Ad-hoc simple configuration
A protocol governing the operation of an ad-hoc WLAN enables each device in the WLAN to be configured as a registrar and/or an enrollee. Accordingly, each device is configurable to support both the registrar as well as enrollee modes of operations. In response to a time-driven user action, the device may be configured to enter into a registrar mode or an enrollee mode. While in the registrar mode, the device enters into an aggressive beaconing phase by setting its beacon contention window to a relatively very small value. The aggressive beaconing increases the probability of the discovery of the registrar by the enrollees. Optionally the device may prompt the user to select between a registrar and an enrollee mode of operation by displaying the option on an LCD panel.
Latest Marvell World Trade Ltd. Patents:
- Methods and apparatus for distributing baseband signal processing of fifth (5G) new radio uplink signals
- Methods and apparatus for discovering codeword decoding order in a serial interference cancellation (SIC) receiver using reinforcement learning
- ZONE SELF SERVO WRITING WITH SYNCHRONIZED PARALLEL CLOCKS
- DIFFERENTIAL INTERFACE TRANSMISSION OF FLY-HEIGHT CONTROL DATA
- Self-Encryption Drive (SED)
The present application claims benefit under 35 USC 119(e) of U.S. provisional application No. 60/821,771, filed Aug. 8, 2006, entitled “WiFi Simple Config Design”, the content of which is incorporated herein by reference in its entirety.
BACKGROUND OF THE INVENTIONThe present invention relates to wireless communication networks, and more particularly to a protocol for establishing an ad-hoc wireless fidelity network.
Wireless fidelity (WiFi) networks are well known and are being increasingly used to exchange data. One known WiFi standard, commonly referred to as WiFi Protected Setup (WPS) or WiFi Simple Configuration (WSC), is a Wireless Local Area Network (WLAN) standard that defines the communication modes and the associated configuration protocols for an infrastructure WLAN.
There are three logical components in an infrastructure WSC network, namely a registrar, an access point (AP) and an enrollee. Referring to
Referring to
Referring to
As electronic devices with wireless network capabilities become more pervasive, it would be desirable to enable two or more of such devices to form an ad-hoc wireless network to exchange data without using an access point.
BRIEF SUMMARYIn accordance with the present invention, a method of forming a wireless ad-hoc network includes triggering an event in response to a first action. The device is configured in a first mode if a second action is taken within a predefined time period of the first action. The device is configured in a second mode if the second action is not taken within the predefined time period of the first action. In one embodiment, the first mode is an enrollee mode and the second mode is a registrar mode. In another embodiment, the first mode is a registrar mode and the second mode is an enrollee mode. The second action may be represented by the pressing of a button on the device. If the device is configured as a registrar, its beacon contention window is set to a very small value either periodically or in response to a button press. Subsequently, the registrar starts to transmit beacons in accordance with the value of its reduced beacon contention window.
The method further includes starting a timer on the configured registrar, initiating an attempt to perform a registrar-enrollee handshake if a probe request transmitted by an enrollee is received by the registrar before the timer reaches a predefined time, and establishing an ad-hoc network with the enrollee if the attempt is successful. In one embodiment, N more enrollees may be added to the ad-hoc network, wherein N is a predefined integer greater than 1. In one embodiment, if the registrar fails to receive an enrollee probe request before the timer reaches the predefined time, the registrar is placed in an idle mode. The registrar may exit the idle mode periodically for aggressive beaconing and using a reduced beacon contention window, in accordance with a first clock period. Furthermore, the scanning period of an enrollee may be set equal to the period of the first clock.
In some embodiments, the beacon contention window of the registrar continues to be reduced so long as the registrar receives beacons from other registrars. In yet other embodiments, the registrar will not register an enrollee unless the registrar receives a PIN associated with the enrollee seeking to communicate with the registrar. The PIN entry may be performed using an optical signal, an audio signal, an RF signal, or manually by a user.
If the device is configured as an enrollee, a timer is started and the enrollee starts to scan for beacons transmitted by a registrar. If the enrollee receives a beacon from a registrar before the timer's time reaches a predefined time, the enrollee initiates an extended authentication protocol exchange with the registrar. After the completion of the exchange of the extended authentication protocol, an attempt is made to perform a registrar-enrollee handshake. If the attempt is successful, an ad-hoc network is established, otherwise the timer is reset.
In some embodiments, the enrollee is placed in an idle mode after it joins the ad-hoc network. In some embodiments, a registrar application is started on the enrollee after the ad-hoc network is established.
In accordance with another embodiment of the present invention, a method of selecting a configuration mode of a device in an ad-hoc network includes in part, triggering an event in response to a first action, presenting an option to configure the device as a registrar or an enrollee, configuring the device as an enrollee if the first option is selected, and configuring the device as a registrar if the second option is selected. In some embodiments, the first and second options are presented via a display, such as an LCD panel.
