TERMINAL LOCATION USING FORCED HANDOVER OF M2M DEVICE IN WHITE SPACE

- Neul Ltd.

A method for determining the location of a communication terminal in a network comprising a plurality of communication devices, each configured to communicate with at least one terminal, the method comprising instructing the terminal whose location is to be determined to handover from a communication device to which it is currently attached to another communication device in the network.

Skip to: Description  ·  Claims  · Patent History  ·  Patent History
Description

The invention relates to determining the location of a terminal in a communication network.

The majority of communication devices are primarily intended to communicate data whilst they are being operated by a nearby user. For example, a typical telephone or personal computer is designed to allow a user who is holding, or is at least near to, the device to speak or type data into the device and to communicate that data to a user at another location. For this purpose the device is typically provided with a user interface that includes means for accepting data from a user and means for providing data to a user. The means for accepting data from a user could, for example, be a keypad, microphone or touch-screen. The means for providing data to a user could, for example, be a display, loudspeaker or an indicator light.

Some computers are designed for unattended operation. One example is a web server located in a server farm. Whilst this can if necessary be controlled by means of a local keypad and display, in normal operation administrative tasks are performed on the server by means of a communications link to a personal computer located elsewhere, and inputs from the user interface of that personal computer are transmitted over a network to the server. Similarly, when the web server is in a , communication session with a client browser running on a remote personal computer, the data served by the web server is provided in response to inputs that the user of that remote personal computer provides to the personal computer.

In each of the instances described above, the communication links between the devices in question need to provide a reasonably low degree of latency so that the users will be satisfied with the responsiveness of the links. For example, when two users are communicating through their telephones, they expect to be able to hear each other's speech substantially in real time; or when a user is controlling or is in a web session with a web server he will expect to receive prompt responses from the server. If there is a long delay in communication, the user may become frustrated and can be expected to eventually close the link.

It is anticipated that there will be an increase in the number of devices that communicate automatically without a user being in attendance. For example, it has been forecast that in the future devices such as domestic appliances, motor vehicles and utility meters will commonly be capable of sending data to report on their operational state and receiving data such as upgraded operating software. It is widely predicted that the preferred way for these devices to communicate will be via the internet, with their initial access to the Internet being over a wireless link.

The protocol for the wireless link is suitably one that is optimised for machine-to-machine communication. Preferably the protocol also operates in so-called whitespace: a part of the spectrum that is made available for unlicensed or opportunistic access. Conveniently, that may be in the UHF TV band and spans all or part of the range from 450 MHz to 800 MHz, depending on the country. A large amount of spectrum has been made available for unlicensed wireless systems in this frequency range. A problem with operating in whitespace is that the available bandwidth is variable and cannot be guaranteed. These limitations are well-matched to the capabilities of machine-to-machine networks in which there is no human interaction. Machine-to-machine networks are typically tolerant of delays, dropped connections and high latency communications.

Any network operating in the UHF TV band has to be able to coexist with analogue and digital television broadcast transmitters. The density of the active television channels in any given location is relatively low (resulting in the availability of whitespace that can be used by unlicensed systems). The FCC has mandated that systems operating in whitespace must reference a database that determines which channels may be used in any given location. This is intended to avoid interference with the TV transmissions and certain other incumbent systems such as wireless microphones. The network will also have to coexist with spurious interference from devices such as electric drills. In order to minimise the impact of the machine-to-machine network on television broadcasts and the negative impact of external interferers on the machine-to-machine network, the network preferably implements a frequency hopping sequence generated in dependence on information in the whitespace database and designed to avoid frequencies found to suffer interference and/or poor propagation or throughput.

The network is suitably arranged as a cellular network, in which single base station is arranged to service the terminals located in a particular geographical region. Some of the terminals may be static but others may be mobile, meaning that their location within the network may change in time. Therefore, the network is preferably able to: (i) determine the location of a mobile terminal if required; and (ii) deal with the situation when a terminal moves from the service area of one base station to that of another. Also, although the geographic regions associated with each base station may be notionally distinct from one another, in practice it is likely that some terminals are able to communicate with base stations in neighbouring cells. Therefore, if one base station is unduly loaded compared with its neighbours, it might conceivably be possible for some of that traffic may be diverted to its neighbour. One or more of these issues may be addressed by providing the network with a mechanism for handover by means of which a terminal may be transferred from one base station to another.

