METHOD AND DEVICE FOR CONFIGURING LINK IN WIRELESS LAN SYSTEM
A method and device for configuring a link in a wireless LAN system are disclosed. The wireless link configuration method comprises the steps of: acquiring a first probe request message transmitted by a first mobile terminal; transmitting a second probe request message within a maximum channel time from a time point at which the transmission of the first probe request message ends; and receiving one probe response message, which is a response to the first probe request message and the second probe request message, from a wireless access device. Therefore, a time for configuring a link between wireless LAN devices can be reduced.
Latest INTELLECTUAL DISCOVERY CO., LTD. Patents:
- Image encoding/decoding method and device, and recording medium having bitstream stored thereon
- Image encoding/decoding method and device, and recording medium storing bitstream
- Method and apparatus for encoding/decoding video signal
- Image decoding method/device, image encoding method/device, and recording medium in which bitstream is stored
- Image encoding method/device, image decoding method/device, and recording medium in which bitstream is stored
A variety of example embodiments according to the present invention generally relate to configuration of a wireless link, and more specifically to methods and devices for rapidly configuring an initial link in a wireless local area networking (WLAN) system.
BACKGROUND ARTCurrently, according to wide distribution of mobile stations, a wireless local area networking (WLAN) technology which can provide faster wireless internet services to the mobile stations is becoming remarkable. The WLAN technology is a technology which can make mobile stations such as smart phones, smart pads, laptop computers, portable multimedia players, embedded devices, etc. able to wirelessly access an internet in home, company, or specific service provision areas, based on wireless communication technologies.
DISCLOSURE Technical ProblemThe present invention is to provide methods for configuring links between WLAN devices in a congested environment having a large number of wireless devices.
Also, the present invention is to provide apparatuses for configuring links between WLAN devices in a congested environment having a large number of wireless devices.
Technical SolutionIn order to achieve the purposes of the present invention, according to an example embodiment according to the present invention, a method may be provided for configuring a wireless link, and performed in a second mobile station. The method may comprise obtaining a first probe request message transmitted from a first mobile station; transmitting a second probe request message within a maximum channel time from a time point of completion of the first probe request message; and receiving a single probe response message from a wireless access station in response to the first probe request message and the second probe request message.
Here, the method may further comprise requesting authentication to the wireless access station by using wireless access information obtained from the probe response message.
In order to achieve the purposes of the present invention, according to another example embodiment according to the present invention, a method may be provided for configuring a wireless link, and performed in a wireless access station. The method may comprise receiving a first probe request message from a first mobile station; receiving a second probe request message from a second mobile station within a maximum channel time from a time point of completion of the first probe request message; analyzing similarity between the first probe request message and the second probe request message; and transmitting at least one probe response message corresponding to the first probe request message and the second probe request message when a degree of the similarity satisfies a predetermined threshold.
Here, the method may further comprise receiving authentication requests from the first mobile station and the second mobile station.
Here, the probe response message may be transmitted when service set identifiers (SSID) of the first probe request message and the second probe request message coincide with each other.
In order to achieve another purpose of the present invention, according to an example embodiment according to the present invention, a second mobile station may be provided as comprising a control part controlling operations of the second mobile station, and at least one network interface card for transmitting and receiving data based on commands of the control part. Also, the control part may obtain a first probe request message transmitted from a first mobile station, transmit a second probe request message within a maximum channel time from a time point of completion of the first probe request message, and receive a single probe response message from a wireless access station in response to the first probe request message and the second probe request message.
Here, the control part may request authentication to the wireless access station by using wireless access information obtained from the probe response message.
In order to achieve another purpose of the present invention, according to another example embodiment according to the present invention, a wireless access station may be provided as comprising a control part controlling operations of the wireless access station, and at least one network interface card for transmitting and receiving data based on commands of the control part. Also, the control part may receive a first probe request message from a first mobile station, receive a second probe request message from a second mobile station within a maximum channel time from a time point of completion of the first probe request message, analyze similarity between the first probe request message and the second probe request message, and transmit at least one probe response message corresponding to the first probe request message and the second probe request message when a degree of the similarity satisfies a predetermined threshold.