In accordance with another embodiment of the present invention, a device capable of wireless communication includes means for triggering an event in response to a first action, means for configuring the device in a first mode if a second action is taken within a predefined time of the first action, and means for configuring the device in a second mode if the second action is not taken within the predefined time of the first action. In one embodiment, the first mode is an enrollee mode and the second mode is a registrar mode. In another embodiment, the first mode is a registrar mode and the second mode is an enrollee mode. The second action may be represented by the pressing of a button on the device. The device further includes means for setting the beacon contention window of the registrar to a very small value, and means for starting to transmit beacons in accordance with the reduced beacon contention window.
The configured registrar further includes means for measuring time, means for initiating an attempt to perform a registrar-enrollee handshake if a probe request transmitted by an enrollee is received by the registrar before the time measured by the time measuring means reaches a predefined time, and means for establishing an ad-hoc network with the enrollee if the attempt is successful. The registrar further includes means for adding N more enrollees to the ad-hoc network, wherein N is a predefined integer greater than 1. The registrar further includes means for placing the registrar in an idle mode if the registrar fails to receive an enrollee probe request before the measured time reaches the predefined value. The registrar further includes means for forcing the registrar out of the idle mode periodically in accordance with a first clock period. Furthermore, the scanning period of an enrollee may be set equal to the period of the first clock.
Some embodiments further include means to continuously reduce the beacon contention window of the registrar so long as the registrar receives beacons from other registrars. In some embodiments, the registrar includes means for receiving a PIN associated with an enrollee via an optical signal, an audio signal, or a manual entry by a user.
The configured enrollee further includes means for measuring time and means for scanning for beacons from a registrar. If the scanning means receives a beacon from a registrar before the time measured by the time measuring means reaches a predefined time, an initiating means initiates an extended authentication protocol exchange with a registrar. The enrollee further includes means for initiating an attempt to perform a registrar-enrollee handshake following the completion of the exchange of the extended authentication protocol. If the attempt is successful, the enrollee may establish communication over a WiFi ad-hoc network using the credentials obtained from the registrar, otherwise the timer is reset.
The enrollee further includes means for placing the enrollee in an idle mode after it joins the ad-hoc network. The enrollee further includes means for starting a registrar application on the enrollee after the ad-hoc network is established.
In accordance with one embodiment of the present invention, a device adapted to participate in a wireless ad-hoc network session includes, in part, a triggering circuit configured to trigger an event in response to a first action; a first timer; and a controller operative to configure the device in a first mode if the triggering block detects a second before the first timer reaches a known time, and to configure the device in a second mode if the triggering block does not detect a second action before the first timer reaches the known time. In one embodiment, the first mode is an enrollee mode and the second mode is a registrar mode. In another embodiment, the first mode is a registrar mode and the second mode is an enrollee mode. The second action may be represented by the pressing of a button on the device. The controller sets the beacon contention window of the device to a relatively small value if the device is configured as a registrar. Thereafter, the device transmits beacons in accordance with the reduced beacon contention window.
The configured registrar further includes, in part, a second timer. The controller performs a registrar-enrollee handshake if a probe request transmitted by an enrollee is received before the second timer reaches a predefined time. If the handshake is successful, the second timer is reset. In some embodiments, the controller places the registrar in an idle mode if the registrar fails to receive an enrollee probe request before the second timer reaches the predefined time. In some embodiments, the controller attempts to add N more enrollees to the established ad-hoc network, wherein N is a predefined integer greater than one.
In some embodiments, the controller causes the registrar to exit the idle mode periodically for aggressive beaconing using a reduced contention window, in accordance with a first clock period. In yet other embodiments, the controller continues to reduce the beacon contention window while the registrar receives beacons from other registrars. In some embodiments, the registrar includes an interface for receiving a PIN associated with an enrollee seeking to communicate with the registrar. The PIN may be received via an optical signal, an audio signal or a manual user entry.
A configured enrollee further includes, in part, a second timer, and a scanner adapted to scan for beacons transmitted by one or more registrars. The controller initiates an extended authentication protocol exchange if the enrollee receives a beacon from a registrar before the second timer reaches a predefined value. The controller attempts to perform a registrar-enrollee handshake after the completion of the exchange of the extended authentication protocol. If the attempt is successful, the controller uses the network credentials obtained from the registrar to establish communication over a Wi-Fi ad-hoc network. If the attempt is unsuccessful, the second timer is reset.
In some embodiments, the controller places the enrollee in an idle mode after the enrollee joins the ad-hoc network. In some embodiments, the controller causes a registrar application to start on the enrollee after the ad-hoc network is established.
In accordance with another embodiment of the present invention, a device adapted to participate in a wireless ad-hoc network session, includes, in part, a triggering block configured to trigger an event in response to a first action; a display panel presenting an option to configure the device as a registrar or an enrollee; and a controller operative to configure the device as an enrollee in response to a first selected option, and to configure the device as a registrar in response to a second selected option.