The principle of handover is well-known in cellular networks. However, different considerations apply in machine-to-machine networks, which are more tolerant of high latency and dropped communications than traditional cellular networks. Also, communication in machine-to-machine networks tends to be predictable and is often relatively infrequent. There is a need for optimising the mechanism of handover to the particular requirements and capabilities of machine-to-machine networks.

According to a first embodiment of the invention, there is provided a method for determining the location of a communication terminal in a network comprising a plurality of communication devices, each configured to communicate with at least one terminal, the method comprising instructing the terminal whose location is to be determined to handover from a communication device to which it is currently attached to another communication device in the network.

The method may comprise the terminal attaching to another communication device responsive to the instruction.

The method may comprise the other communication device determining an indication of the terminal's location.

The method may comprise g, when the terminal is attached to the other communication device, performing a timing operation to determine an indication of the terminal's location.

The method may comprise determining a location of the terminal in dependence on the indication.

The method may comprise the other communication device forwarding the indication to a location server in the network.

The method may comprise the location server determining a location of the terminal.

The method may comprise the terminal reattaching to the communication device once the indication of its location has been determined.

The method may comprise the, communication device, once the terminal has reattached, obtaining the determined location of the terminal from the location server.

The method may comprise repeatedly instructing the terminal to handover from the communication device to which it is currently attached to another communication device in the network.

The method may comprise determining, each time that the terminal hands over to another communication device responsive to the repeated instructions, an indication of the terminal's location, and determining a location for the terminal in dependence on those indications.

The method may comprise the terminal selecting the other communication device independently of the communication device to which it is currently attached.

The method may comprise the terminal selecting, as the other communication device, a communication device from which it experiences a signal strength below a threshold at which the terminal is configured to determine it can maintain a communications link with a communication device.

According to a second embodiment of the invention, there is provided a communication device for communicating with a terminal via a communication network comprising a plurality of communication devices, each configured to communicate with at least one terminal, the communication device being configured to determine a location associated with the terminal by instructing it to handover to another communication device in the network.

The communication device may be configured for machine-to-machine communication.

The communication device may be configured to operate in whitespace.

The present invention will now be described by way of example with reference to the accompanying drawings. In the drawings:

FIG. 1 shows an example of a machine-to-machine network;

FIG. 2 shows an example of a process for attaching to a communication device;

FIG. 3 shows an example of a process for handing over from one base station to another;

FIG. 4 shows an example of using handover to determine a terminal's location;

FIG. 5 shows an example of a communication device; and

FIG. 6 shows an example of a communication terminal.

If a terminal's location is to be determined in a cellular network comprising a plurality of communication devices for providing services to terminals, the fact that the terminal will typically be capable of communicating with more than one of those communication devices may be exploited to determine the location of the terminal. Specifically, the terminal whose location is to be determined may be instructed to handover from a communication device to which it is currently attached to another communication device in the network. The location of that terminal may then be determined by means of a timing measurement made by the new communication device.

A communication device is suitably configured to communicate with one or more terminals. Typically these terminals will be located in a particular “cell”, i.e. a geographical area that the communication device services. The communication device is, however, suitably configured to communicate with any terminal that is “attached” to it, i.e. any terminal that has previously registered itself with the communication device (more details on this process are given below). The communication device may be considered as being responsible for providing communication services to all of the terminals attached to it. A terminal is suitably attached to only one communication device at a time. “Handover” may be viewed as a process of detaching from one communication service offered by the network and attaching to another. Often “handover” involves detaching from one communication device and attaching to another but it may also just involve switching between different services provided by the same communication device (e.g. by switching to a different carrier frequency).

One or more embodiments of the invention will now be described with specific reference to a wireless network in which the communication device is a base station. This is for the purposes of example only and it should be understood that the mechanisms described herein may be implemented in any suitable communication device, irrespective of what particular role that device plays within the network.

An example of a wireless network is shown in FIG. 1. The network, shown generally at 104, comprises one or more base stations 105 that are each capable of communicating wirelessly with a number of terminals 106. Each base station may be arranged to communicate with terminals that are located within a particular geographical area or cell. The base stations transmit to and receive radio signals from the terminals. The terminals are entities embedded or machines or similar that communicate with the base stations. Suitably the wireless network is arranged to operate in a master-slave mode where the base station is the master and the terminals are the slaves.

