Methods and systems for accessing networks, methods and systems for accessing the internet

ABSTRACT

Systems and methods for providing network access, e.g. Internet access, are described. An architecture includes a host organization network through which network access is provided. The host organization network can be advantageously deployed in public areas such as airports and shopping malls. An authentication/negotiation component is provided for authenticating various users and negotiating for services with service providers on behalf of the system users. The authentication/negotiation component can include one or more specialized servers and a policy manager that contains policies that govern user access to the Internet. An authentication database is provided and authenticates various users of the system. An access module is provided through which individual client computing devices can access the Internet. In one embodiment, the access module comprises individual wireless access points that permit the client computing devices to wirelessly communicate data packets that are intended for the Internet. In one aspect, users are given a variety of choices of different service levels that they can use for accessing the Internet. The service levels can vary in such things as bandwidth allocation and security measures. The various service levels can be purchased by the users using their computing devices.

RELATED APPLICATION

[0001] This application is a continuation of and claims priority fromU.S. patent application Ser. No. 09/565,558, filed on May 5, 2000 which,in turn, claims priority from U.S. patent application Ser. No.09/511,171, filed on Feb. 22, 2000, the disclosures of which areincorporated by reference herein.

TECHNICAL FIELD

[0002] The present invention relates to methods and systems foraccessing networks. In particular, the invention relates to methods andsystems for accessing the Internet.

BACKGROUND

[0003] As network technologies continue to evolve, the possibility ofconnecting people and organizations together in more efficientarrangements grows. Networks such as the cellular phone networks giveindividuals the ability to move around freely, yet still communicateover the telephone with other individuals. For example, in the last fewyears the explosive growth of the use of cellular phones has increasedtremendously the ability of people to connect with other people from avariety of different locations (i.e. in the car, at a restaurant, in thesuper market). As societies become more and more mobile, new solutionsare required to satisfy the growing demands and needs of these mobileindividuals.

[0004] As one example, consider the traditional network paradigm forInternet access. Traditionally, there are a couple of different ways foran individual to access the Internet. First, the individual might have apersonal account with an Internet Service Provider (ISP) whereby theycan access the Internet through, for example, their home computer. Theirhome computer establishes a link with the ISP through a modem or specialcommunication line. Once the link is established, generally over a wiredline, they can typically use ISP-provided software to browse theInternet. In this example, an individual's Internet access is eithertied to their wired link provider, or to the ISP through which they havetheir account. Second, an individual might be able to access theInternet through a network that is provided and maintained by theiremployer. While they are at work, they can access the Internet throughthe use of employer-provided resources. In this example, an individual'sInternet access is tied to their employer and/or their employer'sresources.

[0005] Neither of these paradigms provides an individual with thefreedom to access the Internet from any location and without anydependence on a particular ISP or their company. Rather, Internetaccessibility for these individuals is necessarily tied to either orboth of (1) signing up for an account with a particular ISP for Internetaccess, or (2) being a member of a particular corporation through whichInternet access is provided. It would be desirable to eliminate thedependence of Internet access on either or both of these elements.

[0006] Presently, there is much enthusiasm around the impendingdeployment and availability of the so-called “third generation” (3G)wide-area cellular networks. These 3G wide-area cellular networks willgive individuals the ability to connect to other individuals, via acellular phone, from many different locations. Furthermore, thesenetworks will enable individuals to transmit and receive data packetswhich are necessary for Internet communications.

[0007] There are, however, limitations that are inherent with both thecurrent wide-area cellular networks and the future 3G wide-area cellularnetworks that make their use as an Internet connectivity medium lessthan desirable. For example, current wide-area data networks (e.g. whichuse a Ricochet modem from Metricom) support transmission rates that areabout 50 Kbps. In the next few years, when 3G wide-area cellularnetworks are available, the data packet transmission rates are expectedto go up to around 2 Mbps per cell size. Each cell is generally sizedbetween 1 to 2 miles in diameter, depending on where the cell islocated. A data rate of 2 Mbps per cell size means that the maximum datarate an individual in a cell can hope to get will be around 2 Mbps whenthere are no other individuals using the network. A more realisticscenario is the case where there are several hundred individuals in asingle cell. In this case, any individual might get only 100 to 150 kbpsof bandwidth for data transmission. This transmission rate isfrustratingly slow and will inevitably lead to customer dissatisfaction.

[0008] In the local area networking space (i.e. networking within abuilding or a home), transmission rates are as high as 11 Mbps today. Inthe near future, these rates are expected to go up to around 54 Mbps. Inthe more distant future (e.g. in about 5 years), this rate is expectedto be upwards of 100 Mbps. Thus, there is a disparity between local areawireless network (WLAN) system performance and wide area wirelessnetwork (WWAN) system performance in terms of access speeds. Using theabove transmission rates, it can be seen that the difference in systemperformance is about 25 times faster in WLANs than in WWANs.

[0009] This has led to a problem for which a solution has not yet beenfound. The problem concerns how to provide high speed Internet accessfrom all places beyond those traditionally in the domain of LANs (i.e.corporations and homes). For example, individuals often spend a greatdeal of time in public places such as airports, libraries, andrestaurants. Yet, Internet access is not typically provided in thesepublic areas. If Internet access is provided, it is typically tied to aparticular ISP and the consumer really has no choices whatsoeverconcerning such things as quality of service, type of service available,and the like.

[0010] Accordingly, this invention arose out of concerns associated withimproving network access so that a network, such as the Internet, can beaccessed from a variety of places or locations at high speeds. Inparticular, the invention arose out of concerns associated withenhancing Internet wireless connectivity speeds in the wide area.

SUMMARY

[0011] Various embodiments pertain to enhancing wireless functionality,and particularly to providing fast network access, e.g. Internet access,by pushing local area wireless network system performance andfunctionality into the wide area space. Wide area data networking datarates are much slower than local area data networking rates. Aspects ofthe described embodiments exploit the higher data rates that areavailable through the use of local area networks pushing thisfunctionality into the wide area space. Aspects of the describedembodiments have applicability in both wireless and wired networks.

[0012] In one embodiment, an architecture is provided, by one or morehost organizations, for providing individuals with fast wireless accessto the Internet. These networks are advantageously deployed in publicareas such as airports, shopping malls, libraries etc. The hostorganization may partition this network either physically, or logically,into several smaller networks called subnets. Each subnet may include aPANS (Protocol for Authentication and Negotiation of Services) Serverand a Policy Manager. A mobile user typically establishes acommunication link with the PANS server through an Access Point, andthereafter wirelessly transmits and receives data to and from theInternet via the PANS server. The positioning of the PANS server in thesubnet is such that data traffic from all users connected to this subnetgoes through this server before reaching any other network, includingthe Internet.

[0013] The PANS server is programmed to perform a number of differentfunctions in connection with providing network or Internet access. Inone embodiment, the PANS server ensures that users are authenticated tothe system before allowing them to send and receive data packets to andfrom the Internet. In one aspect, authentication takes place through theuse of an authentication database. In one embodiment, the authenticationdatabase is a globally accessible database and authentication takesplace in a secure manner between the client and the database (i.e. thePANS server is not privy to the exchange of the information duringauthentication). In another embodiment, the authentication database isavailable locally to the PANS server. After the global or the localdatabase authenticates the user, the user receives a unique token or keyfrom the PANS server. The user uses this token or key to identifyhimself or herself to the PANS server in all subsequent data packettransmissions. All user data packets containing this token or key,intended for the Internet, are allowed passage through the PANS server.