In accordance with one embodiment of the present invention, an ad-hoc WLAN is established between two or more devices, such as Personal Digital Assistants (PDAs), digital cameras, phones, video game consoles, etc. In conformity with a protocol governing the operation of the ad-hoc WLAN (hereinafter alternatively referred to as an ad-hoc network) of the present invention, each device in the network can be a registrar as well as an enrollee (client). In other words, in accordance with the present invention, each device is configurable to support both the registrar mode as well as the enrollee mode of operations.
In response to a user action, such as the pressing of a button or entering a soft/hard key, the device may be configured to enter into a registrar mode or an enrollee mode. While in the registrar mode, in response to either user action, such as a user button press, or otherwise periodically, the device enters into an aggressive beaconing mode by setting its beacon contention window to a relatively very small value. The aggressive beaconing increases the probability of the discovery of the registrar by the enrollees. Although the following description is made with reference to an ad-hoc WSC (WPS) network, it is understood that the present invention applies to any other ad-hoc network, WSC or otherwise.
In the embodiment shown in
In some embodiments, after the device is caused to exit the power-save mode in response to a user triggered event, the user is presented with an option of selecting between a registrar mode and an enrollee mode of configuration via a user interface disposed on the device. For example, if the device is equipped with a user interface, e.g., a Liquid Crystal Display (LCD) panel, the user is prompted on the LCD panel with an option of selecting between a registrar mode and an enrollee mode of configuration. By moving a cursor to one of the displayed entries, the user selects the desired mode of operation. In a similar manner, the enrollee is also configured to wake-up from the power save mode to look for a registrar.
If the enrollee discovers a registrar while in state 306, it transitions to enrollee registration phase 308 to start the registration process with the registrar. If, on the other hand, the enrollee does not discover a registrar while in state 306, the enrollee issues a timeout signal TMO. The enrollee may be configured to attempt to discover the registrar a predefined number of times before issuing the time out signal. If the attempt to discover the registrar is unsuccessful after the predefined number of attempts, the enrollee may create its own ad-hoc network and start a registrar application.
If the enrollee registration is successful in state 308, the enrollee transitions to state 310 and attempts to join the ad-hoc network using the credentials the enrollee has obtained from its successful extended authentication protocol (EAP) handshake. If, on the other hand, the enrollee registration is unsuccessful while in state 308, the enrollee transitions back to Wait state 304. The enrollee may also start its own registrar application while in state 310. Following the operations in state 310, the enrollee transitions back to Idle state 302 in response to the Reset signal.
In some embodiments of the present invention, to establish a secure mode of connection between an enrollee and a registrar, the user has to enter a PIN associated with the enrollee on the registrar. Upon this entry, the enrollee and registrar proceed to establish a connection. In such embodiments, the beacons transmitted by the registrar to potential enrollees contain information conveying that the registrar communicates via a PIN mode only and that the registrar will not participate in a push-button mode of an ad-hoc network session. In yet other embodiments, the connection between the enrollee and registrar is established using a Secure Push Button Configuration (SPBC) mode in accordance with which the enrollee relays a PIN to the registrar via an optical signal, e.g. LED flashes, an audio signal, e.g., audio beeps, RF signals, etc. In other words, in such embodiments, the enrollee wirelessly transmits the PIN to the registrar, thus dispensing the need for a manual PIN entry by the user.
One challenge in establishing an ad-hoc network is the discovery of the registrar when both extended (e.g., WSC) as well as legacy (non-WSC) devices are present. In order to avoid conflicts with existing standardized communications and devices, extended devices, such as WSC devices, that extend beyond the limits of the 802.11 standard, and legacy devices that comply with the existing standards and are not necessarily aware of extended standards, need to coexist in a common communication space and interoperate at times. Both legacy and extended devices must first be discovered, as described further below.
As is well known, the beacons transmitted by a legacy node, such as node 402 in network 400, lack the information element signal. In a WSC network, the information element signal is referred to as WPS_IE. Since in an ad-hoc network, beacon generation is a shared responsibility, if the beacon intercepted by an enrollee is the one transmitted by a legacy node, the enrollee will not discover the extended registrar and will report a failure.
Referring to
In accordance with the present invention, to increase the probability that the beacons transmitted by an extended WSC registrar are the first beacons to be received by an enrollee, the beacon contention window of the extended registrar is set to a relatively very small number. In one embodiment, the beacon contention window of the registrar may be set to a value between 0 and 15 time slots. In another embodiment, the beacon contention window of the registrar may be set to a value between 0 and 10 time slots. In yet another embodiment, the beacon contention window of the registrar may be set to a value between 0 and 5 time slots. For example, if the beacon contention window is set to zero, the probability is significantly higher that the beacon received by the enrollee is an extended WSC registrar beacon and not a legacy beacon. This will also increase the probability that as the registrar exits the power-save mode and starts sending out beacons, the registrar is discovered by the enrollee.