The base station controller 107 is a device that provides a single point of communication to the base stations and then distributes the information received to other network elements as required. The network may be arranged to communicate with a client-facing portion 101 via the Internet 102. In this way a client may provide services to the terminals via the wireless network.

Other logical network elements shown in this example are:

    • Core network. This routes traffic information between base stations and client networks.
    • Billing system. This records utilisation levels and generates appropriate billing data.
    • Authentication system. This holds terminal and base station authentication information.
    • Location register. This retains the last known location of the terminals.
    • Broadcast register. This retains information on group membership and can be used to store and process acknowledgements to broadcast messages.
    • Operations and maintenance centre (OMC). This monitors the function of the network and raises alarms when errors are detected. It also manages frequency and code planning, load balancing and other operational aspects of the network.
    • White spaces database. This provides information on the available white space spectrum.
    • Client information portal. This allows clients to determine data such as the status of associated terminals, levels of traffic, etc.

In practice, many of the logical network elements may be implemented as databases running software and can be provided on a wide range of platforms. A number of network elements may be physically located within the same platform.

A network such as that shown in FIG. 1 may be used for machine-to-machine communications, i.e. communications that do not involve human interaction. Machine-to-machine communications are well-matched to the limitations of operating in white space, in which the bandwidth available to the network may vary from one location to another and also from one time instant to the next. As the network does not have any specific part of the spectrum allocated to it, even unallocated parts of the spectrum may become unavailable, e.g. due to a device in the vicinity that is operating outside of the network but using the same part of the spectrum. Machines are well-adapted to tolerating the delays and breaks in communication that can result from these varying communication conditions. The network is also preferably adapted to the communication conditions by, for example, making use of frequency hopping sequences (which are suitably different for neighbouring cells), different data rates (which can be adapted to the signal conditions and technical capabilities of the relevant terminals), spreading codes and acknowledgement mechanisms so that lost packets can be identified and resent.

In many applications terminals will be static (e.g. electricity meters) but there are some applications where terminals will be mobile (e.g. vehicle telemetry). The network should be capable of managing this mobility. If the network is configured for machine-to-machine communications, the network is unlikely to have to offer seamless connections since a short break in transmission while a terminal moves to a different cell is likely to be acceptable. Therefore, full handover support is not necessary. Terminals may be configured to manage their own mobility by discovering the strongest base station in their region and registering with that base station. The algorithms used in the terminal to determine when to search for other base stations preferably take into account the fact that in regions of overlapping coverage, higher data rates may be available from some of those base stations compared to others.

An example of a process that a terminal may use when attaching to a base station is shown in FIG. 2. The process starts in step 201. Suitably a terminal scans all available frequencies when it is turned on, looking for a synchronisation burst from a base station (step 202). Once a synchronisation burst is identified, the terminal may decode the base station identity and associated information contained in that burst (step 203). Suitably the base station transmits a synchronisation burst in the header portion of every frame that it transmits (e.g. in the DL_FCH field). If the terminal discovers multiple base stations it selects its preferred base station according to its internal algorithms (step 204). In general it will prefer the base station with the strongest signal level. The terminal also may prefer the base station offering the highest data rate. However, in some instances the preferred base station may be a private base station, in which case the terminal is only permitted to attach if its identity is pre-stored in the base station's memory. The terminal will be able to determine that a base station is a private one based on information contained in the synchronisation burst. Base stations are suitably able to update the pre-stored list of terminal identities at any time.

Once a base station has been found that the terminal can attach to it sends a contended access message to the base station providing details of its identity and its capabilities, such as the communication modes it supports (step 205). Periodic attachment messages are not needed. The -network assumes a terminal remains attached to a given carrier on the base station until it attaches to a different carrier, base station or sends a detach message. The process terminates in step 206.

The network preferably leaves the decision to hand off to a different base station with the terminal. This minimises the network resources that need to be allocated to handoff by avoiding the substantial signalling between the base station and the terminal (of measured signal levels, handover commands etc) and between neighbouring base stations (of terminal identities, communication capabilities etc) that would otherwise be required.

Terminals may choose to periodically measure signal levels from all available cells in their location and hand off to a different cell where there is a material improvement in signal level. Moving terminals preferably make these measurements on a frequent basis so as to keep up-to-date with changes in signal levels as they move around. For static terminals, such measurement may be made as instructed by the base station. For example, the base station may be aware of a new cell recently inserted into the network and trigger a re-scan from all its attached terminals accordingly.