[0014] In one embodiment, the user is given various choices concerningInternet accessibility and the levels of service that are provided. Forexample, the PANS server is programmed, in some embodiments, tonegotiate with ISPs for Internet access on behalf of users that areunaffiliated with an ISP. A user can define the type of access they want(i.e. data rate, and perhaps the price they are willing to pay), and thePANS server handles negotiation with the ISPs on the user's behalf.

[0015] In another embodiment, the PANS server provides flexible levelsof security for the user or client. For example, each user or client canbe issued his or her own key, dynamically generated by the PANS server,for use in encrypting data packets that are transmitted to the PANSserver. Each key can be of an arbitrary length that is selectable by theuser or the PANS server. In addition, the PANS server can have a numberof different encryption algorithms from which to choose when a user isauthenticated. Thus, a user can be handed a key having an arbitrarylength, and a randomly selected encryption algorithm to use whenencrypting their data packets.

[0016] In another embodiment, the PANS server is programmed to accountfor the data packets that pass through it. Accounting for the datapackets assists the PANS server in charging clients for using thenetwork, e.g. on a per packet or a per byte basis, or a per transactionbasis. In addition, accounting for the data packets can help the PANSserver in scheduling data packets for transmission.

[0017] In another embodiment, the PANS server is configured to providethe user with an option to select a quality-of-service (QoS) level.Different costs can be associated with different QoS levels. Forexample, a premium level can provide the highest degree of security anda guaranteed amount of bandwidth. Other levels might provide lesserdegrees of security and lesser amounts of bandwidth. In one aspect, thehighest service level is available on a user-by-user basis whereindividual users have a guaranteed a fixed amount of bandwidth and avery high degree of security. Lesser levels of service are defined interms of groups, where each group contains a plurality of users.Bandwidth allocations in these groups take place on a group basis, withmembers of the groups having to arbitrate for use of the availableallocated bandwidth. Each user is thus assured of receiving a fair shareof the associated allocated bandwidth.

[0018] In another embodiment, dynamic compression is utilized to ensurethat data packets are transmitted in an optimal manner. In the describedwireless embodiment, the PANS server (or the client) monitors thewireless medium for transmission errors that might be caused by anobstruction in the line of sight between the client and an access point.Whenever a pre-determined number of errors are detected, measures aretaken to lessen the degree of compression that is utilized on the datapackets. When the errors abate, the degree of compression is increased.In effect, the amount of compression is modulated by the amount oftransmission errors that are detected during a sample period.

[0019] In another embodiment, a user interface is provided and providesfeedback to the user regarding their service level. Through theinterface, the user can adjust their quality of service level andobserve a feedback mechanism that confirms their quality of servicelevel, i.e. actual bandwidth provided by the network.

[0020] In addition to the PANS Server, there exists a Policy Managerwhich includes and manages various policies that determine the contextof a particular user's interaction with the network. For example, thePolicy Manager can define the level of service that a user receives,control access to host organization's resources such as printers and faxmachines etc., and the like. The Policy Manager and the PANS server arecommunicatively linked so that the PANS server can enforce the policiesfrom the Policy Manager on a per user and per connection basis.

BRIEF DESCRIPTION OF THE DRAWINGS

[0021]FIG. 1 is a high level diagram of an exemplary system architecturein accordance with one embodiment.

[0022]FIG. 2 is a diagram of a computer system that can be used toimplement various aspects of various embodiments.

[0023]FIG. 3A is a high level diagram of an exemplary wireless systemarchitecture in accordance with one embodiment.

[0024]FIG. 3B is a high level diagram of an exemplary wireless systemarchitecture in accordance with one embodiment.

[0025]FIG. 4 is a flow diagram that describes steps in a method inaccordance with one embodiment.

[0026]FIG. 5 is a flow diagram that describes steps in a method inaccordance with one embodiment.

[0027]FIG. 6 is a diagram of an exemplary user display in accordancewith one embodiment.

[0028]FIG. 7 is a diagram that illustrates an exemplary quality ofservice embodiment.

[0029]FIG. 8 is a flow diagram that describes steps in a method inaccordance with one embodiment.

[0030]FIG. 9 is a flow diagram that describes steps in a method inaccordance with one embodiment.

[0031]FIG. 10 is a flow diagram that describes steps in a method inaccordance with one embodiment.

[0032]FIG. 11 is a diagram of an error table that is utilized inaccordance with one embodiment.

[0033]FIG. 12 is a diagram of a graphic user interface (GUI) inaccordance with one embodiment.

DETAILED DESCRIPTION

[0034] Overview

[0035] In the described embodiments, systems and methods are providedfor enhancing network access, e.g. Internet access, from any number ofpotential locations that are not necessarily the traditional LANlocations, i.e. corporations or homes. Individual users are given theopportunity to be mobile, yet connect with the Internet using a veryhigh speed location. In addition, users can be given various choicesthat impact the level of service they are provided and the cost they arecharged for such service. Users can pay for such services by anysuitable method such as a credit card or a smart card based purchasingsystem. Access is no longer necessarily tied inextricably to aparticular employer or a particular ISP. In various embodiments,flexibility and speed are enhanced through the incorporation of a hostorganization network that makes use of wireless communication. Usersusing mobile computing devices can wirelessly logon onto the network andaccess the Internet. In the described embodiment, interfacing that takesplace with the user can be implemented as Web-based interfacing.

[0036]FIG. 1 shows a high level system diagram of an exemplary systemarchitecture generally at 100 that is capable of implementing variousfeatures described below. Architecture 100 is used in connection with acomputer network an exemplary one of which is the Internet 102. One ormore host organization networks 104 are provided and are managed by ahost organization. Examples of a host organization include individualbusinesses that might, for example, be located in a public area.Exemplary public areas include shopping malls, libraries, airports,downtown shopping areas and the like. So, for example, the leftmost hostorganization network 104 might be located in a shopping mall, while therightmost host organization network might be located in an airport. Aplurality of service providers can be incorporated in the architecture100. In this example, the service providers control access to theInternet and comprise a plurality of different Internet ServiceProviders (ISPs) 105 that are communicatively linked with the hostorganization network 104. Each host organization network 104 can includeone or more resources 106. Exemplary resources can include, withoutlimitation, scanners, tape drives, laser printers, and the like. Eachhost organization network 104 might also include a local authenticationdatabase 108 for purposes that will be described below.

[0037] An authentication/negotiation component 110 is provided and isassociated with each host organization network 104. Although theauthentication/negotiation component 110 is shown as a combinedcomponent, it will be appreciated that component 110 can be programmedto implement only one of an authentication or negotiation function. Eachof the components 110 is programmed/configured to perform variousfunctions that relate to providing users with network access. Exemplaryfunctions include authenticating the users, verifying the users duringsubsequent communication, and negotiating various services from variousservice providers for the user. In one particular embodiment, theverification function is performed by a verification module that ispositioned at each access module 112. Providing a verification module ateach access module is advantageous for quickly detecting rogue userswithout allowing them any access further up the architecture chain. Aswill be discussed below in more detail, the components 110 cannegotiate, on behalf of the users, with the different ISPs 105 forInternet access. In some embodiments, the users are given choices as todifferent levels of service that they can be provided. The levels ofservice can be associated with different fees that the user is charged,and can include different bandwidth allocations, security measures, andISPs. These choices are then used by the authentication/negotiationcomponents 110 to negotiate a desired level of service from one or moreservice providers, e.g. ISPs 105.