In response to a button press, or entry of a PIN on the registrar as described above, a signal called WSC_REGISTRAR_START is generated. In response, the registrar application/driver causes signal WSC_IE to be included in the beacons and probe responses of the registrar, shown as event 0. During event 1, the registrar application, e.g. a Linux or a Windows application, designates the start of a registrar session to the driver. This designation may be made in response to a button press, a user command to initiate the registrar enrollment, or a PIN entry on the ad-hoc registrar. During event 2, (i) the driver sends an ad-hoc power-save exit command to the Firmware (FW); and (ii) the ad-hoc registrar is placed in an aggressive beaconing mode. The FW controls WLAN events of the discovery phase. When placed in the aggressive beaconing mode, the beacon contention window of the registrar is set to a relatively very small value in accordance with which beacon/probe responses are transmitted by the registrar, as described above. After successful discovery of the registrar, the enrollee will send an EAP over LAN (EAPOL) frame signal signifying the end of the discovery phase, shown as event 3. Subsequently, the registration phase starts.
As mentioned above, in some embodiments, a WSC start of registrar session causes the registrar to exit the power-save mode and enter the aggressive beaconing mode, subsequent to which the beacon contention of the registrar is made very small relative to those of legacy devices. In yet other embodiments, the FW periodically places the registrar in the aggressive beaconing mode. The enrollee client may also be configured to set its scanning time equal to the periodicity of the registrar beaconing. This periodicity is configurable and represents a trade off between the registrar power savings and the enrollee client scan time.
If a decision is made not to configure the device as a registrar (804), the device becomes an enrollee and a timer T1 is started (830). The enrollee starts to scan for a registrar (832). While the timer T1's time is smaller than a predefined time Twalk (834), the enrollee continues to look for probe responses from a registrar (836). If the enrollee detects a probe response from a registrar (836), the enrollee checks to see whether other registrars are present (838). If the enrollee detects no registrar or more than one registrar, the process moves back to step 830. If the enrollee discovers no registrar or more than one registrar, the enrollee may make N more attempts, where N is a predefined integer, to discover the absence or presence of one or more registrars. If following the expiration of N attempts, the enrollee discovers no registrar or discovers more than one registrar, the enrollee may proceed with creating its own ad-hoc network and starting a registrar application. Only if the enrollee discovers a single registrar, does the enrollee proceed to register with the discovered registrar. If the enrollee detects a single registrar, it initiates an EAP exchange (840), and attempts to perform a PBC handshake (842). Thereafter, following a successful handshake and ad-hoc network formation (844), the enrollee may attempt to use the network credentials obtained from the registrar to join the network after registration. After an enrollee joins an ad-hoc network, if the enrollee is capable of serving as a registrar, the enrollee may attempt to establish its own network in conformity with which the enrollee periodically lowers its beacon contention window and attempts to add more enrollees. If the enrollee does not detect a probe response from a registrar within period Twalk, the enrollee starts its own registrar application to become a registrar (806).
As described above, in an ad-hoc network, battery consumption is generally a major design factor. Accordingly, each registrar is periodically placed in the power-save mode to save battery consumption.
Each of the blocks described above can be implemented using circuitry. As used herein, the term “circuitry” refers to a pure hardware implementation and/or a combined hardware/software (or firmware) implementation. Accordingly, “circuitry” can take the form of one or more of an application specific integrated circuit (ASIC), a programmable logic controller, a programmable logic array, an embedded microcontroller, and a single-board computer, as well as a processor or a microprocessor and a computer-readable medium that stores computer-readable program code (e.g., software or firmware) executable by the processor or the microprocessor. Also, the “circuitry” can be one or more than one component, as the functionality of the “circuitry” can be distributed among several components in the system.
The above embodiments of the present invention are illustrative and not limiting. Various alternatives and equivalents are possible. Other additions, subtractions or modifications are obvious in view of the present disclosure and are intended to fall within the scope of the appended claims.
Claims
1. A method of forming an ad-hoc wireless local area network, the method comprising:
- receiving a first user input on a device initiated by a user;
- in response to receiving the first user input, entering a configuration mode on the device for configuring the device as one of an enrollee and a registrar in the ad-hoc wireless local area network;
- receiving a second user input on the device initiated by the user for configuring the device as one of the enrollee and the registrar in the ad-hoc wireless local area network;
- configuring the device as one of the enrollee and the registrar in response to the device receiving the second user input; and
- enabling communications between the device and a second device in the ad-hoc wireless network,
- wherein configuring the device as one of the enrollee and the registrar comprises: configuring the device as one of the enrollee and the registrar if the second user input is received by the device within a first predefined time of the first user input; and configuring the device as the other of the enrollee and the registrar if the second user input is not received by the device within the first predefined time of the first user input.
2. The method of claim 1 wherein enabling communication between the device and the second device comprises:
- setting a beacon contention window of the device to a value between 0 and 15 time slots if the device is configured as the registrar; and
- transmitting beacons in accordance with the set beacon contention window.
3. The method of claim 2 further comprising:
- starting a timer;
- initiating an attempt to perform a registrar-enrollee handshake if a probe request transmitted by the second device is received by the registrar before the timer's elapsed time reaches a predefined time, where the second device is configured as the enrollee; and
- establishing the ad-hoc network between the registrar and the enrollee if the attempt is successful.