There are situations when the network would function better if the terminals handed over to different cells. For example, when: (1) a better signal strength is available from a neighbouring cell, allowing faster data transmission and hence a reduction in network resource requirements; and (2) a cell is congested but neighbouring cells are not. Therefore, the network may “encourage” the terminal to consider handoff.

Handover can be used to implement a distributed method of load balancing across cells in a network. If the network determines that one cell is congested, but that neighbouring cells are uncongested, it may inform the terminals in the congested cell of this. The decision to move to a different cell is, however, preferably left to the terminal. The terminal uses pre-defined algorithms in order to decide whether to move. These algorithms are preferably designed to result in optimal loading and resource allocation across the network.

It is desirable in cellular networks for loading to be reasonably evenly balanced across cells such that no one cell is congested when its neighbours are uncongested. Balancing can Often be achieved by identifying terminals that are able to receive coverage from more than one cell and moving enough of these terminals to less congested cells to re-balance the loading.

In many cellular networks the base station or the network controls all aspects of terminal mobility, including handover. In these networks it is straightforward to load balance since the network can identify those terminals that should be moved and issue handover instructions to them. However, in a machine-to-machine network, terminal mobility is preferably controlled by the terminal and not the network, with the terminal making relatively autonomous decisions as to the best cell to register on to.

When the network detects a condition where load balancing is required, it may send messages to terminals informing them of the cell that is congested and optionally providing the identities of nearby cells that are uncongested. Each terminal then decides independently whether or not to move to a different cell based on factors including:

    • The relative signal level from the alternative cells. If the new cells offer poor signal quality then the terminal will prefer not to move. This is also preferred from the network's perspective since a high spreading factor may be required in the alternative cell, consuming a disproportionate proportion of network resources.
    • The ability of the terminal to scan alternative cells. For example, for very low power terminals, the battery drain associated with scanning may be seen as overly high.
    • The expected traffic level from the terminal. If the terminal does not anticipate sending much traffic in the coming time period then the benefits from moving may be outweighed by the signalling traffic involved.

Terminals that conclude they should move preferably wait a random length of time before performing the handover to avoid a sudden flood of traffic from one cell to another. The terminal preferably monitors its current base station to see whether the situation changes during this waiting period. If so, moving may no longer be necessary.

An example of a process by which a terminal may handover from one base station to another is shown in FIG. 3. The process starts in step 301. In step 302 a congested base station receives details of levels of congestion on base stations in the vicinity from the core network. If one or more of these base stations is substantially less congested, the base station may indicate to one or more attached terminals a preference for them to reattach to the uncongested base stations (step 303). The base station may be configured to do this by sending a handover message followed by the identities of the uncongested base stations (step 304). The message preferably also contains details of the other base station's frequency hopping sequences to assist the terminals in attaching to those base stations. This message may suitably be sent via the broadcast control channel. However, although the base station uses this message to suggest to the terminal that it handover to another base station, the final decision whether or not to handover remains with the terminal (step 305). Terminals may make their own decision as to whether to hand off to a neighbouring cell based on, for example: (1) whether they have good coverage from that cell; and (2) whether they are likely to generate substantial traffic levels in the coming hours. For example, it will generally make little sense for an energy meter to hand over to a new cell because the signalling load involved in that handover is likely to be higher than the number of messages the meter expects to transmit during the period of congestion.

Handover is not restricted to transferring terminals from one base station to another. Handover may also be used to transfer a terminal between different traffic services offered by a single base station. For example, some base stations may support multiple carriers simultaneously. Such a base station may perform load balancing across those carriers using a similar approach to that described above, i.e. by suggesting to particular terminals or classes of terminals that they handover to a different carrier. The message comprising this suggestion may also include details of the carrier to which the terminal should attach.

Leaving the final decision on handover to the terminal allows the signalling load involved in mobility management to be reduced, as explained above. There are a number of factors specific to machine-to-machine networks that enable handover to reside largely within the terminal, including the relatively infrequent nature of communications involving any particular terminal and the predictable nature of their timing. In addition, by having each terminal make its decision in dependence on algorithms that are suitably implemented by a large number of terminals throughout the network, it is possible for effective load balancing to be achieved even though ultimate management of handover resides principally in the terminals.

