METHOD AND DEVICE FOR CONFIGURING LINK IN WIRELESS LAN SYSTEM

A method and device for configuring a link in a wireless LAN system are disclosed. The wireless link configuration method comprises the steps of: acquiring a first probe request message transmitted by a first mobile terminal; transmitting a second probe request message within a maximum channel time from a time point at which the transmission of the first probe request message ends; and receiving one probe response message, which is a response to the first probe request message and the second probe request message, from a wireless access device. Therefore, a time for configuring a link between wireless LAN devices can be reduced.

Skip to: Description  ·  Claims  · Patent History  ·  Patent History
Description
TECHNICAL FIELD

A variety of example embodiments according to the present invention generally relate to configuration of a wireless link, and more specifically to methods and devices for rapidly configuring an initial link in a wireless local area networking (WLAN) system.

BACKGROUND ART

Currently, according to wide distribution of mobile stations, a wireless local area networking (WLAN) technology which can provide faster wireless internet services to the mobile stations is becoming remarkable. The WLAN technology is a technology which can make mobile stations such as smart phones, smart pads, laptop computers, portable multimedia players, embedded devices, etc. able to wirelessly access an internet in home, company, or specific service provision areas, based on wireless communication technologies.

DISCLOSURE Technical Problem

The present invention is to provide methods for configuring links between WLAN devices in a congested environment having a large number of wireless devices.

Also, the present invention is to provide apparatuses for configuring links between WLAN devices in a congested environment having a large number of wireless devices.

Technical Solution

In order to achieve the purposes of the present invention, according to an example embodiment according to the present invention, a method may be provided for configuring a wireless link, and performed in a second mobile station. The method may comprise obtaining a first probe request message transmitted from a first mobile station; transmitting a second probe request message within a maximum channel time from a time point of completion of the first probe request message; and receiving a single probe response message from a wireless access station in response to the first probe request message and the second probe request message.

Here, the method may further comprise requesting authentication to the wireless access station by using wireless access information obtained from the probe response message.

In order to achieve the purposes of the present invention, according to another example embodiment according to the present invention, a method may be provided for configuring a wireless link, and performed in a wireless access station. The method may comprise receiving a first probe request message from a first mobile station; receiving a second probe request message from a second mobile station within a maximum channel time from a time point of completion of the first probe request message; analyzing similarity between the first probe request message and the second probe request message; and transmitting at least one probe response message corresponding to the first probe request message and the second probe request message when a degree of the similarity satisfies a predetermined threshold.

Here, the method may further comprise receiving authentication requests from the first mobile station and the second mobile station.

Here, the probe response message may be transmitted when service set identifiers (SSID) of the first probe request message and the second probe request message coincide with each other.

In order to achieve another purpose of the present invention, according to an example embodiment according to the present invention, a second mobile station may be provided as comprising a control part controlling operations of the second mobile station, and at least one network interface card for transmitting and receiving data based on commands of the control part. Also, the control part may obtain a first probe request message transmitted from a first mobile station, transmit a second probe request message within a maximum channel time from a time point of completion of the first probe request message, and receive a single probe response message from a wireless access station in response to the first probe request message and the second probe request message.

Here, the control part may request authentication to the wireless access station by using wireless access information obtained from the probe response message.

In order to achieve another purpose of the present invention, according to another example embodiment according to the present invention, a wireless access station may be provided as comprising a control part controlling operations of the wireless access station, and at least one network interface card for transmitting and receiving data based on commands of the control part. Also, the control part may receive a first probe request message from a first mobile station, receive a second probe request message from a second mobile station within a maximum channel time from a time point of completion of the first probe request message, analyze similarity between the first probe request message and the second probe request message, and transmit at least one probe response message corresponding to the first probe request message and the second probe request message when a degree of the similarity satisfies a predetermined threshold.

Here, the control part may receive authentication requests from the first mobile station and the second mobile station.

Here, the probe response message may be transmitted when service set identifiers (SSID) of the first request message and the second probe request message coincide with each other.

Advantageous Effects

According to example embodiments of the present invention, a time needed for configuring wireless links between WLAN devices can be reduced when a large number of WLAN devices request wireless link configurations in a congested area. Especially, according to example embodiments of the present invention, when multiple mobile stations transmit a plurality of probe request messages at the same time, the time needed for configuring wireless links can be reduced by minimizing collisions between probe response messages corresponding to the probe request messages.

DESCRIPTION OF DRAWINGS

FIG. 1 conceptually illustrates an example configuration of a WLAN system to which embodiments of the present invention can be applied.

FIG. 2 conceptually illustrate a step in which MS configures a link with AP according to an example embodiment of the present invention.

FIG. 3 illustrates a passive scanning step of MS related to an example embodiment of the present invention.

FIG. 4 illustrates an active scanning step of MS related to an example embodiment of the present invention.

FIG. 5 is a block diagram which conceptually illustrates a mobile station (MS) 100 related to an example embodiment of the present invention.

FIG. 6 is a block diagram which conceptually illustrates an access point 200 related to an example embodiment of the present invention.

FIG. 7 is a flow chart illustrating a WLAN access procedure, as an example embodiment of the present invention, in which a plurality of mobile stations access an AP at the same time.

FIG. 8 illustrates detailed logic of a first analysis in the example embodiment illustrated in FIG. 7.

FIG. 9 illustrates a packet structure of a beacon message transmitted by AP according to the present invention.

FIG. 10 illustrates a packet structure of a probe request message transmitted by MS according to the present invention.

FIG. 11 illustrates a packet structure of a probe response message transmitted by AP according to the present invention.

MODE FOR INVENTION

Since embodiments described in the present specification are intended to clearly describe the spirit of the present invention to those skilled in the art to which the present invention pertains, the present invention is not limited to those embodiments described in the present specification, and it should be understood that the scope of the present invention includes changes or modifications without departing from the spirit of the invention.

The terms and attached drawings used in the present specification are intended to easily describe the present invention and shapes shown in the drawings are exaggerated to help the understanding of the present invention if necessary, and thus the present invention is not limited by the terms used in the present specification and the attached drawings.

In the present specification, detailed descriptions of known configurations or functions related to the present invention which have been deemed to make the gist of the present invention unnecessarily obscure will be omitted below.

Hereinafter, a method and a device for fast accesses between WLAN devices using a plurality of communication channels according to embodiments of the present invention will be described.

Among standards of WLAN technologies, standardization on Medium Access Control (MAC) and Physical (PHY) layers are going on in an Institute of Electrical and Electronics Engineers (IEEE) 802.11 working group.

FIG. 1 conceptually illustrates an example configuration of a WLAN system to which embodiments of the present invention can be applied.

Referring to FIG. 1, the WLAN system may include one or more basic service sets (BSS) 211 and 221. The BSS 211 or 221 is a set of stations which can communicate with each other, and managed by an access point (AP) 210 or 220. A mobile station (MS) 110 or 120 may perform a role of providing wireless internet services to a user by accessing the AP 210 or 220 according to IEEE 802.11 WLAN standards.

The BSS 211 or 221 may be classified into an infrastructure BSS and an independent BSS, and the infrastructure BSS is illustrated in FIG. 1. The BSS-1 211 is managed and operated by the AP-1 210, and one or more MSs including MS-1 110 and MS-2 120 may receive WLAN services through the AP-1 210. Also, the AP-1 210 is connected to the AP-2 220 through a distribution system (DS) 300. The BSSs 211 and 221 connected through the DS 300 may form an extended service set (ESS) 410. Since the detail of configurations of WLAN systems is described in the standard specifications such as IEEE 802.11-2012 (Mar 29, 202), explanation on the detail will be omitted herein. The contents of the standard specifications may be combined to the present description for reference.

FIG. 2 conceptually illustrate a step in which MS configures a link with AP according to an example embodiment of the present invention.

Referring to FIG. 2, a procedure for MS 100 to access AP 200 may comprise three steps—scanning, authentication, and association. The scanning step is a step in which the MS 100 obtains access information of a BSS operated by the AP 200. For the scanning, there are a passive scanning technique S101 that obtains information by using beacon messages which are periodically transmitted by the AP, and an active scanning technique in which the MS transmits a probe request to the AP (S103), receives a probe response from the AP (S105), and obtains access information from the probe response.

The MS 100 which successfully receives the wireless access information in the scanning step may perform the authentication step by transmitting an authentication request (S107a) and receiving an authentication response (S107b). After successful completion of the authentication step in the IEEE 802.11 layer, the association step (S109a and S109b) may be performed. In addition, authentication based on 802.1X (S111) and a step of obtaining IP address through DHCP (S113) may be performed.

FIG. 3 illustrates a passive scanning step of MS related to an example embodiment of the present invention.

Referring to FIG. 3, the MS-1 110 according to the present invention may obtain wireless access information or respective APs by receiving beacon message which are periodically transmitted by AP-1 210 and AP-2 220 located adjacently.

FIG. 4 illustrates an active scanning step of MS related to an example embodiment of the present invention.

Referring to FIG. 4, the MS-1 110 according to the present invention may transmits a probe request message to obtain information of APs located adjacently, and obtain wireless access information of respective APs by receiving the corresponding probe response messages from AP-1 210 and AP-2 220.

FIG. 5 is a block diagram which conceptually illustrates a mobile station (MS) 100 related to an example embodiment of the present invention.

Referring to FIG. 5, the MS 100 according to the present invention may comprise at least one network interface cards (NIC) 111 to 119 performing a WLAN access through an AP. The network interface cards 111 to 119, modules for performing WLAN access, may be embedded within the MS or installed in outside of the MS. The network interface cards 111 to 119 may perform wireless communications with the AP according to respective supported WLAN specifications. Also, among the network interface cards 111 to 119, only one NIC may operate at a time or a plurality of NICs may simultaneously operate according to performance of the MS 100 or system requirements. In the MS 100 of FIG. 5, the multiple NICs 111 to 119 are illustrated as separated, and MAC and PHY layers of each NIC may operate independently from each other. These NICs 111 to 119 may be implemented as a functional entity which can be separated physically or as a single integrated physical entity.

A mobile communication module 120 may make the MS 100 transmit and receive wireless signals to/from an external device in a mobile communication network.

A user interface part 130 may make commands for controlling the MS 100 be input by a user.

A display part 140 may display results from operations of the MS 100, status of the MS 100, and information provided by the AP.

A memory part 150 may store access program codes for controlling access to the AP, and various data for the program codes.

A control part 160 may perform a role of controlling each of the NICs 111 to 119 to make the MS 100 try to access the AP through an appropriate frequency band by using access information provided by the AP and user/system requirements.

FIG. 6 is a block diagram which conceptually illustrates an access point 200 related to an example embodiment of the present invention.

Referring to FIG. 6, the AP 200 according to the present invention may comprise at least one network interface cards (NIC) 211 to 219 for operating BSS in one or more frequency bands. The network interface cards 211 to 219, modules for performing WLAN access, may be embedded within the AP 200 or installed in outside of the AP 200. The NICs 211 to 219 may perform wireless communications with the MS according to respective supported WLAN specifications. Also, among the network interface cards 211 to 219, only one NIC may operate at a time or a plurality of NICs may simultaneously operate according to performance of the AP 200 or system requirements. In the AP 200 of FIG. 6, a plurality of NICs 211 to 219 are illustrated as separated, and MAC and PHY layers of each NIC may operate independently from each other. These NICs 211 to 219 may be implemented as a functional entity which can be separated physically or as a single integrated physical entity.

A memory part 250 may store access program codes for controlling access from mobile stations, and various data for the program codes.

A control part 260 may perform a role of controlling each of the NICs 211 to 219 to make the AP 200 process access from MS through an appropriate frequency band by using access information for multiple frequency bands and user/system requirements.

FIG. 7 is a flow chart illustrating a WLAN access procedure, as an example embodiment of the present invention, in which a plurality of mobile stations access an AP at the same time, and FIG. 8 illustrates detailed logic of a first analysis in the example embodiment illustrated in FIG. 7.

Referring to FIG. 7 and FIG. 8, a first mobile station 100 may transmit a first probe request message (S103). A second mobile station 1000 may obtain (i.e., overhear) the first probe request message transmitted from the first mobile station 100. In this case, the second mobile station may transmit a second probe request message of it within a maximum channel time (i.e., ‘MaxChannelTime’) from a time point of completion of the first probe request message (S1003).

Meanwhile, a wireless access station 200 may receive both the first probe request message transmitted by the first mobile station 100 and the second probe request message transmitted by the second mobile station 1000. The wireless access station 200 may analyze similarity between the first probe request message and the second probe request message (S204). For example, the wireless access station 200 may analyze the similarity based on a first service set identifier (SSID) included in the first probe request message and a second SSID included in the second probe request message. That is, the wireless access station 200 may determine as the first probe request message is similar to the second probe request message when the first SSID is identical to the second SSID.

In addition, the wireless access station 200 may analyze the similarity between the probe request messages by using items other than SSIS. For example, when access requirements (e.g., frequency band information, transmission speed, load information, etc.) are included in the probe request message, the wireless access station 200 may analyze the similarity between first access requirements included in the first probe request message and second access requirements included in the second probe request message. As a result, if the access requirements coincide with each other, it may be determined that the first probe request message is similar to the second probe request message. Here, although access requirements are proposed as an example of items which can be used for determining similarity, a method for configuring wireless links according to the present invention is not limited to the example.

In case that the first probe request message is similar to the second probe request message, the wireless access point 200 may transmit at least one probe response message (or, a beacon message) as a response to the first probe request message and the second probe request message (S105, S105a). In this case, the wireless access station 200 may broadcast the probe response message, or transmit the probe response message to the first mobile station 100 and the second mobile station 1000 by specifying them as destinations.

In case of receiving the probe response message, the first mobile station 100 may transmit a first authentication request message to the wireless access station 200 (S107). Then, the first mobile station 100 may perform an authentication step and an association step with the wireless access station 200 so as to access the wireless access station 200.

Also, in case of receiving the probe response message, the second mobile station 1000 may also transmit a second authentication request message to the wireless access station 200 (S1007). Then, the second mobile station 1000 may perform an authentication step and an association step with the wireless access station 200 so as to access the wireless access station 200.

FIG. 9 illustrates a packet structure of a beacon message transmitted by AP according to the present invention.

FIG. 10 illustrates a packet structure of a probe request message transmitted by MS according to the present invention.

FIG. 11 illustrates a packet structure of a probe response message transmitted by AP according to the present invention.

Claims

1. A method of configuring a wireless link, performed in a second mobile station, the method comprising:

obtaining a first probe request message transmitted from a first mobile station;
transmitting a second probe request message within a maximum channel time from a time point of completion of the first probe request message; and
receiving a single probe response message from a wireless access station in response to the first probe request message and the second probe request message.

2. The method of claim 1, further comprising requesting authentication to the wireless access station by using wireless access information obtained from the probe response message.

3. A method of configuring a wireless link, performed in a wireless access station, the method comprising:

receiving a first probe request message from a first mobile station;
receiving a second probe request message from a second mobile station within a maximum channel time from a time point of completion of the first probe request message;
analyzing similarity between the first probe request message and the second probe request message; and
when a degree of the similarity satisfies a predetermined threshold, transmitting at least one probe response message corresponding to the first probe request message and the second probe request message.

4. The method of claim 3, further comprising receiving authentication requests from the first mobile station and the second mobile station.

5. The method of claim 3, wherein the probe response message is transmitted when service set identifiers (SSID) of the first probe request message and the second probe request message coincide with each other.

6. A second mobile station comprising:

a control part controlling operations of the second mobile station; and
at least one network interface card for transmitting and receiving data based on commands of the control part,
wherein the control part obtains a first probe request message transmitted from a first mobile station, transmits a second probe request message within a maximum channel time from a time point of completion of the first probe request message, and receives a single probe response message from a wireless access station in response to the first probe request message and the second probe request message.

7. The station of claim 1, wherein the control part requests authentication to the wireless access station by using wireless access information obtained from the probe response message.

8. A wireless access station comprising:

a control part controlling operations of the wireless access station; and
at least one network interface card for transmitting and receiving data based on commands of the control part,
wherein the control part receives a first probe request message from a first mobile station, receives a second probe request message from a second mobile station within a maximum channel time from a time point of completion of the first probe request message, analyzes similarity between the first probe request message and the second probe request message, and transmits at least one probe response message corresponding to the first probe request message and the second probe request message when a degree of the similarity satisfies a predetermined threshold.

9. The station of claim 8, wherein the control part receives authentication requests from the first mobile station and the second mobile station.

10. The station of claim 8, wherein the probe response message is transmitted when service set identifiers (SSID) of the first request message and the second probe request message coincide with each other.

Patent History
Publication number: 20160037341
Type: Application
Filed: Mar 13, 2014
Publication Date: Feb 4, 2016
Applicant: INTELLECTUAL DISCOVERY CO., LTD. (Seoul)
Inventors: Ju Hyung SON (Uiwang-si), Jin Sam KWAK (Uiwang-si)
Application Number: 14/776,228
Classifications
International Classification: H04W 12/06 (20060101); H04W 48/08 (20060101);