4. The method of claim 3 further comprising:
- adding N more enrollees to the established ad-hoc network wherein N is a predefined integer greater than 1.
5. The method of claim 3 further comprising:
- placing the registrar in an idle mode if the registrar fails to receive an enrollee probe request before the timer's elapsed time reaches the second predefined time.
6. The method of claim 5 further comprising:
- causing the registrar to exit the idle mode periodically in accordance with a first clock period.
7. The method of claim 6 further comprising:
- setting a scanning period of equal to the first clock period.
8. The method of claim 5 further comprising:
- causing the registrar to exit the idle mode in response to the second user input.
9. The method of claim 2 further comprising:
- reducing the beacon contention window while the registrar receives beacons from other registrars forming an ad-hoc network with the registrar.
10. The method of claim 2 further comprising:
- receiving a PIN on the registrar, the PIN being associated with the enrollee seeking to communicate with the registrar.
11. The method of claim 10 wherein the PIN is received via an optical signal.
12. The method of claim 10 wherein the PIN is received via an audio signal.
13. The method of claim 10 wherein the PIN is entered manually by the user.
14. The method of claim 1 further comprising:
- starting a timer if the device is configured as the enrollee;
- scanning for beacons transmitted by the second device, where the second device is configured as the registrar; and
- initiating an extended authentication protocol exchange if the enrollee receives a beacon from the registrar before the timer's elapsed time reaches a second predefined time.
15. The method of claim 14 further comprising:
- initiating an attempt to perform a registrar-enrollee handshake after the completion of the exchange of the extended authentication protocol; and
- establishing the ad-hoc network if the attempt is successful.
16. The method of claim 15 further comprising:
- resetting the timer if the attempt is unsuccessful.
17. The method of claim 15 further comprising:
- starting a registrar application on the enrollee after the ad-hoc network is established.
18. The method of claim 1 further comprising:
- setting a beacon contention window of the device to a value between 0 and 10 time slots if the device is configured as the registrar; and
- transmitting beacons in accordance with the set beacon contention window.
19. The method of claim 1 further comprising:
- setting a beacon contention window of the device to a value between 0 and 5 time slots if the device is configured as the registrar; and
- transmitting beacons in accordance with the set beacon contention window.
20. The method of claim 1 wherein the first user input corresponds to a pressing of a button.
21. The method of claim 1 wherein the first user input corresponds to an issuing of a voice command.
22. The method of forming an ad-hoc wireless network of claim 1, further comprising:
- configuring the second device as the other of the enrollee and the registrar based on the second user input.
23. A method of selecting a configuration of a device attempting to participate in an ad-hoc wireless local area network session, the method comprising:
- receiving a first user input on the device;
- in response to receiving the first user input on the device, presenting an option to a user to configure the device as one of a registrar and an enrollee in the ad-hoc wireless local area network session;
- receiving a second user input on the device for configuring the device as one of the registrar and the enrollee in the ad-hoc wireless local area network; and
- configuring the device as one of the registrar and the enrollee in response to the device receiving the second user input;
- wherein configuring the device as one of the enrollee and the registrar comprises: configuring the device as one of the enrollee and the registrar if the second user input is received by the device within a first predefined time of the first user input; and configuring the device as the other of the enrollee and the registrar if the second user input is not received by the device within the first predefined time of the first user input.
24. The method of selecting a configuration of a device attempting to participate in an ad-hoc network session of claim 23, wherein configuring the device as one of the registrar and the enrollee based on the second user input comprises:
- configuring the device as one of the registrar and the enrollee if a first option is selected; and
- configuring the device as the other of the registrar and the enrollee if a second option is selected.
25. A device configured to participate in an ad-hoc wireless local area network, the device comprising:
- an interface configured to receive a first user input initiated by a user on the device and a second user input initiated by the user on the device, the second user input for configuring the device as one of an enrollee and a registrar in the wireless ad-hoc network; and
- a controller configured to: enter a configuration mode on the device for configuring the device as one of an enrollee and a registrar in response to the first user input, detect the second user input; and configure the device as one of the enrollee and the registrar in response to detecting the second user input; and a timer;
- wherein the controller is operative to configure the device as one of the enrollee and the registrar if the controller detects the second user input before a time set on the timer reaches a known time, the controller further operative to configure the device as the other of the enrollee and the registrar if the controller does not detect the second user input before the time set on the first timer time reaches the known time.
26. The device of claim 25 wherein the controller is further operative to set a beacon contention window of the device to a value between 0 and 15 time slots if the device is configured as the registrar, the device to transmit beacons in accordance with the set beacon contention window.
27. The device of claim 26, wherein the timer comprises a first timer, the device further comprising:
- a second timer, the controller being further operative to perform a registrar-enrollee handshake if a probe request transmitted by the enrollee is received before the second timer's elapsed time reaches a predefined time, the device being operative to establish an ad-hoc network if the handshake is successful.
28. The device of claim 27 wherein the controller is operative to reset the second timer if the handshake is unsuccessful.
29. The device of claim 27 wherein the controller is further operative to place the registrar in an idle mode if the registrar fails to receive an enrollee probe request before the second timer's time reaches the predefined time.
30. The device of claim 29 wherein the controller is further operative to cause the registrar to exit the idle mode periodically in accordance with a first clock period.
31. The device of claim 29 wherein the controller is further operative to cause the registrar to exit the idle mode in response to the second user input.
32. The device of claim 26 wherein the controller is further operative to reduce the beacon contention window while the registrar receives beacons from other registrars forming the ad-hoc network with the registrar.
33. The device of claim 26 wherein the registrar is further configured to receive a PIN associated with the enrollee.
34. The device of claim 33 where the interface module comprises a user interface configured to receive the PIN via a manual entry by the user.
35. The device of claim 25 wherein the device is configured as the enrollee; wherein the timer comprises a first timer, the enrollee further comprising:
- a second timer; and
- a scanner configured to scan for beacons transmitted by one or more registrars;
- wherein the controller is further operative to initiate an extended authentication protocol exchange if the enrollee receives a beacon from the one or more registrars before the second timer's elapsed time reaches a predefined time.
36. The device of claim 35 wherein the controller is further operative to attempt to perform a registrar-enrollee handshake after the completion of the exchange of the extended authentication protocol; the controller being further operative to establish an ad-hoc network if the attempt is successful.
37. The device of claim 36 wherein the controller is operative to reset the timer if the attempt is unsuccessful.
38. The device of claim 36 wherein the controller is further operative to place the enrollee in an idle mode.
39. The device of claim 36 wherein the controller is further operative to start a registrar application on the enrollee after the ad-hoc network is established.
40. The device of claim 25 wherein the controller is further configured to set a beacon contention window of the device to a value between 0 and 10 time slots if the device is configured as the registrar, the device being configured to transmit beacons in accordance with the set beacon contention window.
41. The device of claim 25 wherein the controller is further configured to set a beacon contention window of the device to a value between 0 and 5 time slots if the device is configured as the registrar, the device to transmit beacons in accordance with the set beacon contention window.
42. The device of claim 25 further comprising a button in communication with the interface and configured to receive the first user input.
43. The device of claim 25 further comprising an audio interface in communication with the interface and configured to receive a voice command representing the first user input.
44. A method of forming a wireless ad-hoc network between a first device and a second device, the method comprising:
- turning on the first device;
- turning on the second device;
- starting a first timer on the first device;
- starting a second timer on the second device;
- pressing a button on the first device before the first timer's elapsed time reaches a predefined time in order to configure the first device as an enrollee;
- avoiding a button press on the second device before the second timer's elapsed time reaches the predefined time in order to configure the second device as a registrar;
- reducing a beacon contention window of the second device;
- transmitting beacons from the second device in accordance with the reduced beacon contention window;
- intercepting the transmitted beacons via the first device thereby enabling the first device to discover the second device;
- performing a handshake operation between the first and second devices; and
- forming the ad-hoc network.
4959847 | September 25, 1990 | Engelke et al. |
5488693 | January 30, 1996 | Houck et al. |
5738583 | April 14, 1998 | Comas et al. |
5850592 | December 15, 1998 | Ramanathan |
5877701 | March 2, 1999 | Nagakura |
6453181 | September 17, 2002 | Challa et al. |
6524189 | February 25, 2003 | Rautila |
6975613 | December 13, 2005 | Johansson |
6980522 | December 27, 2005 | Boyle |
7095732 | August 22, 2006 | Watson, Jr. |
7110366 | September 19, 2006 | Hulyalkar et al. |
7120456 | October 10, 2006 | Elliot et al. |
7158798 | January 2, 2007 | Lee et al. |
7257721 | August 14, 2007 | Chung et al. |
7347781 | March 25, 2008 | Schultz |
7496065 | February 24, 2009 | Anjum et al. |
7505795 | March 17, 2009 | Lim et al. |
7515897 | April 7, 2009 | Suzuki |
7729661 | June 1, 2010 | Tanaka et al. |
7733861 | June 8, 2010 | Suga |
7899017 | March 1, 2011 | Yu et al. |
7978647 | July 12, 2011 | Anjum et al. |
8073923 | December 6, 2011 | Sasaki et al. |
20010055950 | December 27, 2001 | Davies et al. |
20020013784 | January 31, 2002 | Swanson |
20020061743 | May 23, 2002 | Hutcheson et al. |
20020091790 | July 11, 2002 | Cubley |
20020103019 | August 1, 2002 | Emmerson |
20020107985 | August 8, 2002 | Hwang et al. |
20020147044 | October 10, 2002 | Jakobsson et al. |
20020159401 | October 31, 2002 | Boger |
20020176366 | November 28, 2002 | Ayyagari et al. |
20020191573 | December 19, 2002 | Whitehill et al. |
20030023761 | January 30, 2003 | Jeansonne et al. |
20030041150 | February 27, 2003 | Passman et al. |
20030078062 | April 24, 2003 | Burr |
20030084337 | May 1, 2003 | Simionescu et al. |
20030099212 | May 29, 2003 | Anjum et al. |
20030163579 | August 28, 2003 | Knauerhase et al. |
20040081110 | April 29, 2004 | Koskimies |
20040127289 | July 1, 2004 | Davis et al. |
20040139159 | July 15, 2004 | Ricciardi et al. |
20040146022 | July 29, 2004 | Lewis et al. |
20040259542 | December 23, 2004 | Viitamaki et al. |
20050122940 | June 9, 2005 | Nian |
20050129055 | June 16, 2005 | Hall et al. |
20050138462 | June 23, 2005 | Hunt et al. |
20050268151 | December 1, 2005 | Hunt et al. |
20050286464 | December 29, 2005 | Saadawi et al. |
20050286480 | December 29, 2005 | Akiyama |
20060013160 | January 19, 2006 | Haartsen |
20060135261 | June 22, 2006 | Kinne et al. |
20060154710 | July 13, 2006 | Serafat |
20060179322 | August 10, 2006 | Bennett et al. |
20060221858 | October 5, 2006 | Switzer et al. |
20060221915 | October 5, 2006 | Gatta et al. |
20060246947 | November 2, 2006 | Fujii et al. |
20060251004 | November 9, 2006 | Zhong et al. |
20060282541 | December 14, 2006 | Hiroki |
20070030116 | February 8, 2007 | Feher |
20070030824 | February 8, 2007 | Ribaudo et al. |
20070105548 | May 10, 2007 | Mohan et al. |
20070141988 | June 21, 2007 | Kuehnel et al. |
20070155505 | July 5, 2007 | Huomo |
20070291761 | December 20, 2007 | Kauniskangas et al. |
20080013487 | January 17, 2008 | Molteni et al. |
20080037444 | February 14, 2008 | Chhabra |
20080037495 | February 14, 2008 | Anjum et al. |
20080108437 | May 8, 2008 | Kaarela et al. |
20080146337 | June 19, 2008 | Halonen et al. |
20080146343 | June 19, 2008 | Sullivan et al. |
20080164984 | July 10, 2008 | Sheffer |
20080167865 | July 10, 2008 | Yamanashi et al. |
20080172491 | July 17, 2008 | Chhabra et al. |
20080220878 | September 11, 2008 | Michaelis |
20090011834 | January 8, 2009 | Chhabra |
20090180441 | July 16, 2009 | Ikeda |
20090210531 | August 20, 2009 | Melnikov |
20090279506 | November 12, 2009 | Sinnreich et al. |
20100278077 | November 4, 2010 | Reunam ki et al. |
1375772 | October 2002 | CN |
1522503 | August 2004 | CN |
1842000 | October 2006 | CN |
1 622 319 | February 2006 | EP |
2004-136009 | October 2002 | JP |
2004-141225 | October 2002 | JP |
2003-289277 | October 2003 | JP |
2004-135778 | May 2004 | JP |
2006-086959 | September 2004 | JP |
2006-050020 | February 2006 | JP |
2006-148448 | June 2006 | JP |
2006-148488 | June 2006 | JP |
WO 03/003610 | January 2003 | WO |
WO 2005/076543 | August 2005 | WO |
- International Search Report for PCT Application No. PCT/US07/17529, mailed Oct. 1, 2008.
- Written Opinion of the International Searching Authority for PCT Application No. PCT/US07/17529, mailed Oct. 1, 2008.
- Chinese Office Action dated Jul. 8, 2010 for Application No. 200780037626.8.
- U.S. Appl. No. 11/867,665, filed Oct. 4, 2007, Kopikare.
- U.S. Appl. No. 11/924,431, filed Oct. 25, 2007, Kopikare.
- U.S. Appl. No. 60/862,898, filed Oct. 25, 2006, Kopikare.
- Lortz et al., “Wi-Fi Simple Config Specification”, Wi-Fi Alliance Confidential, Version 1.0a, Feb. 10, 2006, pp. 1-107.
- Chinese Office Action issued in Chinese Application No. 200780038678.7, dated Sep. 13, 2010.
- Notification Concerning Transmittal of International Preliminary Report on Patentability for corresponding PCT Application No. PCT/US2007/080733 mailed Apr. 30, 2009.
- International Search Report for corresponding PCT Application No. PCT/US2007/080733 mailed Sep. 9, 2008.
- Written Opinion for corresponding PCT Application No. PCT/US2007/08733 mailed Sep. 9, 2008.
- Office Action issued in U.S. Appl. No. 11/800,166, mailed Jun. 25, 2009.
- Office Action issued in U.S. Appl. No. 11/800,166, mailed Feb. 24, 2010.
- Office Action issued in U.S. Appl. No. 11/800,166, mailed Aug. 19, 2010.
- Office Action issued in U.S. Appl. No. 11/800,166, mailed Mar. 29, 2011.
- Office Action issued in U.S. Appl. No. 11/867,665, mailed Nov. 23,2010.