Handover may also be used to determine terminal location.

It is often advantageous to be able to determine the location of a terminal. For example, when deploying environmental sensors the network may determine the location of the sensor after deployment to make the deployment process more straightforward. Alternatively, location determination can be useful for tracking the location of assets.

The accuracy with which a terminal's location can be determined will depend on a number of issues including base station timing accuracy, number of base stations in range of the terminal and the terrain (because of the resultant multipath effects). There are two main methods of location: passive and active. Both are preferably supported by the network. Both methods start with a message from the network requesting the terminal instigate the location procedure.

In passive location a terminal monitors the transmissions from as many base stations as possible and determines the relative time of arrival of the synchronisation burst from each. It also decodes the identity of each base station. Preferably the terminal selects which base stations it uses. The terminal acts largely autonomously in this regard. It is also free to choose base stations with relatively low signal strength—such that the terminal might not be able to maintain an adequate communications link with that base station—since the terminal only needs to be able to decode the base station's identity and determine a time of arrival of its synchronisation burst. It then returns to its “home” base station the identities and timings of each synchronisation burst relative to the home base station. The base station then passes this information to the location server in the network which uses its knowledge of the location of each base station to triangulate the terminal location. This is then sent back to the client. Passive location requires accurate synchronisation of each of the base stations implying each base station has access to an absolute time, such as GPS time or similar.

In active location the terminal detaches from the home base station and attempts to attach to as many other base stations as it can. An example of this process is illustrated in FIG. 4. The process commences in step 401. In step 402 the base station instructs the terminal to start a location procedure. The terminal accordingly detaches from its home base station and attaches to a new base station (step 403). The terminal is preferably free to select the base stations it attaches to, similarly to normal handoff, so that the terminal acts largely autonomously rather than under the control of its home base station. When the handoff is triggered by the need to perform a location procedure, the terminal may choose to handoff to any base station that it receives a measurable signal from. The terminal does not need to be able to maintain an adequate communications link with that base station since its handoff is only for the purpose of determining its location. Once attached the terminal requests a timing measurement be made (step 404). The base station performs this measurement by determining the difference in timing between the start of an uplink frame as transmitted by the terminal and the actual time that the terminal transmission is received by the base station (step 405). The base station may forward this information and the terminal identity to the terminal, the original base station or (preferably) the location server. This process may be repeated multiple times with the terminal obtaining timing measurements from a number of different base stations (ideally, at least three measurements should be obtained). Once the terminal has completed this process, it returns to its original “home” base station and reattaches (step 406). The home base station may then determine the terminal's location itself (by means of the timing measurement performed by the other base station(s)) or it may signal to the location server that the process is complete, whereupon the location server determines the terminal's location (step 407). The location server returns the terminal's location to the home base station (step 408) and the process terminates in step 409.

The location calculation could be performed in the terminal, in which case the terminal should be provided with the locations of the base stations from which it obtained its timing measurements. However, this is not a preferred option as many terminals will be relatively simple devices with limited battery and processing power. In addition, the location of the terminal is usually required by the client rather than the terminal itself. Therefore, in most instances it will be more convenient to perform the calculation in the core network.

Using handover in this way has the advantage that the different base stations do not need to be synchronised. It is a mechanism that is not appropriate for pre-existing cellular networks due to the risk that a call or other communication might be missed while the terminal attaches to the other base stations. In machine-to-machine networks this does not tend to be an issue because: (i) the base station typically knows in advance when it will need to communicate with the terminal so it can schedule the location process accordingly; and (ii) in any event the network is designed to be tolerant of delays, high latency, lost packets etc due to the inherent unreliability of operating in whitespace.

An example of the functional blocks that may be comprised in a communication device according to one embodiment of the invention are shown in FIG. 5. The communication device, shown generally at 501, comprises a communication unit 503 connected to an antenna 502 for transmitting and receiving messages. The communication device further comprises individual service units 504 for providing different communication services to the terminals attached to it. These different communication services might relate to different carrier frequencies, communication modes, data rates etc. The communication device further comprises a balancing unit 505 for determining that one or more communication services are overloaded and for indicating to one or more terminals that they should handover to a different service and/or communication device accordingly. The communication device also comprises a network unit for storing the identities and hopping sequences of neighbouring communication devices (506) and a location unit for providing the required signalling to a terminal and a location server when a terminal's location is to be determined (507). The location unit may also perform location calculations for determining a terminal's location and timing measurements for terminals that have attached to the communication device for location purposes. The communication unit may effectively act as a central controller and may pass information between the other functional blocks.