Here, the control part may receive authentication requests from the first mobile station and the second mobile station.
Here, the probe response message may be transmitted when service set identifiers (SSID) of the first request message and the second probe request message coincide with each other.
Advantageous EffectsAccording to example embodiments of the present invention, a time needed for configuring wireless links between WLAN devices can be reduced when a large number of WLAN devices request wireless link configurations in a congested area. Especially, according to example embodiments of the present invention, when multiple mobile stations transmit a plurality of probe request messages at the same time, the time needed for configuring wireless links can be reduced by minimizing collisions between probe response messages corresponding to the probe request messages.
Since embodiments described in the present specification are intended to clearly describe the spirit of the present invention to those skilled in the art to which the present invention pertains, the present invention is not limited to those embodiments described in the present specification, and it should be understood that the scope of the present invention includes changes or modifications without departing from the spirit of the invention.
The terms and attached drawings used in the present specification are intended to easily describe the present invention and shapes shown in the drawings are exaggerated to help the understanding of the present invention if necessary, and thus the present invention is not limited by the terms used in the present specification and the attached drawings.
In the present specification, detailed descriptions of known configurations or functions related to the present invention which have been deemed to make the gist of the present invention unnecessarily obscure will be omitted below.
Hereinafter, a method and a device for fast accesses between WLAN devices using a plurality of communication channels according to embodiments of the present invention will be described.
Among standards of WLAN technologies, standardization on Medium Access Control (MAC) and Physical (PHY) layers are going on in an Institute of Electrical and Electronics Engineers (IEEE) 802.11 working group.
Referring to
The BSS 211 or 221 may be classified into an infrastructure BSS and an independent BSS, and the infrastructure BSS is illustrated in
Referring to
The MS 100 which successfully receives the wireless access information in the scanning step may perform the authentication step by transmitting an authentication request (S107a) and receiving an authentication response (S107b). After successful completion of the authentication step in the IEEE 802.11 layer, the association step (S109a and S109b) may be performed. In addition, authentication based on 802.1X (S111) and a step of obtaining IP address through DHCP (S113) may be performed.
Referring to
Referring to
Referring to
A mobile communication module 120 may make the MS 100 transmit and receive wireless signals to/from an external device in a mobile communication network.
A user interface part 130 may make commands for controlling the MS 100 be input by a user.
A display part 140 may display results from operations of the MS 100, status of the MS 100, and information provided by the AP.
A memory part 150 may store access program codes for controlling access to the AP, and various data for the program codes.
A control part 160 may perform a role of controlling each of the NICs 111 to 119 to make the MS 100 try to access the AP through an appropriate frequency band by using access information provided by the AP and user/system requirements.
Referring to
A memory part 250 may store access program codes for controlling access from mobile stations, and various data for the program codes.
A control part 260 may perform a role of controlling each of the NICs 211 to 219 to make the AP 200 process access from MS through an appropriate frequency band by using access information for multiple frequency bands and user/system requirements.
Referring to
Meanwhile, a wireless access station 200 may receive both the first probe request message transmitted by the first mobile station 100 and the second probe request message transmitted by the second mobile station 1000. The wireless access station 200 may analyze similarity between the first probe request message and the second probe request message (S204). For example, the wireless access station 200 may analyze the similarity based on a first service set identifier (SSID) included in the first probe request message and a second SSID included in the second probe request message. That is, the wireless access station 200 may determine as the first probe request message is similar to the second probe request message when the first SSID is identical to the second SSID.
In addition, the wireless access station 200 may analyze the similarity between the probe request messages by using items other than SSIS. For example, when access requirements (e.g., frequency band information, transmission speed, load information, etc.) are included in the probe request message, the wireless access station 200 may analyze the similarity between first access requirements included in the first probe request message and second access requirements included in the second probe request message. As a result, if the access requirements coincide with each other, it may be determined that the first probe request message is similar to the second probe request message. Here, although access requirements are proposed as an example of items which can be used for determining similarity, a method for configuring wireless links according to the present invention is not limited to the example.
In case that the first probe request message is similar to the second probe request message, the wireless access point 200 may transmit at least one probe response message (or, a beacon message) as a response to the first probe request message and the second probe request message (S105, S105a). In this case, the wireless access station 200 may broadcast the probe response message, or transmit the probe response message to the first mobile station 100 and the second mobile station 1000 by specifying them as destinations.
In case of receiving the probe response message, the first mobile station 100 may transmit a first authentication request message to the wireless access station 200 (S107). Then, the first mobile station 100 may perform an authentication step and an association step with the wireless access station 200 so as to access the wireless access station 200.
Also, in case of receiving the probe response message, the second mobile station 1000 may also transmit a second authentication request message to the wireless access station 200 (S1007). Then, the second mobile station 1000 may perform an authentication step and an association step with the wireless access station 200 so as to access the wireless access station 200.
Claims
1. A method of configuring a wireless link, performed in a second mobile station, the method comprising:
- obtaining a first probe request message transmitted from a first mobile station;
- transmitting a second probe request message within a maximum channel time from a time point of completion of the first probe request message; and
- receiving a single probe response message from a wireless access station in response to the first probe request message and the second probe request message.
2. The method of claim 1, further comprising requesting authentication to the wireless access station by using wireless access information obtained from the probe response message.
3. A method of configuring a wireless link, performed in a wireless access station, the method comprising:
- receiving a first probe request message from a first mobile station;
- receiving a second probe request message from a second mobile station within a maximum channel time from a time point of completion of the first probe request message;
- analyzing similarity between the first probe request message and the second probe request message; and
- when a degree of the similarity satisfies a predetermined threshold, transmitting at least one probe response message corresponding to the first probe request message and the second probe request message.
4. The method of claim 3, further comprising receiving authentication requests from the first mobile station and the second mobile station.
5. The method of claim 3, wherein the probe response message is transmitted when service set identifiers (SSID) of the first probe request message and the second probe request message coincide with each other.
6. A second mobile station comprising:
- a control part controlling operations of the second mobile station; and
- at least one network interface card for transmitting and receiving data based on commands of the control part,
- wherein the control part obtains a first probe request message transmitted from a first mobile station, transmits a second probe request message within a maximum channel time from a time point of completion of the first probe request message, and receives a single probe response message from a wireless access station in response to the first probe request message and the second probe request message.
7. The station of claim 1, wherein the control part requests authentication to the wireless access station by using wireless access information obtained from the probe response message.
8. A wireless access station comprising:
- a control part controlling operations of the wireless access station; and
- at least one network interface card for transmitting and receiving data based on commands of the control part,
- wherein the control part receives a first probe request message from a first mobile station, receives a second probe request message from a second mobile station within a maximum channel time from a time point of completion of the first probe request message, analyzes similarity between the first probe request message and the second probe request message, and transmits at least one probe response message corresponding to the first probe request message and the second probe request message when a degree of the similarity satisfies a predetermined threshold.
9. The station of claim 8, wherein the control part receives authentication requests from the first mobile station and the second mobile station.
10. The station of claim 8, wherein the probe response message is transmitted when service set identifiers (SSID) of the first request message and the second probe request message coincide with each other.
Type: Application
Filed: Mar 13, 2014
Publication Date: Feb 4, 2016
Applicant: INTELLECTUAL DISCOVERY CO., LTD. (Seoul)
Inventors: Ju Hyung SON (Uiwang-si), Jin Sam KWAK (Uiwang-si)
Application Number: 14/776,228