- IEEE, “Further Higher-Speed Physical Layer Extension in the 2.4 GHz Band”, IEEE, Draft Std 802.11 q-2002, New York, NY, May 2002, Downloaded from the Internet (47 pages).
- IEEE, “Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications, Amendment 2: Higher-speed Physical Layer (PHY) extension in the 2.4 GHz band”, IEEE Std 802.11 b-1999/Cor Jan. 2001, New York, NY, Nov. 7, 2001, Downloaded from the Internet (23 pages).
- IEEE, “Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications, Amendment 5: Spectrum and Transmit Power Management Extensions in the 5 GHz band in Europe”, IEEE Std 802.11 h-2003, New York, NY, Oct. 14, 2003, Downloaded from the Internet (75 pages).
- IEEE, “Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications, Amendment 6: Medium Access Control (MAC) Security Enhancements”, IEEE Std 802.11 i-2004, New York, NY, Jul. 23, 2004, Downloaded from the Internet (190 pages).
- IEEE, “Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications, Amendment 7: Medium Access Control (MAC) Quality of Service (QoS) Enhancements”, IEEE P802.11 e/D11.0, New York, NY, Oct. 2004, Downloaded from the Internet (195 pages).
- IEEE, “Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Further Higher Data Rate Extension in the 2.4 GHz Band”, IEEE P802.11 g/D8.2, New York, NY, Apr. 2003, Downloaded from the Internet (69 pages).
- IEEE, “Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: High-speed Physical Layer in the 5 Ghz Band”, IEEE Std 802.11 a-1999, New York, NY, Dec. 30, 1999, Downloaded from the Internet (91 pages).
- IEEE, “Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Higher-Speed Physical Layer Extension in the 2.4 GHz Band”, IEEE Std 802.11 b-1999, New York, NY, Jan. 20, 2000, Downloaded from the Internet (96 pages).
- IEEE, “TGn Sync Proposal Technical Specification-Abstract,” IEEE 802.11-04/0889r6, Mujtaba, Syed Aon, Agere Systems, Allentown, PA, May 18, 2005, Downloaded from the Internet (131 pages).
- Office Action issued in U.S. Appl. No. 11/924,431, mailed Apr. 12, 2011.
- IEEE P802. 11g/D8.2, Draft Supplement to Standard [for] Information Technology, Telecommunication and information exchange between systems, Local and metropolitan area networks-Specific requirements, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Further Higher Data Rate Extension in the 2.4 Ghz Band, 69 pgs, Apr. 2003.
- Doc.: IEEE 802.11-04/0889r6, IEEE P802.11 Wireless LANs, TGn Sync Proposal Technical Specifications, Sved Aon Muiitaba, Aaere Systems, 131 pgs., May 2005.
- IEEE Std. 802.11 a-1999, Supplemental to IEEE Standard for Information technology, Telecommunications and information exchange between systems, Local and metropolitan area networks, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: High-speed Physical Layer in the 5 Ghz Band, 91 pp.., Sep. 16, 1999.
- Office Action issued in U.S. Appl. No. 11/867,661, mailed Sep. 15, 2009.
- Office Action issued in U.S. Appl. No. 11/867,661, mailed Mar. 26, 2010.
- Office Action issued in U.S. Appl. No. 11/867,661, mailed Jun. 11, 2010.
- Office Action issued in U.S. Appl. No. 11/867,661 mailed Nov. 1, 2010.
- Notice of Allowance issued in U.S. Appl. No. 11/867,665, mailed Feb. 28, 2011.
- IEEE Std. 802.11b-1999, Supplement to IEEE Standard for information technology, Telecommunication and information exchange between systems, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Higher-Speed Physical Layer Extension in the 2.4 GHz Band, 96 pgs., Sep. 16, 1999.
- Chinese Office Action issued in Chinese Application No. 200780038678.7, dated Oct. 18, 2011.
- Hirano Aya, “Introductory Techniques for Current Wireless LAN,” Nikkei network vol. 67, Japan Nikkei BP, Nikkei Business Publications, Inc., 2005, (see also English translation of Summary of Japanese Office Action dated Nov. 29, 2011).
- Japanese Office Action dated Nov. 29, 2011 for Japanese Patent Application No. 2009523819, including English translation of Summary of Japanese Office Action.
- Japanese Office Action dated Feb. 7, 2012 for Japanese Patent Application No. 2009-532521, including English translation of Summary of Japanese Office Action.
- Japanese Office Action mailed Sep. 18, 2012 for Japanese Patent Application No. 2009-532521, including English translation of Summary of Japanese Office Action.
Type: Grant
Filed: May 4, 2007
Date of Patent: Dec 25, 2012
Patent Publication Number: 20080037444
Assignee: Marvell World Trade Ltd.
Inventor: Kapil Chhabra (Sunnyvale, CA)
Primary Examiner: Faruk Hamza
Assistant Examiner: Jay P Patel
Application Number: 11/800,166
International Classification: H04J 1/16 (20060101);