[0038] The architecture also includes a plurality of access modules 112that are configured to enable a user to access theauthentication/negotiation component 110. Although only one accessmodule is shown for each authentication/negotiation component 110, morethan one access module 112 can be provided for eachauthentication/negotiation component 110. Architecture 100 can alsoinclude a global authentication database 114 that is configured to beglobally accessible from anywhere in the world. In the illustratedexample, the global authentication database includes not only arepository of data or information that is used to authenticate users,but also any server computers or computing devices that are used inconnection with the data repository to authenticate a user. The globalauthentication database 114 is advantageously accessible via theInternet 102. The global authentication database 114 can be any suitableglobally accessible database that is capable of authenticating users asdescribed below. Such databases can be operated by and/or associatedwith particular businesses, organizations or clubs for whichauthentication is desired. For example, a particular organization, e.g.Gold Club Frequent Fliers, may have negotiated withauthentication/negotiation component 110 for Internet access for itsmembers. When the members access the network 112 through the accessmodule 112, there needs to be a way to authenticate these Gold ClubFrequent Flyer members so that they can be provided Internet access atthe negotiated level. The global authentication database 114 provides amechanism by which this can be done, as will become apparent below.Alternately, the global authentication database 114 can be a moregeneralized database that can be operated on behalf of manyorganizations or businesses that might want to generally authenticateusers. An example of this type of global authentication database isMicrosoft's Passport Server and database. The MS server and databaseenable a user to be individually verified against information that ismaintained by the server and database. Often times, this type ofverification is conducted outside of the purview of other servers in anend-to-end secure fashion.

[0039] In the illustrated example, users can access the Internet throughthe use of a client computer or computing device. In the context of thisdocument, a “user” refers to a human individual and a “client” refers toa computer or computing device that the human individual uses to accessthe Internet. The client can be a mobile computer such as a lap topcomputer, or can be any other suitable computing device. The client canbe provided by the host organization, or can be a mobile computingdevice that travels with its particular user. When a user wishes toaccess the Internet, they simply use their client computer to interfacewith an access module 112. The access module permits communication withthe authentication/negotiation component 110. Authentication/negotiationcomponent 110 first authenticates the user by using one of the local orglobal authentication databases 108, 114 respectively. In the describedembodiment, authentication takes place outside of the purview of theauthentication/negotiation component 110. For example, when the globalauthentication database 114 is used, the authentication/negotiationcomponent 110 permits the user to communicate directly with the database114. This communication can advantageously take place using theInternet. In some embodiments, limited access to the Internet can begranted by the authentication/negotiation component 110 for the limitedpurpose of authenticating a user. After a limited period of time, if theuser has not been authenticated, Internet access can be terminated. Forexample, an IP address might be temporarily granted to a user via a DHCPor NAT process. If the user has not authenticated themselves within adefinable period of time (e.g. ten minutes), their internet access canbe terminated. The database 114 takes the user through a separateauthentication process (e.g. entry of a user name and password) so thatthe user can be authenticated to the database 114. This authenticationprocess can be a protected end-to-end secure process in which all of theuser's transmissions to the database 114 are encrypted from the clientmachine and can be only decrypted by the database 114. An exemplaryencryption technique is Secure Socket Layer (SSL) transmission. Othersecure techniques can be used. This communication is secure from theauthentication/negotiation component 110 and the host organizationnetwork 104.

[0040] Once the user is authenticated to the global authenticationdatabase 114, the database 114 generates a message to the hostorganization network 104 and informs the host organization network thatthe particular user has been authenticated. After the authentication hasoccurred, all communication with and access to the Internet takes placethrough the authentication/negotiation component 110. That is, all ofthe data packets that are transmitted from and received by the clientare routed through the authentication/negotiation component 110.

[0041] An advantageous feature of the above architecture is that itenables a user to freely move about from host organization to hostorganization, without having their Internet access inextricably tied toany one particular ISP or to a particular company such as theiremployer. This system permits a much more individual-centric system thatpromotes user mobility, as will become apparent below. Another advantageof this architecture is that once a user is authenticated, they can movefreely about without having to re-authenticate themselves to the system.Another advantageous feature of the above architecture is that users canhave freedom of choice. That is, the authentication/negotiationcomponent can be programmed to negotiate for services on behalf of theuser. For example, a host organization network might have a number ofdifferent ISPs (e.g. AT&T, MCI, Sprint and the like) that are undercontract to provide Internet access. A user can specify a particularlevel of service (i.e. transmission rate and desired cost structure).The authentication/negotiation component then negotiates the desiredservice level with the particular ISPs. Thus, a user can receive thebest deal for their desired parameters. As an example, a particular usermay be in a rush (i.e. between flights in an airport) and may need tohave the fastest Internet access that is possible. Further, they may bewilling to pay a top premium for such access. Once theauthentication/negotiation component 110 is notified of theseparameters, it can then find the ISP that most closely meets the user'sparameters.

[0042] Exemplary Computer System

[0043]FIG. 2 shows an exemplary computer system that can be used toimplement various computing devices, i.e. client computers, servers andthe like, in accordance with the described embodiments.

[0044] Computer 130 includes one or more processors or processing units132, a system memory 134, and a bus 136 that couples various systemcomponents including the system memory 134 to processors 132. The bus136 represents one or more of any of several types of bus structures,including a memory bus or memory controller, a peripheral bus, anaccelerated graphics port, and a processor or local bus using any of avariety of bus architectures. The system memory 134 includes read onlymemory (ROM) 138 and random access memory (RAM) 140. A basicinput/output system (BIOS) 142, containing the basic routines that helpto transfer information between elements within computer 130, such asduring start-up, is stored in ROM 138.

[0045] Computer 130 further includes a hard disk drive 144 for readingfrom and writing to a hard disk (not shown), a magnetic disk drive 146for reading from and writing to a removable magnetic disk 148, and anoptical disk drive 150 for reading from or writing to a removableoptical disk 152 such as a CD ROM or other optical media. The hard diskdrive 144, magnetic disk drive 146, and optical disk drive 150 areconnected to the bus 136 by an SCSI interface 154 or some otherappropriate interface. The drives and their associated computer-readablemedia provide nonvolatile storage of computer-readable instructions,data structures, program modules and other data for computer 130.Although the exemplary environment described herein employs a hard disk,a removable magnetic disk 148 and a removable optical disk 152, itshould be appreciated by those skilled in the art that other types ofcomputer-readable media which can store data that is accessible by acomputer, such as magnetic cassettes, flash memory cards, digital videodisks, random access memories (RAMs), read only memories (ROMs), and thelike, may also be used in the exemplary operating environment.

[0046] A number of program modules may be stored on the hard disk 144,magnetic disk 148, optical disk 152, ROM 138, or RAM 140, including anoperating system 158, one or more application programs 160, otherprogram modules 162, and program data 164. A user may enter commands andinformation into computer 130 through input devices such as a keyboard166 and a pointing device 168. Other input devices (not shown) mayinclude a microphone, joystick, game pad, satellite dish, scanner, orthe like. These and other input devices are connected to the processingunit 132 through an interface 170 that is coupled to the bus 136. Amonitor 172 or other type of display device is also connected to the bus136 via an interface, such as a video adapter 174. In addition to themonitor, personal computers typically include other peripheral outputdevices (not shown) such as speakers and printers.

[0047] Computer 130 commonly operates in a networked environment usinglogical connections to one or more remote computers, such as a remotecomputer 176. The remote computer 176 may be another personal computer,a server, a router, a network PC, a peer device or other common networknode, and typically includes many or all of the elements described aboverelative to computer 130, although only a memory storage device 178 hasbeen illustrated in FIG. 2. The logical connections depicted in FIG. 2include a local area network (LAN) 180 and a wide area network (WAN)182. Such networking environments are commonplace in offices,enterprise-wide computer networks, intranets, and the Internet.

[0048] When used in a LAN networking environment, computer 130 isconnected to the local network 180 through a network interface oradapter 184. When used in a WAN networking environment, computer 130typically includes a modem 186 or other means for establishingcommunications over the wide area network 182, such as the Internet. Themodem 186, which may be internal or external, is connected to the bus136 via a serial port interface 156. In a networked environment, programmodules depicted relative to the personal computer 130, or portionsthereof, may be stored in the remote memory storage device. It will beappreciated that the network connections shown are exemplary and othermeans of establishing a communications link between the computers may beused.

[0049] Generally, the data processors of computer 130 are programmed bymeans of instructions stored at different times in the variouscomputer-readable storage media of the computer. Programs and operatingsystems are typically distributed, for example, on floppy disks orCD-ROMs. From there, they are installed or loaded into the secondarymemory of a computer. At execution, they are loaded at least partiallyinto the computer's primary electronic memory. The invention describedherein includes these and other various types of computer-readablestorage media when such media contain instructions or programs forimplementing the steps described below in conjunction with amicroprocessor or other data processor. The invention also includes thecomputer itself when programmed according to the methods and techniquesdescribed below.

[0050] For purposes of illustration, programs and other executableprogram components such as the operating system are illustrated hereinas discrete blocks, although it is recognized that such programs andcomponents reside at various times in different storage components ofthe computer, and are executed by the data processor(s) of the computer.

[0051] Exemplary System Architecture

[0052]FIG. 3A shows an exemplary system architecture 100 that includes awireless network feature. Although the discussion that follows is in thecontext of a network that includes the illustrated wireless feature, itis to be understood that the system architecture could, alternately,employ a wired network in substitution for the wireless network featurethat is described below. In the discussion that follows, like numeralsfrom the FIG. 1 example are utilized where appropriate, with differencesbeing indicated with the suffix “a” or with different numerals.

[0053] In the illustrated example, multiple wireless nodes are provided.Each wireless node is constituted by an individual client. In theexample, two clients or wireless nodes are shown, although in actuality,many wireless nodes would typically be employed. Each client computertypically has a network card installed therein which permits wirelesscommunication. The wireless communication takes place through the use ofknown wireless techniques that will be apparent to those of skill in theart. Accordingly, these techniques are not discussed further. The clientcan comprise any suitable computing device which, in this example, isconfigured for wireless communication. Each of the wireless nodes isconnected through an access module 112 a. In the wireless example, eachaccess module 112 a comprises one or more access points 306 that permitwireless access in known ways using known protocols. In the illustratedexample, all the access points 306, for a particular access module 112a, together constitute a single wireless subnet. This is advantageousfrom the network standpoint because of routing issues. For example,every subnet on the Internet is identified by a unique number. Everyclient connected to this subnet uses this number as part of its ownunique identification. In the Internet, a subnet number is an integralpart of the client's unique IP address. Various routers that are used inthe network environment use the subnet portion of the IP address todetermine where to route various data packets. When a client changes itssubnet, its IP address also changes. By having all of the access points306 in an access module that is associated with a single subnet, anindividual is free to move between access points of the same subnetwithout having to change their IP address. This is particularlyadvantageous when the host organization network is located in a publicplace. For example, an individual may be traveling through a largeairport in which a host organization network has been deployed. They mayuse a particular access point to access the Internet immediately upondisembarking from a plane. The individual can continue to stay connectedto the Internet even as they move into different locations of theairport serviced by different access points 306. Because the user stillaccesses the Internet through the same wireless subnet, they need not beissued a different IP address. This further enhances the robustness andspeed of the system. Access module 112 a may or may not communicatewirelessly with authentication/negotiation component 110 a.

[0054] Authentication/Negotiation Component

[0055] In the illustrated example, authentication/negotiation component110 a comprises a server 302 (referred to herein as a “Protocol forAuthentication and Negotiation of Services” or “PANS” server) and aPolicy Manager 304. The PANS server 302 may or may not be configured toreceive wireless communication from access module 112 a. Theauthentication/negotiation component 110 a is communicatively linkedwith the host organization network 104. Any suitable communication linkcan be used. In various embodiments, such link can comprise a high speedwired connection or a wireless connection. The host organization network104 is communicatively linked to the Internet 102 and, in someembodiments to ISPs 105 through conventional network systems.

[0056] The PANS server 302 is a software component that is designed toimplement various functionalities that are described below. In theillustrated example, the PANS server 302 is programmed to handle all ofthe authentication issues and the negotiation of services for aparticular user. In operation, all of a user's Internet data packettraffic (to and from) is routed through the PANS server 302. This isadvantageous for a number of different reasons among which are includeddata packet accounting (e.g. for billing purposes), and traffic control(e.g. for administering user-selected quality of service levels).

[0057] The Policy Manager 304 is a software component that isresponsible for managing the various policies that are used by the PANSserver 302 in providing services to the different clients. The PolicyManager 304 can contain one or more policy tables that define variousresource access policies (e.g. which users can access local resources106 and what is the level of access), network access speeds, securitylevels and the like. For example, a corporation such as Microsoft mightnegotiate a service package with a particular host organization networkthat has a wireless network with Internet access deployed in theSeattle-Tacoma (SeaTac) airport. The negotiated package provides thatfor any Microsoft employee, the host organization would allow, free ofcharge, a certain service level. Service levels above the negotiatedservice level may cost the employee a nominal charge. The Policy Manager304 then maintains an entry in its policy table that indicates thatMicrosoft employees are to be granted free access to the hostorganization's network at the negotiated level. Accordingly, when anyMicrosoft employee logs onto the SeaTac network, the Policy Manager 304indicates to the PANS server 302 that access for this user at thenegotiated service level is to be free of charge. Accordingly, the PANSserver 302 interacts with the Policy Manager 304 to decide which of theclient's packets will be allowed passage to the Internet and how theywill be scheduled for transmission. In addition, data packets from theclient also pass through the PANS server 302 before they are allowed tobe transmitted to the host organization's network, e.g. the hostorganization's intranet.

[0058] In one aspect, the Policy Manager 304 is a distributed PolicyManager where the policies that are provided by the Policy Manager arenot locally verifiable. As an example, consider the following: ThePolicy Manager 304 can contain many different policies that govern orregulate Internet access for many different classes of individuals. Forexample, Boeing may have negotiated for a quality of service level 1(discussed below in more detail) for all of its employees. There mayalso be a policy that governs or regulates Internet access for membersof certain clubs, i.e. the Gold Club Frequent Fliers. Having to locallyverify the authenticity of users claiming to be Boeing employees and/ormembers of the Gold Club Frequent Fliers could be a daunting task,although it could be done. A much better approach is to verify theauthenticity of these users using one or more globally accessibleauthentication databases. For example, both Boeing and the Gold ClubFrequent Fliers may have their employees (members) registered with acentral globally accessible authentication database such as MS Passport.In this case, when a user logs into the system, theauthentication/negotiation component 110 a passes the user to thedatabase, e.g. via a hyperlink, for authentication. After the user isproperly authenticated, the authentication/negotiation 110 a providesInternet access at the negotiated service level. In some embodiments,and particularly where a user may be a member of more than one club ororganization for which a service level has been negotiated, theauthentication/negotiation component 110 a can select the club ororganization that provides the better quality of service level for theuser. The authentication/negotiation component 110 a can then pass theuser to the appropriate authentication database so that the user can beauthenticated for the particular selected club or service level. Onceauthenticated for the particular club or service level, Internet accesscan be provided by the authentication/negotiation component 110 a inaccordance with the negotiated service level.