An example of the functional blocks that may be comprised in a communication terminal according to one embodiment of the invention are shown in FIG. 6. The communication terminal, shown generally at 601, comprises a communication unit 603 connected to an antenna 602 for transmitting and receiving messages. The communication terminal further comprises a decision unit 604 for deciding whether or not to handover to a different communication service responsive to a request from a communication device, an attachment unit 605 for attaching and detaching from communication devices and individual services provided by those devices and a location unit 606 for determining that different communication devices should be attached to and requesting the relevant timing measurements from those devices. The communication unit may effectively act as a central controller and may pass information between the other functional blocks.

The apparatus in FIGS. 5 and 6 are shown illustratively as comprising a number of interconnected functional blocks. This is for illustrative purposes and is not intended to define a strict division between different parts of hardware on a chip. In practice, the communication device and communication terminal preferably use a microprocessor acting under software control for implementing the methods described herein. In some embodiments, the algorithms may be performed wholly or partly in hardware.

Although one or more embodiments of the invention have been described above with specific reference to machine-to-machine networks, it should be understood that the mechanisms described above may be advantageously implemented in any type of network.

The applicants hereby disclose in isolation each individual feature described herein and any combination of two or more such features, to the extent that such features or combinations are capable of being carried out based on the present specification as a whole in light of the common general knowledge of a person skilled in the art, irrespective of whether such features or combinations of features solve any problems discloses herein, and without limitation to the scope of the claims. The applicants indicate that aspects of the present invention may consist of any such feature or combination of features. In view of the foregoing description it will be evident to a person skilled in the art that various modifications may be made within the scope of the invention.

Claims

1. A method for determining the location of a communication terminal in a network comprising a plurality of communication devices, each configured to communicate with at least one terminal, the method comprising instructing the terminal whose location is to be determined to handover from a communication device to which it is currently attached to another communication device in the network.

2. A method as claimed in claim 1, comprising the terminal attaching to another communication device responsive to the instruction.

3. A method as claimed in claim 2, comprising the other communication device determining an indication of the terminal's location.

4. A method as claimed in claim 2, comprising, when the terminal is attached to the other communication device, performing a timing operation to determine an indication of the terminal's location.

5. A method as claimed in claim 3, comprising determining a location of the terminal in dependence on the indication.

6. A method as claimed in claim 3, comprising the other communication device forwarding the indication to a location server in the network.

7. A method as claimed in claim 6, comprising the location server determining a location of the terminal.

8. A method as claimed in claim 7, comprising the terminal reattaching to the communication device once the indication of its location has been determined.

9. A method as claimed in claim 8, comprising the communication device, once the terminal has reattached, obtaining the determined location of the terminal from the location server.

10. A method as claimed in claim 1, comprising repeatedly instructing the terminal to handover from the communication device to which it is currently attached to another communication device in the network.

11. A method as claimed in claim 10, comprising:

determining, each time that the terminal hands over to another communication device responsive to the repeated instructions, an indication of the terminal's location; and
determining a location for the terminal in dependence on those indications.

12. A method as claimed in claim 1, comprising the terminal selecting the other communication device independently of the communication device to which it is currently attached.

13. A method as claimed in claim 1, comprising the terminal selecting, as the other communication device, a communication device from which it experiences a signal strength below a threshold at which the terminal is configured to determine it can maintain a communications link with the communication device.

14. A communication device for communicating with a terminal via a communication network comprising a plurality of communication devices, each configured to communicate with at least one terminal, the communication device being configured to determine a location associated with the terminal by instructing it to handover to another communication device in the network.

15. A communication device as claimed in claim 14, configured for machine-to-machine communication.

16. A communication device as claimed in claim 14, configured to operate in whitespace.

17. (canceled)

18. (canceled)

Patent History
Publication number: 20140219245
Type: Application
Filed: Jun 12, 2012
Publication Date: Aug 7, 2014
Applicant: Neul Ltd. (Cambridge)
Inventor: William Webb (Cambridge)
Application Number: 14/126,063
Classifications
Current U.S. Class: Hand-off Control (370/331)
International Classification: H04W 36/00 (20060101); H04W 4/00 (20060101);