail (0 means no, 1 meansyes).
`
`Thelast three bits in the first byte of the protocol identifier 500 constitute a protocol
`field 503 which defines the application protocol in use. Thefield could be called a
`protocol contentidentity group, for example. If the IP identifier is 1 in the protocol
`content identifier, value 000 in the protocol content identity group corresponds

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket