Network discovery utilizing cellular broadcasts/multicasts

ABSTRACT

This document describes, e.g., a system and method for minimizing superfluous signaling traffic and for minimizing data processing pressures on a network including a network information repository (NIR), comprising: having mobile stations that enter a network domain compare and detect inconsistencies in network information received through different sources and report those inconsistenci to the NIR; having the NIR update a cell broadcast controller (CBC)/BMSC with said network information; and having the CBC/BMSC broadcast or multicast the updated information.

The present application is a continuation-in-part of U.S. Non-Provisional application Ser. No. 11/456,820, filed Jul. 11, 2006, now abandoned and the present application claims priority to U.S. provisional application Ser. No. 60/596,659, filed on Oct. 11, 2005, the entire disclosures of which are incorporated herein by reference as though recited herein in full. In addition, the entire disclosure of the present assignees' prior U.S. patent application Ser. No. 11/267,590, entitled Network Discovery Mechanisms, filed on Nov. 7, 2005, is also incorporated herein by reference for reference.

BACKGROUND

1. Field Of The Invention

The present application relates to wireless communications and in particular to, inter alia, a methods and systems for network discovery.

2. Background Discussion:

Networks and Internet Protocol:

There are many types of computer networks, with the Internet having the most notoriety. The Internet is a worldwide network of computer networks. Today, the Internet is a public and self-sustaining network that is available to many millions of users. The Internet uses a set of communication protocols called TCP/IP (i.e., Transmission Control Protocol/Internet Protocol) to connect hosts. The Internet has a communications infrastructure known as the Internet backbone. Access to the Internet backbone is largely controlled by Internet Service Providers (ISPs) that resell access to corporations and individuals.

With respect to IP (Internet Protocol), this is a protocol by which data can be sent from one device (e.g., a phone, a PDA [Personal Digital Assistant], a computer, etc.) to another device on a network. There are a variety of versions of IP today, including, e.g., IPv4, IPv6, etc. Each host device on the network has at least one IP address that is its own unique identifier. IP is a connectionless protocol. The connection between end points during a communication is not continuous. When a user sends or receives data or messages, the data or messages are divided into components known as packets. Every packet is treated as an independent unit of data.

In order to standardize the transmission between points over the Internet or the like networks, an OSI (Open Systems Interconnection) model was established. The OSI model separates the communications processes between two points in a network into seven stacked layers, with each layer adding its own set of functions. Each device handles a message so that there is a downward flow through each layer at a sending end point and an upward flow through the layers at a receiving end point. The programming and/or hardware that provides the seven layers of function is typically a combination of device operating systems, application software, TCP/IP and/or other transport and network protocols, and other software and hardware.

Typically, the top four layers are used when a message passes from or to a user and the bottom three layers are used when a message passes through a device (e.g., an IP host device). An IP host is any device on the network that is capable of transmitting and receiving IP packets, such as a server, a router or a workstation. Messages destined for some other host are not passed up to the upper layers but are forwarded to the other host. The layers of the OSI model are listed below. Layer 7 (i.e., the application layer) is a layer at which, e.g., communication partners are identified, quality of service is identified, user authentication and privacy are considered, constraints on data syntax are identified, etc. Layer 6 (i.e., the presentation layer) is a layer that, e.g., converts incoming and outgoing data from one presentation format to another, etc. Layer 5 (i.e., the session layer) is a layer that, e.g., sets up, coordinates, and terminates conversations, exchanges and dialogs between the applications, etc. Layer-4 (i.e., the transport layer) is a layer that, e.g., manages end-to-end control and error-checking, etc. Layer-3 (i.e., the network layer) is a layer that, e.g., handles routing and forwarding, etc. Layer-2 (i.e., the data-link layer) is a layer that, e.g., provides synchronization for the physical level, does bit-stuffing and furnishes transmission protocol knowledge and management, etc. The Institute of Electrical and Electronics Engineers (IEEE) sub-divides the data-link layer into two further sub-layers, the MAC (Media Access Control) layer that controls the data transfer to and from the physical layer and the LLC (Logical Link Control) layer that interfaces with the network layer and interprets commands and performs error recovery. Layer 1 (i.e., the physical layer) is a layer that, e.g., conveys the bit stream through the network at the physical level. The IEEE sub-divides the physical layer into the PLCP (Physical Layer Convergence Procedure) sub-layer and the PMD (Physical Medium Dependent) sub-layer.

Wireless Networks:

Wireless networks can incorporate a variety of types of mobile devices, such as, e.g., cellular and wireless telephones, PCs (personal computers), laptop computers, wearable computers, cordless phones, pagers, headsets, printers, PDAs, etc. For example, mobile devices may include digital systems to secure fast wireless transmissions of voice and/or data. Typical mobile devices include some or all of the following components: a transceiver (i.e., a transmitter and a receiver, including, e.g., a single chip transceiver with an integrated transmitter, receiver and, if desired, other functions); an antenna; a processor; one or more audio transducers (for example, a speaker or a microphone as in devices for audio communications); electromagnetic data storage (such as, e.g., ROM, RAM, digital data storage, etc., such as in devices where data processing is provided); memory; flash memory; a full chip set or integrated circuit; interfaces (such as, e.g., USB, CODEC, UART, PCM, etc.); and/or the like.

Wireless LANs (WLANs) in which a mobile user can connect to a local area network (LAN) through a wireless connection may be employed for wireless communications. Wireless communications can include, e.g., communications that propagate via electromagnetic waves, such as light, infrared, radio, microwave. There are a variety of WLAN standards that currently exist, such as, e.g., Bluetooth, IEEE 802.11, and HomeRF.

By way of example, Bluetooth products may be used to provide links between mobile computers, mobile phones, portable handheld devices, personal digital assistants (PDAs), and other mobile devices and connectivity to the Internet. Bluetooth is a computing and telecommunications industry specification that details how mobile devices can easily interconnect with each other and with non-mobile devices using a short-range wireless connection. Bluetooth creates a digital wireless protocol to address end-user problems arising from the proliferation of various mobile devices that need to keep data synchronized and consistent from one device to another, thereby allowing equipment from different vendors to work seamlessly together. Bluetooth devices may be named according to a common naming concept. For example, a Bluetooth device may possess a Bluetooth Device Name (BDN) or a name associated with a unique Bluetooth Device Address (BDA). Bluetooth devices may also participate in an Internet Protocol (IP) network. If a Bluetooth device functions on an IP network, it may be provided with an IP address and an IP (network) name. Thus, a Bluetooth Device configured to participate on an IP network may contain, e.g., a BDN, a BDA, an IP address and an IP name. The term “IP name” refers to a name corresponding to an IP address of an interface.

An IEEE standard, IEEE 802.11, specifies technologies for wireless LANs and devices. Using 802.11, wireless networking may be accomplished with each single base station supporting several devices. In some examples, devices may come pre-equipped with wireless hardware or a user may install a separate piece of hardware, such as a card, that may include an antenna. By way of example, devices used in 802.11 typically include three notable elements, whether or not the device is an access point (AP), a mobile station (STA), a bridge, a PCMCIA card or another device: a radio transceiver; an antenna; and a MAC (Media Access Control) layer that controls packet flow between points in a network.

In addition, Multiple Interface Devices (MIDs) may be utilized in some wireless networks. MIDs may contain two independent network interfaces, such as a Bluetooth interface and an 802.11 interface, thus allowing the MID to participate on two separate networks as well as to interface with Bluetooth devices. The MID may have an IP address and a common IP (network) name associated with the IP address.

Wireless network devices may include, but are not limited to Bluetooth devices, Multiple Interface Devices (MIDs), 802.11x devices (IEEE 802.11 devices including, e.g., 802.11a, 802.11b and 802.11g devices), HomeRF (Home Radio Frequency) devices, Wi-Fi (Wireless Fidelity) devices, GPRS (General Packet Radio Service) devices, 3G cellular devices, 2.5G cellular devices, GSM (Global System for Mobile Communications) devices, EDGE (Enhanced Data for GSM Evolution) devices, TDMA type (Time Division Multiple Access) devices, or CDMA type (Code Division Multiple Access) devices, including CDMA2000. Each network device may contain addresses of varying types including but not limited to an IP address, a Bluetooth Device Address, a Bluetooth Common Name, a Bluetooth IP address, a Bluetooth IP Common Name, an 802.11 IP Address, an 802.11 IP common Name, or an IEEE MAC address.

Wireless networks can also involve methods and protocols found in, e.g., Mobile IP (Internet Protocol) systems, in PCS systems, and in other mobile network systems. With respect to Mobile IP, this involves a standard communications protocol created by the Internet Engineering Task Force (IETF). With Mobile IP, mobile device users can move across networks while maintaining their IP Address assigned once. See Request for Comments (RFC) 3344. NB: RFCs are formal documents of the Internet Engineering Task Force (IETF). Mobile IP enhances Internet Protocol (IP) and adds means to forward Internet traffic to mobile devices when connecting outside their home network. Mobile IP assigns each mobile node a home address on its home network and a care-of-address (CoA) that identifies the current location of the device within a network and its subnets. When a device is moved to a different network, it receives a new care-of address. A mobility agent on the home network can associate each home address with its care-of address. The mobile node can send the home agent a binding update each time it changes its care-of address using, e.g., Internet Control Message Protocol (ICMP).

In basic IP routing (e.g., outside mobile IP), routing mechanisms rely on the assumptions that each network node always has a constant attachment point to, e.g., the Internet and that each node's IP address identifies the network link it is attached to. In this document, the terminology “node” includes a connection point, which can include, e.g., a redistribution point or an end point for data transmissions, and which can recognize, process and/or forward communications to other nodes. For example, Internet routers can look at, e.g., an IP address prefix or the like identifying a device's network. Then, at a network level, routers can look at, e.g., a set of bits identifying a particular subnet. Then, at a subnet level, routers can look at, e.g., a set of bits identifying a particular device. With typical mobile IP communications, if a user disconnects a mobile device from, e.g., the Internet and tries to reconnect it at a new subnet, then the device has to be reconfigured with a new IP address, a proper netmask and a default router. Otherwise, routing protocols would not be able to deliver the packets properly.

Network Discovery

Future Mobile Communication Systems will focus on integration of heterogeneous Radio Access Technologies. These technologies may comprise of e.g., PANs (Personal Area Networks with very small coverage), WLANs (Local Area Networks with comparatively large coverage area), and WANs (Wide Area Networks with comparatively larger coverage area e.g., cellular or WiMax). Since focus is on integration, the requirements are more stringent than those for simply interworking. One such requirement is global roaming across these heterogeneous Radio Access Technologies with ubiquitous and transparent service provisioning. Global Roaming necessitates efficient method for quick vertical handovers, which in turn demands

(a) Identification of certain Network Elements ahead of time; and

(b) Communication of Mobile Station (MS) with these Network Elements in advance.

Identification of Network Elements means determining the existence of APs (Access Points), Routers, DHCP Servers (Dynamic Host Configuration Protocol) and several Authentication Servers such as AAA, (Authentication, Authorization and Accounting), PANA Server (Protocols for carrying Access Network Authentication) and in some cases SIP Server (Session Initiation Protocols).

Communication with the Network Elements may comprise exchange of messages e.g., for fetching General Information about the Networks, Information about the Lower Layers and the available Information about Higher Layer Services for establishing proactive security association and getting IP address. Identification of Network Elements and communicating with them is referred to as Network Discovery.

Network Discovery has gained a lot of interest these days. Several techniques have been proposed, however they have some drawbacks. Among other things, known methods of “Networks Discovery” focus on two phase approach.

Phase-1: Establishing a NIR (Networks Information Repository), and filling it with the Networks Information by means of Reporting Agents (RAs). The RAs collect the information about Network Elements in a domain and send it to the NIR. (e.g., if a specific network element is attached/detached or becomes operational/non-operational its information is reported to the NIR). RAs are regular MSs that happen to be present in that domain at that time. NIR i.e., Networks Information Repository is also referred to in literature as Networks Information Database, or Media Independent Information Server.

Phase-2: Reuse of NIR information by new mobile entrants in that domain. i.e., any MS when it enters in a new domain can enquire to NIR about the Network Elements in that domain. The NIR was populated by the RAs previously present in that domain. The MS can access NIR from any single radio interface. (such as, e.g., 802.11 access network, 3GPP or 3GPP2 networks) and can request information in advance about Network Elements of any domain.

There are a number of drawbacks in both the above noted phases. In Phase-1 (Populating NIR), each and every MS that happens to enter in a domain, unaware of the fact that the previously present or passing-by MSs have already updated the NIR, keeps on sending/replicating the same information about the domain it is passing through. This not only unnecessarily keeps the NIR busy in processing the replicated information but also generates signaling burdens on the network gratuitously.

In Phase-2 (Reuse of NIR Information), the prior methods assume that a MS is aware of NIR's reachable location. This method may not work well or may be inefficient if a MS is not aware of the NIR's reachable location.

The present invention provides a variety of advances and improvements over, among other things, the systems and methods in the background.

References:

Additionally, the present invention provides a variety of advances and improvements over, among other things, the systems and methods in the background art described in the following references, the entire disclosures of which references are incorporated herein by reference.

1. 3GPP TS 23.041, 3rd Generation Partnership Project (3GPP), Technical Specification Group Terminals, Technical realization of Cell Broadcast Service (CBS)(Releases 1 to 7)(http://www.3gpp.org/ftp/Specs/archive/23_series/23.041/)

2. 3GPP TS 31.102, 3rd Generation Partnership Project (3GPP), Technical Specification Group Core Network and Terminals, Characteristics of the Universal Subscriber Identity Module (USIM) Application (Releases 1 to 7) (http://www.3gpp.org/ftp/Specs/archive/31_(—)31.102/).

3. IEEE 802.21 Media Independent Handover Services, http://www.ieee802.org/21/, I.E.E.E. 802.21 Doc No. 21-05-0240-01-000 (e.g., submitted May, 2005).

SUMMARY OF THE INVENTION

The present invention improves upon the above and/or other background technologies and/or problems therein.

According to some embodiments, a method for minimizing superfluous signaling traffic and for minimizing data processing pressures on a network including a network information repository (NIR), comprising: having mobile stations that enter a network domain compare and detect inconsistencies in network information received through different sources and report those inconsistencies to the NIR; having the NIR update a cell broadcast controller (CBC) with the network information; and having the CBC broadcast or multicast the updated information. In some examples, the method further includes having the NIR receive only updated information about network elements of a domain through mobile stations that first discover whether network elements are attached or detached. In some examples, the method further includes having the NIR configured to store information about network elements mapped with geographical location coordinates. In some other examples, the method further includes having the NIR configured to store information about network elements mapped with time. In yet some other examples, the method further includes having the NIR maintain primary information and secondary information, wherein primary Information includes names and/or addresses of networks and/or network components, and wherein secondary information include network capabilities.

In some other examples, the method includes that the NIR is configured to communicate to the CBC primary information for cell broadcast that is pushed to mobile stations in a given geographical area. In some embodiments, the cell broadcast provides for multitudes of broadcast channels with different types of messages broadcasted on different channels. In some other examples, the method includes having the NIR define a geographical area for the CBC to which the information is to be broadcasted to. In yet some other examples, the method includes having the NIR communicate with a plurality of CBCs belonging to different network operators. In some other examples, the method includes having the mobile stations acquire primary information through cell broadcast and secondary Information through direct inquiry to the NIR about neighboring networks and their parameters ahead of time. Preferably, the mobile stations are configured to listen to and to compare the broadcasts received from cellular networks and beckons from non-cellular networks and to discern inconsistencies between the messages received. In some embodiments, the mobile stations are configured to pull secondary information from the NIR and to compare the pulled secondary information with that which that it obtains after actually connecting to a candidate network and discerning inconsistencies between the messages received from the NIR and the actual candidate network. In yet other embodiments, the mobile stations are configured to notify the NIR of primary and/or secondary inconsistencies, whereby the NIR will update its primary and/or secondary information database and will convey updates to the CBC.

In some examples, the mobile station is configured to decide whether the primary information is enough for the mobile station's session continuity or whether it needs secondary information. In preferred embodiments, the mobile station is equipped with multiple interfaces, including WLAN and cellular interfaces. In some examples, the NIRs are connected to each other in a hierarchical manner with a highest level NIR connected to a CBC. In some examples, the method further includes employing efficient query/response communications between a NIR and MSs based on use of message format hints such that a MS will send a query to a NIR only if the MS receives a hint in a cellular broadcast that the NIR contains the desired information.

In addition, some preferred embodiments of the invention provide novel and non-obvious systems and methods for populating a NIR with network discovery information, such as, e.g., employing systems and methods described herein.

In addition, some preferred embodiments of the invention provide novel and non-obvious systems and methods for providing network discovery information from a NIR, such as, e.g., employing systems and methods described herein in which, e.g., network discovery information within a NIR is broadcasted and/or multicasted, and, in particular, wherein such information is broadcasted via a CBC and/or multicasted via a BM-SC.

The above and/or other aspects, features and/or advantages of various embodiments will be further appreciated in view of the following description in conjunction with the accompanying figures. Various embodiments can include and/or exclude different aspects, features and/or advantages where applicable. In addition, various embodiments can combine one or more aspect or feature of other embodiments where applicable. The descriptions of aspects, features and/or advantages of particular embodiments should not be construed as limiting other embodiments or the claims.

BRIEF DESCRIPTION OF THE DRAWINGS

The preferred embodiments of the present invention are shown by a way of example, and not limitation, in the accompanying figures, in which:

FIG. 1 is an architectural diagram showing illustrative network interface repositories (NIRs) interfaced with a cell broadcast centers (CBC) of a Cellular System according to some illustrative embodiments;

FIG. 2 is an illustrative flow diagram showing illustrative process steps performed by an MC in an active mode;

FIG. 3 is an illustrative flow diagram showing illustrative process steps performed by an MC in an active mode;

FIG. 4 is an illustrative flow diagram showing illustrative process steps performed by an MC in a passive mode;

FIG. 5 is an illustrative architectural diagram showing illustrative components of some illustrative network elements;

FIG. 6 is an illustrative architectural diagram depicting some illustrative device components in some illustrative embodiments;

FIG. 7 is an illustrative architectural diagram depicting an illustrative environment in which a mobile device having a plurality of interfaces communicates with a plurality of networks;

FIG. 8(A) is an architectural diagram showing illustrative network interface repositories (NIRs) interfaced with an illustrative broadcast-multicast service center (BMSC) according to some illustrative embodiments;

FIG. 8(B) is a diagram schematically showing architecture common to preferred implementations of embodiments shown in both FIGS. 1 and 8(A); and

FIG. 9 is a schematic diagram showing modifications to illustrative 3GPP architecture according to some embodiments of the invention.

DISCUSSION OF THE PREFERRED EMBODIMENTS

While the present invention may be embodied in many different forms, a number of illustrative embodiments are described herein with the understanding that the present disclosure is to be considered as providing examples of the principles of the invention and that such examples are not intended to limit the invention to preferred embodiments described herein and/or illustrated herein.

Illustrative Architecture

In the preferred embodiments, devices, such as, e.g., radio network controllers, (RNCs), cell broadcast centers (CBCs), network interface repositories (NIRs), access points (APs), mobile stations (MSs), etc., are employed, each of which includes, e.g., computer components as known in the art. By way of example, each can include data processing capabilities and can include hardware and/or software components known in the art, including basic computer components, such as, e.g., processor(s), data storage, memory, and means for sending/receiving data, such as, e.g., transceivers and/or other appropriate components as would be understood by those in the art based on this disclosure. By way of illustration, FIG. 5 depicts some illustrative architectural components that can be employed in some illustrative and non-limiting implementations including wireless access points to which mobile devices communicate. In this regard, FIG. 5 shows an illustrative wireline network 20 connected to a wireless local area network (WLAN) generally designated 21. The WLAN 21 includes an access point (AP) 22 and a number of user stations 23, 24. For example, the wireline network 20 can include the Internet or a corporate data processing network. For example, the access point 22 can be a wireless router, and the user stations 23, 24 can be, e.g., portable computers, personal desk-top computers, PDAs, portable voice-over-IP telephones and/or other devices. The access point 22 has a network interface 25 linked to the wireline network 21, and a wireless transceiver in communication with the user stations 23, 24. For example, the wireless transceiver 26 can include an antenna 27 for radio or microwave frequency communication with the user stations 23, 25. The access point 22 also has a processor 28, a program memory 29, and a random access memory 31. The user station 23 has a wireless transceiver 35 including an antenna 36 for communication with the access point station 22. In a similar fashion, the user station 24 has a wireless transceiver 38 and an antenna 39 for communication to the access point 22. By way of example, in some embodiments an authenticator could be employed within such an access point (AP) and/or a supplicant or peer could be employed within a mobile node or user station.

FIG. 6 shows an illustrative computer or control unit that can be used to implement computerized process steps, to be carried out by devices, such as, e.g., an access point, a mobile station and/or other devices, in some embodiments of the invention. In some embodiments, the computer or control unit includes a central processing unit (CPU) 322, which can communicate with a set of input/output (I/O) device(s) 324 over a bus 326. The I/O devices 324 can include, for example, a keyboard, monitor, and/or other devices. The CPU 322 can communicate with a computer readable medium (e.g., conventional volatile or non-volatile data storage devices) 328 (hereafter “memory 328”) over the bus 326. The interaction between a CPU 322, I/O devices 324, a bus 326, and a memory 328 can be like that known in the art. Memory 328 can include, e.g., data 330. The memory 328 can also store software 338. The software 338 can include a number of modules 340 for implementing the steps of processes. Conventional programming techniques may be used to implement these modules. Memory 328 can also store the above and/or other data file(s). In some embodiments, the various methods described herein may be implemented via a computer program product for use with a computer system. This implementation may, for example, include a series of computer instructions fixed on a computer readable medium (e.g., a diskette, a CD-ROM, ROM or the like) or transmittable to a computer system via and interface device, such as a modem or the like. A communication medium may be substantially tangible (e.g., communication lines) and/or substantially intangible (e.g., wireless media using microwave, light, infrared, etc.). The computer instructions can be written in various programming languages and/or can be stored in memory device(s), such as semiconductor devices (e.g., chips or circuits), magnetic devices, optical devices and/or other memory devices. In the various embodiments, the transmission may use any appropriate communications technology.

Discussion Of the Preferred Embodiments

The preferred embodiments provide some illustrative new methods and systems that can, among other things, overcome the above-noted and/or other flaws.

For reference, FIG. 1 depicts an illustrative architectural representation of some illustrative and non-limiting embodiments of the invention. As shown in FIG. 1, at least one network information repository (NIR) is provided that communicates, see numeral 1, with a Cell Broadcast Center (CBC). In the illustrated example, as discussed below, a plurality of NIRs are arranged in a hierarchical fashion. However, in other embodiments, a non-hierarchical structure can be employed, such as, e.g., with only a single NIR. As shown in FIG. 1, the CBC can be used to achieve cellular broadcasts via, e.g., a radio network controller (RNC) that cause broadcasts to be achieved via base stations or the like, such as, e.g., via one of the two illustrated base stations shown in the box UTRAN in FIG. 1. As also depicted, the base stations have a cell coverage area, illustrated schematically with six-sided cells in the figure, within which one or more of networks, such as, e.g., WLANs and MSs can be situated.

For reference, FIG. 7 also shows an illustrative and non-limiting general architectural diagram of an illustrative environment within which components of the present invention can be employed, if desired. As depicted, the mobile stations, MSs, preferably have multiple interfaces, enabling communications with Access Points (APs) of WLANs or the like and Base Stations (BSs) of Cellular Networks or the like as shown. In particular, the illustrated example shows an illustrative network configuration in which a mobile device 1 is shown as having interfaces for communicating with base stations 2A, 2B and access points 3A, 3B. In this illustrative example, the base stations 2A and 2B are shown as communicating with a base station controller 4 that in turn communicates with a call agent 7 which is in communication with the public switched telephone network (PSTN) 12. As also shown, the access points 3A and 3B can include, e.g., IP network access points and can be in communication with a gateway 5 that communicates, in turn to a router 6 that communicates via an IP network 10, such as, e.g., the Internet, via a trunking gateway 11 to the public switched telephone network 12.

According to the preferred embodiments of the new approach, the NIR (which can include, e.g., a server computer) is made capable of performing the following functions:

1. The NIR will be capable of Receiving ONLY Updated Information about Network Elements of any domain through those MSs only who will first discover whether at least some Network Element(s) is/are attached or detached. Thus, each and every MS, that happens to enter in a domain, will not be compelled to send the same information over and over again. This will provide relief to the NIR from processing the replicas of information; and will also lower the signaling volume on the network.

2. The NIR will be capable of Storinq Information about Network Elements Categorically Duly Mapped with Geographical Location Coordinates and Time. There will preferably be two categories of stored information; “Primary Information” and “Secondary Information.” Primary Information may include, for example, SSIDs of available networks, addresses of the DHCP server, and address of authentication server, etc. Secondary Information can be, e.g., primarily comprised of network capabilities. In such cases, in various embodiments, the networking capabilities that each mobile device wishes to know can vary significantly depending on the capabilities and applications of the particular mobile device. Thus, Secondary Information can be considered as the additional information that can include, e.g., higher layer information and/or detailed information about lower layers. For example, Type of Security Protocols supported (e.g., Open Access Control, Universal Access Control, or 802.1X Access Control, etc.), Type of Internet Protocols supported (e.g., IPv4, IPv6, etc.), Support for QoS, Support for interworking with other networks, Existence of Roaming Relationship and Names of Roaming Partners, Pricing Information, and Services Supported by the networks. Notable bases for categorizing the information in Primary and Secondary is explained in the following paragraphs. However, both categories of information will help an MS to determine the candidate networks and to perform pre-authentication with the best one ahead of time.

3. The NIR will be capable of Communicatinq to the CBC (Cell Broadcast Center [2]) to convey Primary Information for Cell Broadcast. Thus, Primary Information can also be regarded as Push Type Information. Cell Broadcasting is an existing, but rarely used, function of cellular networks and is defined by the standardization bodies such as 3GPP and 3GPP2. Cell broadcasting allows messages to be broadcasted to all mobile handsets in a given geographical area. This area can range from the area covered by a single cell to the whole network. Because cell broadcast works by targeting particular cells, no knowledge of mobile telephone numbers is required. Also, cell broadcasting places a very low load on a cellular network; a cell broadcast to every subscriber on the network is essentially equivalent to sending an SMS message to a single phone. The cell broadcast technology provides for 64000 broadcast channels so that different types of message (such as, e.g., by way of example, messages related to traffic conditions, severe or other weather, terrorist activities or threats, public announcements, missing children, and/or various other types of messages) could be broadcast on different channels. Preferably, not every subscriber would necessarily receive all the channels and, hence, all of the messages. In some embodiments, channels can be activated from the handset or can be activated remotely by the network. In some embodiments, certain channels are allocated for certain message types (preferably, standardized on a wide geographic area, such as, e.g., regionally or globally) so that travelers can receive, e.g., alerts substantially wherever or wherever they happen to be. Preferably, the essential or Primary Information about the Network Elements will be broadcasted on such channels. Thus, the Primary Information can also be referred as Push Type Information. (Note: Depending on the business case or the particular circumstances, this information can be alternatively multicast to the subscribed users instead of using broadcasting. Illustrative multicasting examples are discussed further below in the section entitled Illustrative Multicast Embodiments).

4. The NIR will be capable of Defining a Geographical Area to CBC where the information is to be broadcasted to—. e.g., the NIR is preferably capable of explaining to the CBC to transmit the Network Information pertaining to, for example, Area-A from the Base Station that is located in Area A and Network Information pertaining to, for example, Area B, from the Base Station that is located in Area B, and so on.

5. The NIR will be capable of Communicatinq with (in some embodiments) Numerous CBCs belonging to different network operators.

6. The NIR will also be capable of delivering Secondary Information Directly to the MSs that send direct inquiries to NIR. Thus, in some embodiments, the MSs can become equipped with Primary Information (through Cell broadcast) and Secondary Information (through direct inquiry) about neighboring networks and their parameters ahead of time. In this manner, the MSs can, among other things, be in a better position of implementing advanced capabilities for enhanced mobility support and/or other time sensitive mobile applications.

According to the preferred embodiments of the present invention, the Mobile Stations (MSs) are configured to perform the following functions:

1. The MSs are configured to listen to the Broadcasts to get Primary Information about Network Elements.

2. The MSs are configured to obtain Secondary or Additional Information about Network Elements by sending a direct query to NIR. Both the Primary and Secondary Information received through Broadcasts and through query to NIR, respectively, will help the MS to determine the candidate networks and to perform pre-authentication with the best one ahead of time. Secondary Information about the Network Elements will be extracted or pulled from the NIR based on inquiry. Therefore, it can also be referred as Pull Type Information.

In addition to above tasks, the MSs are also preferably configured to perform the following tasks:

3. MSs are configured to Listen and Compare the Broadcasts received from Cellular Networks (e.g., 3GPP, 3GPP2, etc) and Beckons from Non-Cellular networks (e.g., WLANs, WiMax, PANs, etc.) and to Comprehend the Inconsistencies between the messages received from two different interfaces. These Inconsistencies are referred as Primary Inconsistencies and may result, for example, if some specific Network Element is attached/detached or becomes operational/non-operational, but yet the CBC is not yet aware of these updates and still broadcasts the old Primary Information.

4. MSs are configured to Pull the information from the NIR and to Compare the Pulled/Secondary Information with that which that it obtains after actually connecting to a candidate network and Comprehending the Inconsistencies between the messages received from two different sources (i.e., the NIR and the Actual Network). These inconsistencies are referred as Secondary Inconsistencies and may result, for example, if some specific Network Element is attached/detached or becomes operational/non-operational in an actual network, but the NIR is unaware of these updates and still responds to the inquiries with the old Secondary Information.

5. MSs are configured to Notify both the Primary Inconsistencies (see above at step-3) and the Secondary Inconsistencies (see above at step-4) to the NIR (e.g., if the MS determines that information received through a Broadcast is inconsistent to that which it received through the Beckons, or, the information pulled from the NIR is inconsistent to that which it received from the network as part of its normal process for connecting to the visited network, the MS immediately, through any available interface, will inform NIR). Consequently, the NIR will update its Secondary and Primary Information database (e.g., either add or delete the entry from its database as the case may be) and, in turn, will convey the Primary Updates to the CBC. In this manner, even though this particular MS will have learned of the discrepancies by actually connecting to the Network, that MS's sharing of the Information with the NIR will enable other users to obtain the most correct Primary and Secondary Information in the event that they happen to visit the same network and inquire to NIR about it.

In some embodiments, the MSs can perform these tasks in Active or Passive Modes. In Active mode, both Primary Inconsistencies and Secondary Inconsistencies can be conveyed to the NIR, as depicted, e.g., in FIG. 2. However, in Passive Mode, only Primary Inconsistencies can be sent, such as shown, e.g., in FIG. 4. Preferably, the Secondary Inconsistencies, however, will be sent by some other MS if they are operating in Active Mode in that domain. This will also reduce the signaling traffic on the network and replicated data processing pressure on the NIR. Note that these tasks are in addition to the actual Active Mode tasks and can be performed either in parallel, or during the silent periods (i.e., during periods when there is no or essentially no transmission is occurring). As to the preferred embodiments, the actual Active Mode Tasks carried by an MS are listed below.

1. To perform a proactive secured handoff, the MS sends PANA authentication message to the PANA server.

2. The MS renews the IP address with the DHCP server of the candidate network.

3. The MS sends a binding update to the correspondent host (CH) or to the home agent.

According to the preferred embodiments, the NIR will be connected to the CBC. The information relating to Primary Category will be sent to the CBC for Cell Broadcast. As discussed above, a Cell Broadcast Area is defined in some embodiments as related to geographical areas where NIR messages are broadcasted. Its size may vary considerably. It is much smaller in dense urban areas (e.g., few hundred yards), and may be quite larger in less dense urban areas (around 3 miles). A larger Cell Broadcast Area may encompass hundreds of WLANs in its footprint. Broadcasting all the information (Primary as well as Secondary) about all the WLANs (existing in Cell Broadcast foot print) may not be feasible from CBC's capacity point of view. Thus, broadcasting only the Primary information makes a prolific sense to use the CBC capacity efficiently.

The message format; and the interface/protocols between NIR and CBC (indicated by “1” in FIG. 1 of this document) can be defined, however we recommend to reuse the protocols established in [2] for Interface between CBC and Radio Network Controller (RNC) (indicated by “2” in FIG. 1 of [2]). The reuse (with some refinements, if needed) will not only avoid reinvention of the wheel, but will also alleviate CBC from unnecessary translation of one type of protocols into other. For reference, a RNC typically manages connections to a plurality of base stations. For example, from the RNC, packet traffic and call traffic can typically be split off—e.g., with call traffic is sent on to a mobile switching center while data traffic is diverted to make their way to the Internet or a private IP network.

In another embodiment of the present invention, the NIRs can be connected to each other in a hierarchical manner and the highest level NIR can be connected to a CBC as shown in FIG. 1. For the sake of simplicity, only two hierarchal levels are shown, however depending on circumstances these could be more that meet the implementation requirements. In this illustrative example, Level-1 NIRs will send information to Level-2 NIRs, and Level-2 NIRs will send information to the Level-3 NIR, and the Level-3 NIR will send information to the CBC. In the preferred embodiments, the CBC will process the information based on location coordinates and will forward the information to a specific Base Station to broadcast it in a specific cell area.

In another embodiment of the present invention, the Primary Information, broadcasted through the cell broadcast, is structured or organized in two ways—i.e., “P_(SF) Format” or “P_(SE) Format”. Both Formats essentially carry the same Primary Information for the MSs. However, one Format may be differentiated from the other by inserting an additional bit or header to give the MSs the following hints:

1. In preferred embodiments, a P_(SE) Format informs the MSs that the Secondary Information associated with that Primary Information is available in an NIR (i.e., that the NIR is Filled with Secondary Information) and that the MSs may contact the NIR to pull that information.

2. In preferred embodiments, a P_(SE) Format informs the MSs that (a) the Secondary Information associated with the Primary Information is not available in an NIR (i.e., that the NIR is Empty) and, hence, that it is pointless to contact the NIR to pull the Secondary Information and that (b) the NIR needs the Secondary Information to be Filled in and if any MS finds any information, it should forward it to the NIR too.

Preferably, once the information is updated, its format category is promoted from P_(SE) to P_(SF) Format. Among other things, this technique helps to provide efficient Query Response communications between an NIR and MSs, because 1) a MS will send a query to a NIR only if the MS receives a hint in the Cellular Broadcast that the NIR contains the desired information, and 2) a MS will also only report the information about any new Networks Elements if the NIR needs it.

In some advantageous embodiments, communication between an NIR and MSs (e.g., either direct or indirect through broadcast) using different formats or codes can trigger MSs to perform any specific task for the NIR—thus, it can create a variety of other applications. A couple of illustrative applications are explained below under the section captioned “Illustrative Applications.”

In another embodiment of the present invention, cellular network assisted/associated location detection mechanisms can be implied. This can relinquish MSs to have their own mechanism of detecting their geographical location. Thus, a MS client may no longer be required to be GPS equipped in some circumstances.

In yet another embodiment of the present invention, a MS may have a decision power to decide whether the Primary Information is enough for the MS's session continuity or whether it needs Secondary Information. In some applications/scenarios, an MS would not need Secondary Information and, thus, in such cases, there would be no need of sending queries to NIR each time. An illustrative flow diagram for this embodiment is depicted in FIG. 3.

Embodiments of the present invention, can not only surmount the flaws present in the existing techniques, but can also provide a number of other advantages, such as, e.g.:

(a) In some preferred embodiments, the MSs will always receive reliable information about the NIR's reachable location through cellular broadcasts. Notably, the prior known systems were inefficient because, among other things, such assumed that a MS was aware of a NIR's reachable location, which may not always be the case.

(b) In some preferred embodiments, a superfluous signaling traffic on the network and replicated data processing pressures on an NIR will be reduced. In preferred embodiments, every MS that happen to enter in a domain will first compare and detect the inconsistencies in the information received through different sources and will report those inconsistencies to the NIR. Once the NIR updates the CBC, and the CBC starts broadcasting the updating information, inconsistencies will virtually never exist and there will be virtually nothing for the other MSs to report anymore. This not only eliminates redundant signaling traffic, but, at the same time, relieves the NIR from unnecessary processing of replicated information. In contrast to this, in prior techniques all Reporting Agents whenever and wherever they would find any network, they would just keep on sending the information to the Networks Data Server, which would increases signaling traffic on the network and processing burdens on the NIR.

(c) In some preferred embodiments, the broadcasting of hints for the mobiles (e.g., P_(SF) and P_(SE) Formats as noted above) will also refrain a MS from contacting a NIR if the NIR does not contain desired information. This will not only provide efficient Query Response communication between a NIR and a MS, but will also inform the MS that the NIR needs Secondary Information and will inform the MS that if finds any information it should forward the information to the NIR too.

(d) In some preferred embodiments, the broadcasting of only the Primary Information, will use the CBC capacity efficiently. Moreover, since the footprint of a CBC broadcast area is large, a MS will typically receive essential information exceedingly ahead of time and will be better-off to support advance mobility and other time sensitive mobile applications.

(e) In some preferred embodiments, regardless of where a MS is and which local network it is connected to, the MS will always use a single protocol to communicate with the NIR to retrieve the desired information.

To facilitate reference, a further discussion of the illustrative and non-limiting embodiments depicted in the figures is now provided. Further discussion of the figures is now provided. With reference to FIG. 2, as discussed above, FIG. 2 shows an illustrative algorithm or process flow that can be performed in some illustrative embodiments by an MC or MS in an active mode. In this illustrative embodiment, at step 120 the mobile listens to cellular broadcasts, and, at step 121, the mobile listens to WLAN beckons. At step 127, the mobile compares these and evaluates if there are any inconsistencies. If the answer is no, the process goes back to step 120. If the answer is yes, then the process goes onward to step 128 and obtains the present GPS coordinates and sends actually discovered information about network elements to the NIR. In the meantime, after step 122, the mobile discerns if there is enough information for performing a proactive handoff. If the answer is yes, the process goes to step 125 and performs the proactive/active handoff. On the other hand, if the answer is no, the process goes to step 123 and sends a query to the NIR. Responsive thereto, at step 124, the mobile receives information from the NIR. Then, the process goes to step 125 and performs the proactive/active handoff. At step 126, the mobile obtains network elements information from the newly attached network. Then, at step 129, the process compares the information acquired at step 126 with that received at step 124 and determines if any inconsistencies exist. If the answer is no, this further process goes to stop. On the other hand, if the answer is yes, the process goes onward to step 128 and obtains the present GPS coordinates and sends actually discovered information about network elements to the NIR.

Referring now to FIG. 3, FIG. 3 shows another embodiment of an illustrative algorithm or process flow that can be performed in some illustrative embodiments by an MC or MS in an active mode. In particular, as shown, at step 201, the mobile listens to WLAN beckons, and, at step 202, the mobile listens to cellular broadcasts. At step 210, the mobile discerns if secondary information is available in the NIR. If the answer is no, the process goes to step 215 at which the mobile discerns whether it should perform the handoff with limited available information. At that point, if the answer is then no, the handoff fails. On the other hand, if the answer is yes, then the process goes to step 250. However, if the answer in step 210 is yes, the process goes to step 220 and discerns if secondary information is needed. If the answer is no, the process goes to step 250. However, if the answer is yes, the process goes to step 230 and sends a query to the NIR. Then, the mobile receives the information from the NIR at step 240. At step 250, which can be reached via any appropriate path noted above, the mobile performs a proactive/active handoff. At step 260, the mobile gets network elements information from the newly attached network. As shown at step 205, in some embodiments, the information acquired by the mobile at step 260 and the information received from the NIR at step 240 are compared by the mobile to discern if there are inconsistencies. If the answer is no, this further process goes to stop. On the other hand, if the answer is yes, at step 204, the mobile receives present GBS coordinates and sends actually discovered information about the Network Elements to the NIR. As shown at step 203, in some embodiments, the information received from steps 201 and 202 (i.e., from the beckons and the broadcasts) are compared for inconsistencies. If the answer is no, then the system continues back to step 202. On the other hand, if the answer is yes, then the system continues to step 204.

Referring now to FIG. 4, FIG. 4 shows an embodiment of an illustrative algorithm or process flow that can be performed in some illustrative embodiments by an MC or MS in a passive mode. Here, at step 410 the mobile listens to WLAN beckons, and, at step 420, listens to cellular broadcasts. At steps 430-440, the mobile compares the WLAN beckons and the cellular broadcasts for inconsistencies and discerns if any inconsistencies exist. If the answer reached in step 440 is no, then the process returns to step 410. On the other hand, if the answer reached in step 440 is yes, then the process goes on to step 450 and the mobile obtains the present GPS coordinates. Thereafter, the process goes to step 460 and the system sends actually discovered information about network elements to NIR. Thereafter, the process returns to step 410.

Illustrative Architectures

According to some illustrative embodiments, NIRs, CBCs and MSs utilized to perform aspects of the preferred embodiments will be configured so as to achieve the following functions. It should be understood based on this disclosure that the functions performed by the components (e.g., NIRs, CBCs and MSs) can be varied based on circumstances.

NIR Functions:

In some illustrative embodiments, an NIR will be configured so as to perform some or all, preferably all, of the following functions.

1. In some embodiments, the NIR is configured such that the NIR receives updates from MSs or requests MSs to send updates to replace any expired piece of information in its database.

2. In some embodiments, the NIR is configured such that the NIR sends these updates to the CBC.

3. In some embodiments, the NIR is configured such that apart from the information to be broadcasted, the NIR also sends some Administrative Information meant for CBC use or higher level NIR use only. For example, the NIR can outline the geographical scope of the messages to be broadcasted (e.g., mapping the Networks Information with the Geographical Areas or with the list of Cell IDs for which broadcasts are meant).

4. In some embodiments, the NIR is configured such that each NIR sends its own identity (such as, e.g., its IP Address) to the higher level NIR or to the CBC.

5. In some embodiments, the NIR is configured such that each NIR appends some reference number to the messages. In some examples, this may be a Serial Number or a Version Number, or both. For instances, a Serial Number may be used if both Geographical Coordinates and Information both are new/changed, and a Version Number may be used if only the information contents are changed and Geographical Coordinates are unchanged.

Additional NIR Functions:

In some other illustrative embodiments, an NIR will be configured so as to perform some or all, preferably all, of the following functions. In particular, in order to make the NIR smarter, following additional capabilities can be built in NIR.

1. In some embodiments, the NIR is configured such that the NIR is capable for all aspects of formatting the messages to be delivered to CBC. For example, the NIR could use any well-known format, such as, e.g., RDF (Resource Description Framework) discussed, e.g., in reference [3] above.

2. In some embodiments, the NIR is configured such that the NIR is also capable of classifying the messages into two classes: (a) intended for user (e.g., service provider name, tariff, etc.) and (b) not essentially intended for the users (e.g., address of NIR or other servers). Thus, the MSs can selectively pick and display only those messages required by the MS user.

3. In some embodiments, the NIR is configured such as to communicate the preferred time and preferred frequency at which message broadcast is desired. By way of example, this may involve a calculation taking into consideration several factors, such as, e.g., the amount of information to be broadcasted, the speed of mobiles with which they move in the cells, etc.

4. In some embodiments, the NIR is configured such as to categorize the messages from a priority point of view—such as, e.g., a High Priority message can be requested to be broadcasted at the earliest opportunity and Normal Messages can be requested to be broadcasted according to, e.g., an associated repetition period. In some embodiments, the NIR can also instruct the CBC to cease message broadcasting, if needed.

5. In some embodiments, the NIR is configured such as to Use coding or different formats that can trigger MSs to perform certain desired actions for the NIR.

CBC Functions:

The CBC is a part of the cellular network and it may be connected to several BSCs/RNCs. It is responsible for the management of broadcast messages referred to as CBS messages. In some illustrative embodiments, a CBC performs some or all, preferably all, of the following functions.

1. In some embodiments, the CBS is configured such as to allocate serial numbers to its messages.

2. In some embodiments, the CBS is configured such as to determine the cells to which a CBS message should be broadcasted.

3. In some embodiments, the CBS is configured such as to determine a time at which a CBS message should be broadcasted.

4. In some embodiments, the CBS is configured such as to determine a frequency at which CBS message broadcast should be repeated.

5. In some embodiments, the CBS is configured such as to be capable of instructing each BSC and/or RNC to cease broadcast of the CBS message, if needed.

6. In some embodiments, the CBS is configured such as to be capable of initiating broadcast by sending fixed length messages to a BSC and/or RNC and where necessary padding the pages to a length of, e.g., 82 octets. Here, a length of 82 octets, using the default character set, equates to 93 characters. Up to 15 of these pages may be concatenated. In some embodiments, in order to enhance the message capacity, other Data Coding Schemes may also be used, such as, e.g., as schemes described in 3GPP Technical Specification TS 23.038, the contents of which are incorporated herein by reference.

7. In some embodiments, the CBS is configured such as to be capable of modifying or deleting CBS messages held by the BSC and/or RNC.

8. In some embodiments, the CBS is configured such as to be capable of determining the cell broadcast channel on which the message should be broadcasted.

9. In some embodiments, the CBS is configured such as to be capable of using Compression and/or Decompression that may take place between a NIR and an MS.

10. In some embodiments, the CBS is configured such as to be capable of assigning a message class to permit mobiles to selectively display only those messages required by the MS user. In some embodiments, the message class reveals the category of information and the language in which the message has been compiled. Through the use of appropriate Man-Machine-Interface, the user is then able to ignore message types that he does not wish to receive—such as, e.g., advertising information and/or messages in an unfamiliar language.

MS Functions:

In some illustrative embodiments, a MS will be configured so as to perform some or all, preferably all, of the following functions.

1. In some embodiments, the MS is configured such that it is equipped with multiple interfaces, such as, e.g., dual interfaces including WLAN and Cellular interfaces. In preferred embodiments, the MS listens to the cellular broadcasts and attempts to receive the CBC messages whose Message IDs are in a “search list”. This “search list” preferably contains the Message IDs stored in, e.g., the EF_(CBMI), EF_(CBMID) and EF_(CBMIR) files on the USIM [see Reference [2] incorporated herein by reference above] and any Message Identifiers stored in the User Equipment (UE) in a “list of CBC messages to be received”. For reference, UE relates to, e.g., a cellular phone and all peripherals such as, e.g., USIM related to the MS. If the User Equipment (UE) has restricted capabilities with respect to the number of Message IDs it can search for, the IDs stored in the USIM shall take priority over any stored in the UE. In preferred embodiments, it learns about the available networks and the addresses of the associated network elements (such as, e.g., a DHCP Server, an Authentication server, etc.) operating in the cell of a cellular network footprint. These networks can be a part of same domain or different domains. In addition, the MS also learns about the IP address of the NIR.

2. In some embodiments, the MS is configured such that in case of concatenated pages, each of message will have the same message identifier (e.g., indicating the source of the message), and the same serial number. Using this information, the MS/UE is able to identify and ignore re-broadcasts of already received messages.

Illustrative Applications:

Road Congestion Information:

In some illustrative embodiments, a road congestion information application can be employed which informs users, on a real time basis, about the section on a road or highway that is facing congestion at any particular time. To embody this application, an MS is preferably made capable of getting vehicle speed from the odometer on Bluetooth or any short range WLAN. Preferably, the MS is also capable of receiving a specified speed limit being broadcasted from the local base station. Preferably, the MS compares own speed and the broadcasted speed limit, and if there is a significant difference (i.e., inconsistency), the MS sends a message to the NIR.

Accordingly, the NIR will receive such messages from a plurality of MSs from a congested segment of the road or highway. Preferably, the NIR can translate the intensity of the congestion for display within a car or vehicle, such as, e.g., using color codes (such as, e.g., red, yellow, etc.) on a car's navigation device. In various embodiments, this information can be sent though any air or wireless interface to the subscribed users.

In addition, information about Department of Transportation can be made to feed the Specified Speed Limits mapped with Highway No. and Location (taking into account construction zones speed limits etc.) to the local NIR directly (or CBC of Cellular System). Thus the base station will broadcast the specified speed limits specified in that local area.

Electronic Cab Dispatching:

In some illustrative embodiments, a cab dispatching application can be provided that eliminates the need for Cab Dispatching Agencies. In some embodiments, a user needing a taxi can be, e.g., located or standing at a certain location. In preferred embodiments, his mobile device knows the NIR address (e.g., which he may have received from a cell broadcast as described in embodiments above). In some embodiments, the user presses a taxi icon on the user's MS or otherwise uses the MS to send a message to the NIR with the user's present location coordinates. The NIR can then search for a qualifying taxi in its database. Upon finding one, the NIR can send a message to the taxi operator, such as, e.g., an SMS on the driver's cell phone, through a CBC. For reference, SMS (Short Message Service) is a service for sending messages of up to 160 or 224 characters to mobile phones that use Global System for Mobile (GSM) communication. Typically, SMS messages are transmitted within the same cell or to anyone with roaming service capability. In addition, SMS messages can also be sent to digital phones from a Web site application equipped with, e.g., PC Link or from one digital phone to another. The qualifying cab is the one:

-   -   1. In the preferred embodiments, whose cell phone number is         registered in an established database (e.g., those cab's who         have subscribed to the service).     -   2. In the preferred embodiments, which is in the proximity of         the geographical coordinates of the user.     -   3. In the preferred embodiments, whose flag is up (e.g., a         vacant cab not currently serving any passenger). In this regard,         a cab can transmit a message identifying its status as vacant or         not-vacant as would be understood by those in the art based on         this disclosure.         Illustrative Multicast Examples:

As explained herein-above, instead of using broadcasting, information received from the NIR can be alternatively multicasted to subscribed users. While those in the art would understand how to implement multicasting to subscribed users based on the foregoing description, some background information related to the advantages of such embodiments, as well as some illustrative embodiments to facilitate reference, are described in this section. A notable distinction between broadcast modes and multicast modes is that a user does not need to subscribe in each broadcast service separately, while in multicast mode, the services can be ordered separately. As a result, broadcast services are generally not charged, while multicast services can be changed or billed to subscribed users.

In general, broadcasting via a CBC can have a number of practical problems in some applications. First, a CBC would commonly be operated by a cellular operator network, such as, e.g., VERIZON, or another company. As a result, such an operator may have limited incentive to broadcast information related to competitor networks. Thus, this could create a practical problem in respect to actual implementation in relation to competitor information. Second, a CBC and cellular network would commonly be involved in open broadcasting to even non-subscribed users. Thus, this could create a practical problem in respect to actual implementation in relation to transmission to non-subscribed users. For example, it could create a practical problem in terms of ensuring that certain users pay for subscriptions and based on such payments received such transmissions. Third a CBC and cellular network would commonly be involved in open broadcasting to even less privileged subscribers, where as cellular operator might like to offer a service to only, e.g., Platinum or Gold subscribers and not to less privileged ones, e.g., general subscribers or less dedicated ones.

For illustrative purposes, in some embodiments, multicasting can be implemented in accordance with the standards related thereto under the 3GPP. In this regard, the entire contents of the following standards documents are incorporated herein by reference: 1) 3GPP TS 22.146, 3GPP Multimedia Broadcast Multicast Service Stage-1 and 2) 3GPP TS 23.246, 3GPP Multimedia Broadcast Multicast Service, Architecture and Functional description. In this regard, reference is made to the following two summarizing documents, the entire disclosures of which are also incorporated herein by reference: 1) Support of Multicast Services in 3GPP, by Th. Lohmar, H. Wiemann, F. Hundscheidt, M. Meyer and R. Keller, published by 3G Evolving Technologies at <<http://www.3get.de/pdf/MBMS_PIK_(—)060404.pdfhttp://www.3get.de/pdf/MBMS_PIK_(—)060404.pdf>>; and 2) Mobile Broadcast/Multicast Service (MBMS), whitepaper by TELIASONERA, published at <<http://www.medialab.sonera.fi/workspace/MBMSWhitePaper.pdf>> and via ZDNET at <<http://whitepapers.zdnet.co.uk/0,39025945,60154728p-39000516q,00.htm>>. The MBMS service described in the above-referenced documents involves an IP datacast type of service that can be offered via, e.g., existing GSM and UMTS cellular networks. Among other things, the MBMS infrastructure allows for using an uplink channel for the interactions between a service and a user. In practice, multicast users need a return channel for the interaction procedures in order to be able to subscribe to certain desired services. Among other things, MBMS does not interfere with, e.g., already existing GSM and UMTS services, and mobile devices not supporting MBMS will work in networks that offer MBMS for customers with MBMS capabilities. Moreover, the MBMS infrastructure allows for a multicast mode that uses radio resources efficiently by using a common radio channel. Data can be transmitted over a multicast service area as defined by a network (e.g., a NIR in some embodiments herein). Among other things, multicast mode enables a network to selectively transmit to those cells within a multicast service area that contain members of a multicast group.

For illustrative purposes, FIG. 8(A) is an illustrative architectural diagram showing illustrative network interface repositories (NIRs) interfaced with an illustrative broadcast-multicast service center (BM-SC) according to some illustrative embodiments for implementing MBMS. Among other things, in some embodiments, while a CBC may operate in an open manner (e.g., even to non-subscribed users) and may not involve IP layer or layer 3 information processing, a BM-SC can operate in a closed manner (e.g., to subscribed users) and can involve IP layer or layer 3 information processing.

To facilitate reference, FIG. 8(B) schematically shows general architecture common to preferred implementations of embodiments shown in both FIGS. 1 and 8(A). As shown, the NIR system preferably communicates to a cellular operator network, via a controlling system or device, such as, e.g., a CBC or a BM-SC, which communicates with a radio access network via a core network in some illustrative embodiments. As would be appreciated, some illustrative radio access networks include, e.g., GRAN (GSM radio access network) and UTRAN (UMTS radio access network).

Additionally, in some preferred embodiments, a mobile device is configured so as to 1) store information about available networks and to 2) pick the available network that best meets the mobile's policy, such as, e.g., employing methods disclosed in U.S. patent application Ser. No. 11/161,775, entitled IP NETWORK INFORMATION DATABASE IN MOBILE DEVICES FOR USE WITH MEDIA INDEPENDENT INFORMATION SERVER), filed on Aug. 16, 2005, by the present inventor Raziq Yaqub, et al., the entire disclosure of which is incorporated herein by reference. Additionally, in some preferred embodiments, a mobile device is configured to be able to store and reuse the information received as needed. In some embodiments, a system can be provided wherein a cell broadcast is used in, e.g., GSM/UMTS coverage areas where MBMS is not supported, whereas a multicast can be used where MBMS is supported.

Illustrative Hybrid Mobile Stations:

In some embodiments, as under Section 5 of TR 23.882, which says: “[i]t shall be possible for the operator to provide the UE with access network information pertaining to locally supported 3GPP and non-3GPP access technologies”, as set forth above, a UE is configured so as to be capable of receiving/requesting information about access networks through, e.g., MBMS, CBC Cell Broadcast, and protocols defined by 802.21.

In this regard, one important matter in relation to TR 23.882 (System Architecture Evolution) is to support a variety of access systems including 3GPP and non 3GPP IP access systems. This brings into scope discovering available and/or supported networks in the vicinity of the UE. A review of TR 23.882 V1.2.2 reveals that Access Network Information Discovery is an open issue. As set forth in this application, this issue can be resolved by the following approaches:

Broadcast/Multicast-based Approach

According to 3GPP specifications, broadcasts are of following types:

1. Channel Broadcast via BCCH: wherein the Access System advertises the information of neighborhood cells of the same access technology to assist UEs in discovering neighborhood cells. This capability may be extended to advertise information pertaining to other Access Networks, however: this extension may be wasteful of radio resources for advertising/broadcasting large amounts of network information on broadcast control channels.

2. Cell Broadcast via CBC: wherein Access Networks information can be broadcast to all UEs within a particular cell based on location. This can be a better approach for some reasons; however, as discussed above, operators may not be interested in advertising the information to all/unauthenticated UEs.

3. Multicast via MBMS: wherein Access Networks information can be multicast to the targeted UEs (e.g., subscribed to the service) only. As described above, this may be a most desirable approach because, among other things, it will create a workable business case for operators.

Query-based Approach

In this case, the UE can be configured so as to be capable of accessing a “Database of Access Networks (DAN)” (preferably, this is accessible through any available Access Network), to fetch information relating to other Access Networks available in the neighborhood of the UE. As per embodiments described above, this approach requires an existing or new functional entity (such as, e.g., a NIR) capable of storing information of access networks, and capable of delivering this information to the UE over any available Access Network interface in response to UE queries.

Both of the above approaches for Access Systems Discovery have associated design considerations. In some preferred embodiments, a hybrid approach that combines aspects of broadcast or multicast approach (discussed above) and Query-based approach (discussed above) is provided.

In some preferred embodiments, to accomplish a hybrid approach, provisions in UE and the network should be made so that UE becomes capable of:

1. Receiving Primary Information about neighboring/supported networks (e.g., through receiving multicast as defined in 3GPP Technical Specifications on MBMS (e.g., 22.146, 23.246, etc.) or listening to Cell Broadcasts as defined in 3GPP Technical Specifications on CBS (e.g., 23.041, etc.).

2. Sending a query to the DAN to obtain Secondary or Additional Information (if needed) about the same networks using some standard protocols (e.g., as defined by IEEE 802.21).

3. UE should be made capable of accessing DAN from any available access network using existing interfaces (such as, e.g., S1-S5-Gi, or S2-Gi, or via BM-SC if DAN is outside 3GPP network).

In preferred embodiments, from available information, both Primary and Secondary information, UE will be able to select the most appropriate candidate network to handover to for session continuity.

For reference, FIG. 9 is a diagram showing a Long Term Evolution of 3GPP Radio Technology modified according to some embodiments herein, including some functional elements/interfaces related to such a hybrid system (e.g., DAN). Here, among other things, GERAN stands for GSM EDGE Radio Access Network; UTRAN stands for UMTS Terrestrial Radio Access Network; MME stands for mobility management entity; UPE stands for user plane entity; Inter AS Anchor stands for inter-access-system Anchor, etc., as set forth in 3GPP documentation. Reference is made to the 3GPP Web Site at <<http://www.3gpp.org/Highlights/LTE/LTE.htm>> which provides some general background. Among other things, the numerals S1 to S7 are described as:

-   -   S1: Core network to radio access network for transport of user         plane and control plane traffic.     -   S2: Non-3GPP-access-network (e.g., Wireless LAN) to core network         for user plane control and mobility support.     -   S3: GPRS-core to evolved-core network for user and bearer         information exchange during idle and/or active states.     -   S4: GPRS-core to evolved-core network for mobility support     -   S5: Mobility Management Entity/User Plane Entity to         Inter-access-system anchor for user plane control and mobility         support.     -   S6: Home Subscriber Server to evolved core network for transfer         of subscriber data (authentication and authorization).     -   S7: PCRF to Policy and Charging Enforcement Point for transfer         of quality of service and charging rules.         Broad Scope of the Invention:

While illustrative embodiments of the invention have been described herein, the present invention is not limited to the various preferred embodiments described herein, but includes any and all embodiments having equivalent elements, modifications, omissions, combinations (e.g., of aspects across various embodiments), adaptations and/or alterations as would be appreciated by those in the art based on the present disclosure. The limitations in the claims (e.g., including that to be later added) are to be interpreted broadly based on the language employed in the claims and not limited to examples described in the present specification or during the prosecution of the application, which examples are to be construed as non-exclusive. For example, in the present disclosure, the term “preferably” is non-exclusive and means “preferably, but not limited to.” In this disclosure and during the prosecution of this application, means-plus-function or step-plus-function limitations will only be employed where for a specific claim limitation all of the following conditions are present in that limitation: a) “means for” or “step for” is expressly recited; b) a corresponding function is expressly recited; and c) structure, material or acts that support that structure are not recited. In this disclosure and during the prosecution of this application, the terminology “present invention” or “invention” may be used as a reference to one or more aspect within the present disclosure. The language present invention or invention should not be improperly interpreted as an identification of criticality, should not be improperly interpreted as applying across all aspects or embodiments (i.e., it should be understood that the present invention has a number of aspects and embodiments), and should not be improperly interpreted as limiting the scope of the application or claims. In this disclosure and during the prosecution of this application, the terminology “embodiment” can be used to describe any aspect, feature, process or step, any combination thereof, and/or any portion thereof, etc. In some examples, various embodiments may include overlapping features. In this disclosure, the following abbreviated terminology may be employed: “e.g.” which means “for example.” 

1. A method for minimizing superfluous signaling traffic and for minimizing data processing pressures on a network including a network information repository (NIR), comprising: having mobile stations that enter a network domain compare and detect inconsistencies in network information related to heterogeneous networks including non-cellular networks received through different sources and report those inconsistencies to the NIR; having the NIR transmit said network information related to heterogeneous networks including non-cellular networks to a cellular network using a cell broadcast center; and having the cellular network broadcast or multicast the updated information for use by mobile stations prior to vertical handover to the heterogeneous networks.
 2. The method of claim 1, further including having the NIR receive only updated information about network elements of a domain through mobile stations that first discover whether network elements are attached or detached.
 3. The method of claim 1, further including having said NIR configured to store information about network elements mapped with geographical location coordinates.
 4. The method of claim 1, further including having said NIR maintain primary information and secondary information, wherein primary Information includes names and/or addresses of networks and/or network components, and wherein secondary information include network capabilities.
 5. The method of claim 4, wherein said primary information includes at least one of a network SSID, an IP address of a DHCP server, an IP address of an Access Point or an IP address of an Authentication Server, and wherein said secondary information includes at least one of the type of security protocols supported, the type of Internet protocols supported, support for QoS, support for interworking with other networks, existence of roaming relationship, names of roaming partners, pricing information, and/or services supported by the network.
 6. The method of claim 4, wherein the NIR is configured to transmit primary information pertaining to non-cellular networks for cell broadcast that is pushed to mobile stations in a given geographical area.
 7. The method of claim 6, wherein said cell broadcast provides for multitudes of broadcast channels with different types of messages broadcasted on different channels.
 8. The method of claim 7, further including having users of mobile stations initially subscribe to receive at least certain of said channels.
 9. The method of claim 8, further including activating at least some of said channels by users of mobile stations via their mobile stations or by the network remotely.
 10. The method of claim 7, further including having at least some of said channels are allocated for certain message types.
 11. The method of claim 10, further including having said message types standardized on a wide geographic area.
 12. The method of claim 1, further including having the NIR define a geographical area for the cellular network to which the information is to be broadcasted or multicasted to.
 13. The method of claim 1, further including having the NIR communicate with a plurality of cellular systems belonging to different network operators.
 14. The method of claim 1, further including having the NIR deliver secondary information to mobile stations that send inquiries to the NIR.
 15. The method of claim 1, further including having the mobile stations acquire primary information through cell broadcast or multicast and secondary Information through direct inquiry to the NIR about neighboring networks and their parameters ahead of time.
 16. The method of claim 1, further including having the NIR communicate a preferred time and a preferred timing at which message broadcast or multicast is desired.
 17. The method of claim 1, further including having the NIR categorize the messages based on time priority.
 18. The method of claim 1, wherein the mobile stations are configured to listen to broadcasts or multicasts to obtain primary information about network elements, and are configured to obtain secondary information about network elements by sending queries to the NIR.
 19. The method of claim 1, wherein the mobile stations are configured to listen to and to compare the broadcasts or multicasts received from cellular networks and beckons from non-cellular networks and to discern inconsistencies between the messages received.
 20. The method of claim 1, wherein the mobile stations are configured to pull secondary information from the NIR and to compare the pulled secondary information with that which it obtains after actually connecting to a candidate network and discerning inconsistencies between the messages received from the NIR and the actual candidate network.
 21. The method of claim 1, wherein said mobile station is configured to operate in an active mode wherein both primary inconsistencies and secondary inconsistencies are conveyed to an NIR, or in a passive mode wherein only primary inconsistencies are conveyed to the NIR.
 22. The method of claim 1, wherein the mobile station is configured to decide whether the primary information is enough for the mobile station's session continuity or whether it needs secondary information.
 23. The method of claim 1, wherein regardless of where a mobile station is located and which local network it is connected to, the mobile station uses the same protocols to communicate with the NIR to retrieve the desired information.
 24. The method of claim 1, wherein the mobile station is equipped with multiple interfaces, including WLAN and cellular interfaces.
 25. The method of claim 1, wherein a plurality of NIRs are connected to each other in a hierarchical manner with a highest level NIR connected to a cellular network.
 26. The method of claim 1, further including employing efficient query/response communications between a NIR and MSs based on use of message format hints such that a MS will send a query to a NIR only if the MS receives a hint in a broadcast or multicast that the NIR contains the desired information.
 27. The method of claim 1, wherein communication between a NIR and a MS using certain formats and/or codes triggers the MS to perform a specific task for the NIR. 