[0059] The authentication/negotiation component 110 a can also include(although it is not specifically shown) a dynamic host configurationprotocol (DHCP) server that is responsible for issuing and managing IPaddresses. DHCP servers are known and will not be further discussedherein. Alternatively, the authentication/negotiation component 110 acan include a Network Address Tranlator (NAT) software module. NAT isresponsible for issuing private addresses to clients and thentranslating these to public routable IP addresses. NAT is also known andwill not be further discussed herein.

[0060] In the illustrated example, a global authentication database 114a is provided in the form of Microsoft's Passport Server. As pointed outabove, any suitable global database can be used. This globalauthentication database 114 a can comprise multiple different machinesthat are located globally around the world. The database is used, in oneembodiment, to authenticate users as will be described in the“Authentication” section just below.

[0061] Alternate Architecture

[0062]FIG. 3b shows an alternate architecture in which the hostorganization subnet comprises a authentication/negotiation component 110b that includes a PANS Authorizer 302 b and a policy manager 304 a. ThePANS Authorizer 302 b authenticates users just as described above. Inthis particular architecture, the verification functionality is shiftedto the access modules 112 b in the form of a PANS verifier module 308that resides at one or more of the access points of the access module.In the illustrated example, a PANS verifier 308 resides at each of theaccess points. The advantages of providing a PANS verifier at eachaccess point include the detection of rogue users early on before theyaccess the system. That is, once a user is authenticated, the PANSAuthorizer 302 b passes the verification function to the PANS verifier308 at one or more of the access points. Thus, whenever a user attemptsto send a data packet to the Internet, they are verified at the accessmodule before the packet is transmitted to theauthentication/negotiation component 110 b. If a rogue user attempts totransmit an unauthorized packet, the packet can be detected very earlyin the architecture chain.

[0063] Authentication

[0064] In the described embodiment, individual authentication isprovided for each of the users. This can be done in a manner that isindependent of any affiliation that the user might have, such as anemployer affiliation or an ISP affiliation, thus providing anindividual-centric approach to authentication. In this example, a useris simply authenticated to the system architecture. The systemarchitecture then takes over and provides the user with differentoptions for accessing the Internet.

[0065]FIG. 4 is a flow diagram that describes steps in an authenticationmethod in accordance with the described embodiment. The description thatis given just below is given in the context of the architecture that isshown in FIG. 3A.

[0066] Step 400 establishes a link between a user and an access point306. This step can be accomplished by a user physically traveling to alocation that is within transmission range of the access point. As anexample, a shopping mall owner might have a deployed wireless networkthat includes one or more access points 306. A user might bring theirown configured computing device (i.e. laptop) to the mall, or might usea mall-provided computing device. The user then establishes a wirelesscommunication link with the access point 306. The wireless link can beestablished through the use of any suitable techniques. Thecommunication link need not, however, be a wireless link as pointed outabove.

[0067] Once the link is established, step 402 displays a user interfaceunder the influence of a browser that is executing on the clientcomputing device. The user interface welcomes the user to the wirelessnetwork and provides a mechanism through which the user can beauthenticated to the system. This can be done in a number of differentways. For example, the user may click on an icon to see a list of memberorganizations for which various service levels have been previouslynegotiated. The user then selects one or more of the organizations towhich they belong. The authentication/negotiation component 110 a canthen select a user-designated organization whose plan offers the bestInternet access and then authenticate that user for that particularorganization as described above.

[0068] Any suitable authentication method can be used. In theillustrated example, it has been found particularly advantageous toauthenticate the user in a manner that provides end-to-end securitybetween the user and the authenticating entity. In this example, aglobal authentication database 114 a is utilized as the authenticatingentity to authenticate the user. Accordingly, step 404 provides a securelink between the user or client machine and the global authenticationdatabase 114 a. The secure link can be established by having the userclick on a browser page icon that links the user to the authenticationdatabase 114 a. One example of a secure link can be one that isestablished through the use of Secure Socket Layer (SSL) techniques. Byauthenticating the user in this manner, the user's authenticationinformation is encrypted before it leaves the client machine. This meansthat the authentication/negotiation component 110 a is unable toascertain any of the user's authentication information, e.g. the user'spassword and the like. This provides a very high degree of security andgreatly reduces the chances that a user's protected information will becompromised. The user's information can then only be decrypted by theauthenticating authority which, in this example, is the MS PassportServer 114 a. Authenticating the user in this manner greatly improvesupon systems that authenticate a user by serving as a proxy for theuser.

[0069] Once a secure link is established between the user and the globalauthentication database, step 406 authenticates the user to the globalauthentication database. This step can be implemented by displaying asuitable logon web page for the user in which they provide their username and password for the global authentication database. Once theglobal authentication database confirms the user's information, the useris authenticated.

[0070] At this point, when the user has been authenticated to the globalauthentication database, communication can now take place in thebackground between the global authentication database 114 a and the PANSserver 302. Specifically, step 408 notifies theauthentication/negotiation component 110 a, i.e. the PANS server 302,that the user has been authenticated. This step can be implemented byhaving the global authentication database generate a message and send itto the PANS server 302. Once the PANS server receives the notification,it can then, if necessary, receive any additional information about theuser that it needs. For example, the global authentication database 114a might contain the user's credit card information or other informationthat can be utilized to bill the user (e.g. billing address etc.).Accordingly, step 410 determines whether any additional information isneeded about the particular user. If additional information is needed,then the PANS server 302 receives the information (step 412) from theglobal authentication database 114 a. If no additional information isneeded, or in the event that any needed information is received, step414 generates a unique token for the user. In the illustrated anddescribed example, the PANS server 302 generates a unique token or keyfor each of the individual users. Step 416 then provides the user tokenor key to client machine for use during the user's session.Specifically, the token or key is used by the client computer each timea data packet is sent to the Internet via the PANS server 302. The tokenor key assists the PANS server 302 in identifying data packets fromauthenticated users. Specifically, the PANS Server 302 maintains a listof tokens that have been distributed to authenticated users. Onreceiving a data packet with an embedded token, the PANS server 302checks the list to determine whether a particular token is valid. If atoken is determined to be invalid, then the PANS server 302 can refuseto further transmit the data packet into the Internet or the hostorganization's intranet. The PANS server 302 can be used to allow onlythose data packets which contain a valid token.

[0071] As a further added degree of security, each token or key that isused by a particular user is encrypted so that unscrupulous users cannotsteal another user's token. In this example, only the client computerand the PANS server know the particular user's token or key. Anysuitable encryption techniques can be used to encrypt the user's token.

[0072] Security

[0073] In addition to providing end-to-end security, as in the case ofuser authentication, other additional security measures can be providedto protect the communication that takes place between the PANS server302 and the client.

[0074] In the described embodiment, after the user is authenticated, thePANS server 302 can issue the user a key. Advantageously, each user isissued a different key. This key can be transported to the user usingsecure transport protocols, e.g. https. The client then adds this key toeach outgoing data packet, uses the key to encrypt the resulting packet,and then transmits it to the PANS server 302. On receiving the encrypteddata packet, the PANS server decrypts the packet and checks the embeddedkey for validity. If the key is valid, the PANS Server 302 removes thekey from the data packet, and then passes the data packet on to theInternet. If the PANS server 302 finds a invalid key in the packet, itsimply drops the packet without forwarding it on to the Internet. Theability of the PANS server 302 to dynamically generate a key for eachuser constitutes an improvement over other network systems that utilizea fixed number of keys for a variable number of users. In those systemsthere might be, for example, four or five keys that are allocated foruse among numerous different users. Thus, a plurality of different userswill use the same key to encrypt their data. If one of the fixed keys isbroken for one particular user, then the data that is associated withall of the other users who share that key can be compromised as well. Inthe present case, breaking the key for one user carries with it noimplications insofar as other users are concerned.

[0075] In another aspect, the keys that are issued by the PANS server302 can have an arbitrary length. For example, key lengths can beselected to be 40 bits, 128 bits, or 256 bits in length. Selection ofthe key length might take place randomly. Alternately, a user may beable to select the length of key that is used. Alternately, the usermight select from a number of quality of service levels that eachprovide different length keys in accordance with varying degrees ofsecurity. For example, a user may have information that is onlygenerally sensitive. In that case, a smaller key length may be in orderto protect the information. Alternately, a user might have informationthat is highly sensitive. In this case, a longer key length may be inorder. As will be appreciated by those skilled in the art, the length ofa key is proportional to the computational overhead that is necessary toprocess the key. The same relationship holds true for the computationaloverhead that is required to break the key. In one aspect, the user maybe presented with different payment options that are associated with thevarying degrees of security. For example, for a small fee, a key lengthof 40 bits might be purchased. For a somewhat larger fee a 128-bit keymight be purchased. For an even larger fee, a 256-bit key might bepurchased. Thus, in this example, a user can purchase various degrees ofsecurity that protect their communication with the PANS server.

[0076] In yet another aspect, varying degrees of encryption can beprovided to further enhance security. In this case, a user might be ableto select from among options that provide for no encryption to a veryhigh level of encryption. For example, the highest level of encryptionmight involve encrypting an entire data packet. A lesser level ofencryption might involve encrypting only the header of each data packetor only a portion of the body of each data packet.

[0077] In yet another aspect, flexible security measures are provided inthe form of multiple different encryption/decryption algorithms that areavailable for selection by the PANS server 302. For example, the PANSserver 302 may have a number of different encryption algorithms, e.g.,five or six different encryption algorithms from which it can select.When the server issues a key to a user or client, it can also designatewhich of the five or six algorithms to use for encryption. Thus, theserver 302 can randomly assign an encryption algorithm to the client. Inone aspect, the different encryption algorithms might be differentlypriced depending on the complexity of the encryption. In this case, thedifferent encryption algorithms might be incorporated in the differentservice level packages that are discussed in more detail below.

[0078] Each of these additional aspects provides a robust securityenvironment for the communication that takes place between the clientand the PANS server 302. In the wireless embodiment this is particularlyadvantageous because of the openness with which the communicationbetween the client and the PANS server 302 takes place, and itssusceptibility to eavesdropping. One or more of these additional aspectscan be combined for a particularly robust combination of securitymeasures. For example, in addition to each user having a randomlygenerated key, certain users may have a key length of 40 bits, whileother users have a key length of 128 bits. Further, users may also, inaddition to having variable length keys, have different encryptionalgorithms as between them. Further, the different security measures canbe grouped into different quality of service levels that can bepurchased by a user, as will be discussed below in more detail.

[0079]FIG. 5 is a flow diagram that describes steps in a securityprocess in accordance with the described embodiment. The processing thatis described just below further embellishes steps 414 and 416 of FIG. 4.Various steps that are described by FIG. 5 are implemented by the PANSserver 302 and the client. FIG. 5 designates the steps that areperformed by the PANS server 302 by setting them forth on the left sideof the flow diagram. Likewise, the steps that are performed by theclient are set forth on the right side of the flow diagram.

[0080] Step 500 presents one or more security options to a user. This isdone by displaying on the client machine a page that specifies thevarious security options. For example, a user may elect to use nosecurity or may select from among a number of different levels ofsecurity. FIG. 6 shows an exemplary page 600 that can be displayed onthe client machine. There, a user is given an opportunity to select fromamong a number of different key lengths. Page 602 shows another securityoption that enables a user to select the number of encryption algorithmsfrom which a single algorithm will be selected for use. The key length,number of encryption algorithms, and encryption level (header onlyversus entire packet) can be tied to a fee that is paid by the user.

[0081] Step 502 selects a security option. Step 504 determines whichsecurity option has been selected by the user. Once the PANS server 302determines the security option, step 506 generates a key and step 508issues the key to the user or client machine using a secure httpssession. When the key is issued to the user, if appropriate, the clientmachine will also be notified as to which particular encryptionalgorithm to use in connection with the issued key. Step 510 receivesthe issued key. Subsequently, each time the client machine generates adata packet, this key is added to the packet and the resulting packet isencrypted with the key (step 512). Step 514 then transmits the encrypteddata packet to the PANS server 302. Each data packet that is received bythe PANS server is then decrypted, the key is extracted and checked forvalidity. If the key is valid the packet is allowed passage into thehost organization's Intranet or into the Internet as appropriate.

[0082] Quality of Service

[0083] In one embodiment, multiple service levels are provided and areavailable to each user. A user can be given an opportunity to purchase acertain service level. Alternately, the user might be a member of one ormore organizations that have arranged for a certain service level onbehalf of their members.

[0084] Each service level can provide the user with a bundle of servicesthat fit that particular user's needs. Each service level can have oneor more services associated with it. These services can be provided invarying degrees between the different service levels. As an example,consider that there are three service levels that are available to auser—Level I (premium service), Level II (enhanced service) and LevelIII (basic service). The premium service level is the most expensive,followed by the enhanced service level and the basic service level.

[0085]FIG. 7 diagrammatically illustrates the three exemplary servicelevels. In this particular example, the Level I premium service isprovided to individual users on a per node (per user) basis. In thisexample, each of the individual users is guaranteed a certain portion ofbandwidth for their data packet transmissions. In addition, the servicelevel can have a degree of security associated with it. In this example,the premium service level might have the highest degree of security,examples of which are given above in the “Security” section. Each of theadditional service levels (enhanced and basic) is provided on a classbasis. That is, users that opt to purchase or are provided these levelsof service are aggregated into a user group. Each user group is thenassigned a portion of bandwidth and perhaps a security degree. Eachgroup is then responsible for arbitrating amongst its members for theavailable bandwidth. In this example, the enhanced Level II servicegroup has a smaller number of group members than the basic Level Iservice group. In the illustrated quality of service embodiment, eachuser is given a fair share of the available bandwidth.

[0086] As an example, consider that in exchange for paying a servicefee, Level I users are given individual reservations slots thatindividually guarantee an amount of bandwidth, e.g. 200 Kbps. Level IIusers, as a group, also receive a guarantee of available bandwidth, e.g200 Kbps. The individual group members must, however, allocate thebandwidth between them when it is their turn to transmit their datapackets. Level III users receive the same guarantee as the Level IIusers, except that there are more users that must arbitrate foravailable bandwidth.

[0087] The inventive scheduling techniques provide a user-basedscheduling system that greatly improves upon previously-used“flow-based” scheduling. In flow-based scheduling, streams of packets or“flows”, are received from several computers. The flows typicallyoriginate from different applications. A single user may be executingmore than one application that is producing and consuming a flow. Arouter typically evaluates the flows that it receives, and then attemptsto allocate a fair share of the bandwidth among the different flows.Flow-based quality of service systems emphasize the flows and do notregard the source of the flows. For example, in a flow based system, itmay be possible for one user with many different flows to consume all ofthe available bandwidth to the exclusion of the other users. Theinventive user-based service system is different from the flow-basedsystem because it makes its distinctions based on the users or usergroups. In this way, the quality of service is improved for all flows,not just for the one flow that might happen to be usurping the availablebandwidth. Amongst the individual users, flow based scheduling can,however, take place, e.g. by a user designating which of their flowsshould have priority. However, as between the individual usersscheduling is accomplished on a user basis.

[0088] There are many ways that the above quality of service system canbe implemented. In one embodiment, the quality of service system isimplemented by the PANS server 302 as follows. Once all of the usershave selected their quality of service levels, the PANS server 302monitors the available bandwidth and generates a signal or message thatis transmitted to the users when it is their turn to transmit their datapackets. The users can select their quality of service level bypurchasing the service level. Alternately, the quality of service levelmight be provided to the user as part of a package that was negotiatedby an organization or employer on behalf of the user. Regardless, oncethe service level has been selected and the user authenticated, the PANSserver 302 can transmit a “go” signal to an individual member of theLevel I group when it is their turn to transmit. When the individualmember receives the “go” signal, they can then begin to transmit theirpackets if they have any to transmit. Based upon the user token that isincluded with each packet transmission from the user, the PANS server302 will be able to verify that the packet transmission is coming fromthe appropriate user and is therefore valid. After the individual userhas transmitted enough of its packets, the PANS server notifies the userthat its transmission time is over and then sends a “go” signal toanother user or group. It is important to note that the PANS server canbe programmed to monitor for packet traffic after the packets have leftthe sender. Monitoring the packet traffic can ensure that a user'spackets have actually been transmitted to the Internet and are notsitting in a queue awaiting transfer. That is, in this case, the PANSserver is programmed and can intelligently figure out in a real worldsense whether the packets that have been provided by a user haveactually been transmitted to the Internet so that they will not, at sometime downstream, interfere with another's data packets. Assume forexample, that 20 milliseconds of transmission time has been allocatedamong three users in the following amounts: 5 milliseconds (user 1), 5milliseconds (user 2) and ten milliseconds (user 3). Assume also thatuser 1's transmission actually takes 6 milliseconds and user 2'stransmission actually takes 7 milliseconds. That would mean that only 7milliseconds of the total 20 milliseconds of transmission time areavailable for user 3. In this case, the PANS Service can monitor thepacket transmission from the other users and can automatically and in adynamic fashion adjust the allocation for user 3 to 7 milliseconds. Whena group such as the Level II group receives a “go” signal, the groupmust then begin an arbitration sequence to arbitrate among the variousgroup members for packet transmission. Arbitration may, however, beconducted in advance of receiving the “go” signal. Any suitablearbitration scheme can be used.

[0089]FIG. 8 shows a flow diagram that describes steps in a quality ofservice method in accordance with the described embodiment. Some of theillustrated steps can be implemented by the PANS server 302, while otherof the steps can be implemented by the client. Step 800 displays one ormore service level options for a user. In the described embodiment, theservice level options can be displayed on the client machine so that theuser can select an appropriate level. For example, if a user is in abusy airport and is between flights, they may only have a limited amountof time to transacts their on line business. In this instance, the usermay select the premium Level I service level so that they have the bestchance of transacting their business. The service level options mightalso be displayed in the form of a list that describes various memberorganizations that have negotiated for particular service levels onbehalf of their members. Step 802 selects a service level option. Thisstep can be implemented by the user selecting a particular displayedservice level. Alternately, the user can select from among the groupsthat are described in the list of member organizations. After the userhas been authenticated, step 804 monitors the data packet traffic thatis generated from all of the users. Step 804 is typically a continuouslyimplemented step in which the data packet traffic is monitored as usersare added to and deleted from the collection of users that aretransmitting data packets at any particular time. In this example, sinceall of the data packets from each of the users or clients gets routedthrough the PANS server, it is in the best position to oversee, monitorand control the packet flow. The PANS server then, in accordance withits programming instructions, generates a “go” signal when a user orgroup of users is authorized to transmit their data packets. Steps 808and 810 wait to receive the “go” signal. Once the “go” signal isreceived, if the authorized recipient is an individual user (step 812),then they can begin their data packet transmission. If the authorizedrecipient comprises a group of users (e.g. Level II or III users), theycan begin their arbitration process (step 816).

[0090] Accounting

[0091] In one embodiment, PANS server 302 implements an accountingfunction. That is, because all of the data packets get routed throughthe PANS server, it is in the best position to maintain an accounting ofthe packets that its sends and receives. By accounting for all of thedata packets, the PANS server can ensure that users are billed for anaccurate amount of bandwidth that they may have consumed. To do this,the PANS server may be communicatively linked with a billing databasethat is not specifically illustrated. The PAN server then communicatesthe particular user's use parameters (i.e. amount of time spent on thenetwork, number of data packets transmitted/received, etc.) to thebilling database which can then ensure that the user is billed anappropriate amount.

[0092] As an example, consider that billing is based on the number ofpackets that pass through the PANS server 302. When the PANS serversends a “go” signal to a particular user, if the user transmits only asmall number of data packets, then in this example, the billing chargeshould be a small charge. Alternately, consider that the billing isbased on the total amount of bits that are transmitted. The PANS serve302 keeps track of the number of bits that are transmitted by the userand sees that the user is billed accordingly. Further consider that thebilling is based on the amount of time an individual spends using thenetwork. In this case, the PANS server can keep an accounting of thetime so that the user can be billed accordingly. In addition, the PANSserver can be configured to monitor a user's use of local resources,e.g. printers, scanners and the like. Accordingly, the PANS server cansee that users are billed for the amount of the resource that theyconsume. It will also be appreciated that the PANS server can use itsaccounting feature to efficiently schedule users for data packettransmission.

[0093] Accounting for the data packets is also advantageous from thestandpoint of assessing the collective system demand of members ofvarious organizations that might have negotiated service level packagesfor their members. For example, if a particular organization's membersplaced an unusually high burden on the system that is not commensuratewith the organization's negotiated service level, then measures might betaken to bring the burden in line with the negotiated service level.This might involve charging the organization a higher fee for itsnegotiated service level. It might also involve changing theorganization's service level.

[0094]FIG. 9 is a flow diagram that describes steps in an accountingmethod in accordance with the described embodiment. Step 900 monitorsthe use of the host organization network. This step is mostadvantageously implemented by the PANS server 302. The PANS server canmonitor the network use in a number of different ways. For example, thePANS server can monitor the packet traffic or the time that is spent onthe network by the individual users. Step 902 collects information thatpertains to the user's use of the network. Here, such information caninclude, without limitation, the total number of packets that aretransmitted by a user, the total number of bytes that are transmitted bya user, or the total number of minutes that a user spends logged ontothe network to name just a few. Once this information is collected bythe PANS server, step 904 uses the information to charge the user forits network use. This step might be implemented by having the PANSserver communicate the collected information to a billing server thatreceives the information and then generates a bill for the user.

[0095] Dynamic Compression

[0096] In one embodiment, dynamic data compression is utilized as a wayto optimize data packet transmission. Dynamic data compression isparticularly useful in the wireless embodiments for the followingreasons. One way to enhance the use of available bandwidth is tocompress the data that is being transmitted. By compressing the data,more data can be sent from the client to the PANS server and vice versa.In the wireless embodiment, there are certain error conditions that canoccur that can corrupt the transmission of data packets. For example, ifthere is good line of sight between the client and the appropriateaccess point, then the chances of having a corrupted transmission isless likely than if there is an object that blocks the transmissionpathway between the client and the access point. Consider, for example,a host organization network that is deployed in a shopping mall. Theremay be times when the amount of human traffic through the mall disruptsthe transmission signals between the client and the access point, orbetween the access point and the PANS server. In these instances, it ishighly desirable to curtail somewhat the amount of compressed datapackets that are being sent. This follows logically from a realizationthat corruption events that corrupt compressed data are more destructivethan corruption events that corrupt uncompressed data because in theformer case, more data gets corrupted.

[0097]FIG. 10 is a flow diagram that describes steps in a dynamiccompression method in accordance with the described embodiment. Dynamiccompression can be performed by both the PANS server and the clientmachine. Step 1000 defines an event window within which monitoring takesplace. The event window can be any suitable time frame for whichmonitoring is desired. Step 1002 monitors for errors that occur withinthe event window. The errors that can be monitored for include, withoutlimitation bit errors, packet errors and the like. Monitoring can takeplace using any suitable monitoring techniques as will be understood bythose of skill in the art. Accordingly, monitoring techniques are notdiscussed in detail any further. Step 1004 determines whether the errorsthat occur are greater than a predetermined amount. Errors can beaccounted for in any suitable way. For example, the gross number oferrors that occur in a given time period can be determined. Alternately,the error rate can be determined. During this time, a base linecompression can be employed by the client and the PANS server. A baseline compression can comprise using a certain compression algorithm orvariation thereof. In addition, a base line compression can comprisecompressing a certain amount of the data packets (e.g. a certainpercentage) within the event window. If the errors exceed thepredetermined amount, then step 1006 implements dynamic compression.Additionally, when a certain predetermined amount of errors is reached,Forward Error Correcting codes can be used. Forward Error Correctingcodes will be understood to those of skill in the art and are thereforenot discussed in any detail here.

[0098] When dynamic compression is implemented, its goal is to compressless of the data during a time period when there are more detectederrors. This can be done in a number of different ways. For example,when an error threshold is exceeded, a different compression algorithmmight be used. Alternately, when an error threshold is exceeded a lowerpercentage of data packets within the event window might be compressedusing the same compression algorithm.

[0099]FIG. 11 shows a look up table generally at 1100 that can be used,in one embodiment, to implement dynamic compression. Here, the look uptable 1100 contains two fields—an error field and a compression percentfield. In this example, there are 5 entries in the error field, i.e.0-1, 2-5, 6-10, 11-15, +15. These entries constitute differentthresholds for errors that can occur within the event window. Each ofthe entries in the error field is associated with a compression percent.In this example, the compression percentages range from 100% for whenthere are very few detected errors, to 0% for when there are a largenumber of detected errors. Accordingly, as the data packets aretransmitted, as long as the detected errors in an event window do notrise above 1, all of the data packets in the event window will becompressed. If, for example, the detected errors rise to between 6-10,then the percentage of data packets that get compressed drops to 50%.This helps to ensure that during periods of transmission disruption,less of the data that is transmitted between the PANS server and theclient are compressed thereby reducing the amount of data that isultimately corrupted.

[0100] User Interface

[0101]FIG. 12 shows an exemplary graphic user interface generally at1200. Interface 1200 is configured for display on a client computingdevice. In this example, the interface 1200 includes a bandwidthselector 1202 that is configured to enable a user of the computingdevice to adjust the bandwidth that is allocated to the computingdevice. Accordingly, a user is given the choice of the bandwidthallocation that they can receive. Interface 1200 also includes a costselector 1204 that is configured to enable a user of the computingdevice to adjust the cost that is associated with the bandwidth that isallocated to the computing device. In this example, each of theselectors 1202, 1204 are sliders that can be manipulated with a userinput device such as a mouse. By adjusting the cost (or the bandwidthallocation), the user can adjust the allocated bandwidth that they useto transmit their data packets. Accordingly, if a user is in a hurry(e.g. between flights in a busy airport), they could simply adjust oneor both of the selectors to automatically select a high level of servicethat is available. In addition, a data rate display 1206 is providedthat displays indicia of a data rate that is currently being provided tothe computing device. This gives the user real time feedback so thatthey can confirm that they are in fact receiving the level of servicethat they selected and for which they will be charged.

[0102] Conclusion

[0103] The above-described methods and systems provide a mechanism forenhancing wireless functionality in the local area and pushing localarea wireless system perform and functionality into the wide area space.High speed wireless Internet access can be provided in public spaceswhere host organization networks have been deployed. Access can beachieved at speeds up to 100× faster than traditional wireless WAN and3G solutions. Various embodiments provide an individual-centric approachthat enables users to pay for different levels of service, or to havedifferent levels of service provided through arrangements with thirdparty organizations. Enhanced services can be based on pricing and caninclude access to local network resources, policy-based networking andon-demand security. Aspects of the described embodiments provide forauthentication/authorization, negotiation of services with serviceproviders, service enforcement, security and user charging.

[0104] Although the invention has been described in language specific tostructural features and/or methodological steps, it is to be understoodthat the invention defined in the appended claims is not necessarilylimited to the specific features or steps described. Rather, thespecific features and steps are disclosed as preferred forms ofimplementing the claimed invention.

1. A graphic user interface configured for display on a computing devicecomprising: a bandwidth selector configured to enable a user of thecomputing device to adjust the bandwidth that is allocated to thecomputing device for Internet access; and a cost selector configured toenable a user of the computing device to adjust the cost that isassociated with the bandwidth that is allocated to the computing devicefor Internet access, wherein by adjusting the cost, the user therebyadjusting the allocated bandwidth.
 2. The graphic user interface ofclaim 1 further comprising a data rate display that displays indicia ofa data rate that is currently being provided to the computing device. 3.A computing device comprising: a display device; one or morecomputer-readable media; and computer-readable instructions on the oneor more computer-readable media which, when executed by the computingdevice, cause a graphic user interface to be presented to a user, saidinterface comprising: a bandwidth selector configured to enable a userof the computing device to adjust the bandwidth that is allocated to thecomputing device for Internet access; and a cost selector configured toenable a user of the computing device to adjust the cost that isassociated with the bandwidth that is allocated to the computing devicefor Internet access, wherein by adjusting the cost, the user therebyadjusting the allocated bandwidth.
 4. The computing device of claim 3,wherein the graphic user interface further comprises a data rate displaythat displays indicia of a data rate that is currently being provided tothe computing device.
 5. A computing device comprising: display means;one or more computer-readable media; and computer-readable instructionson the one or more computer-readable media which, when executed by thecomputing device, cause a graphic user interface to be presented to auser, said interface comprising: means for enabling a user of thecomputing device to adjust the bandwidth that is allocated to thecomputing device for Internet access; and means for enabling a user ofthe computing device to adjust the cost that is associated with thebandwidth that is allocated to the computing device for Internet access,wherein by adjusting the cost, the user thereby adjusting the allocatedbandwidth.
 6. The computing device of claim 5 wherein the graphic userinterface further comprises means for displaying indicia of a data ratethat is currently being provided to the computing device.