Wireless Social Networking

ABSTRACT

A first device may communicate by joining a wireless mesh network that includes at least one wireless device configured to operate a wireless routing protocol, discovering a group of other wireless devices configured to participate in the wireless mesh network, and accessing an interest metric for a second wireless device in the group of other wireless devices. The interest metric is based in part on a network topology from the wireless mesh network. The interest metric is related to an interest threshold and it is determined whether relating the interest metric to the interest threshold supports enabling messaging communications. If so, messaging communications may be enabled.

TECHNICAL FIELD

This document relates to wireless mesh networks.

BACKGROUND

A wireless mesh network is an autonomous collection of wireless devicesthat communicate with each other over wireless links. A wireless meshnetwork may be decentralized, and, as a result, network activity such asdiscovering the topology and delivering messages is performed by devicesof the network.

SUMMARY

In one general sense, a first wireless device may communicate by joininga wireless mesh network that includes at least one wireless deviceconfigured to operate a wireless routing protocol, discovering a groupof other wireless devices configured to participate in the wireless meshnetwork, accessing an interest metric for a second wireless device inthe group of other wireless devices, wherein the interest metric isbased in part on a network topology from the wireless mesh network,relating the interest metric to an interest threshold, determiningwhether relating the interest metric to the interest threshold supportsenabling messaging communications between the first and second wirelessdevices, and if so, enabling messaging communications to be exchangedbetween the first and second wireless devices.

Implementations may include one or more of the following features. Forexample, enabling messaging communications to be exchanged may includerendering an icon representing a communications pathway so that a usermay interact with the icon to exchange communications. Accessing theinterest metric for the second wireless device may include accessinginformation that is based at least in part on characteristics of anentity operating the second wireless device. Accessing characteristicsof the entity operating the second wireless may include accessing atleast one of an entity type, a content type, one or more interests ofthe entity, and a social interest.

Accessing the interest metric for the second wireless device may includeaccessing information that is based at least in part on a geographiclocation of the second wireless device. Accessing information that isbased at least in part on the geographic location of the second wirelessdevice may include accessing at least one of a zip code, a state, aregion, a street address, and a location based on a Global PositioningSignal.

A participant list perceivable to the user may be rendered. Renderingthe participant list may include identifying users, organizingidentified users into categories based on network proximity, anddisplaying information for identified users. Identifying users mayinclude accessing privacy settings for the users being identified.Organizing the identified users into categories may include renderingthe identified users based on the privacy settings. Organizing theidentified users may include also organizing the identified users byassociated interest metrics.

DESCRIPTION OF DRAWINGS

FIG. 1 is an exemplary block diagram of a communications system enablingexchange of instant messages in a wireless mesh network.

FIGS. 2A-2C are exemplary block diagrams illustrating a sequence ofconfigurations in a wireless mesh network.

FIG. 3 is an exemplary network topology of a wireless mesh network.

FIG. 4 is an exemplary graphical user interface configured to exchangeinstant messages.

FIGS. 5A-5C are exemplary graphical user interfaces for a messagingapplication that indicates proximity information in a wireless meshnetwork.

FIGS. 6-7 are graphical user interfaces that enable a user to specifyneighbor search and privacy preferences in a wireless mesh network.

FIGS. 8A-8C are diagrams illustrating the distribution of information ina wireless mesh network.

FIG. 9 is a flow chart of an exemplary process by which messagingcommunications are enabled.

DETAILED DESCRIPTION

A user with a wireless device joined to a wireless mesh network maydesire to communicate with other users on other wireless devices in thewireless mesh network. For example, a user may desire to exchangecommunications with other users that have expressed similar interests orthat are proximate to the user's location. However, depending on auser's preferences, the size of the wireless mesh network, and otherfactors, a user may find it difficult to engage in communications withother users in the wireless mesh network. In some instances, it may bedifficult to even identify other users in the wireless mesh network. Inother instances, a user may experience difficulty in identifying userswith similar interests.

For example, a user may find it difficult to navigate among largevolumes of information for a large population in the wireless meshnetwork. And, even when other users with similar interests can beidentified, it may be difficult for a user to identify which of theother users are proximate to the current user.

Thus, in a wireless mesh network in which a user on a first wirelessdevice has joined a wireless mesh network, the first wireless device mayfirst discover a group of other wireless devices. For example, the firstwireless device may use a wireless routing protocol and identify otherwireless devices that also are participating in the wireless meshnetwork. The wireless device may access an interest metric for a secondwireless device in the group of other wireless devices. The interestmetric may be based in part on a network topology from the wireless meshnetwork. For example, an interest metric may indicate that the secondwireless device is located a specified number of “hops” away from thefirst wireless device. The interest metric is related to an interestthreshold. For example, an instant messaging application may determinewhether another wireless is located less than five “hops” away andworthy of display in an instant messaging application. As a result, adetermination may be made as to whether relating the interest metric tothe interest threshold supports enabling messaging communicationsbetween the first and second wireless devices. If so, the user may usethe first wireless device to exchange messaging communications with thesecond wireless devices.

In one implementation, representations of other wireless devices in thewireless mesh network are organized into a group. For example, a list ofco-users (e.g., a buddy list) may be configured to render group membersin a messaging interface (e.g., an instant messaging application). Thewireless device also may enable messaging communications betweenwireless devices based at least in part on an interest metric thatreflects a user's preferences. The interest metric also may be based atleast in part on a network topology, and also may reflect other factors,such as the geographic location of the neighboring wireless devices oruser interest(s).

In one implementation, wireless mesh network proximity may be used as aproxy for geographic proximity. For example, if a wireless device is notequipped with a GPS system, it may be difficult to determine therelative geographic proximity of wireless devices. And, as wirelessdevices may only operate over a limited geographical range, a wirelessdevice may identify geographic neighbors based on the network “distance”(e.g., number of hops, available bandwidth) to these neighbors. Thus, afirst wireless device may determine that a second wireless device islocated two network “hops” (e.g., links) away and that a third wirelessdevice is ten network hops away. As a result, the first wireless devicemay use the indication of network proximity as an indication ofgeographic proximity.

Privacy may be preserved using a privacy configuration that may varybetween different groups. The privacy configuration also may reflectnetwork proximity and other factors.

FIG. 1 is an exemplary block diagram of a communications system enablingexchange of instant messages in a wireless mesh network 105. Thecommunications system 100 includes a wireless mesh network 105, wirelessdevices 110 a and 110 b, a data network 125, an instant messaging system130, a host system 140, and computers 145 a and 145 b. The data network125 may include the Internet or a Public Switched Telephone Network(PSTN). The wireless mesh network 105 may connect to the data network125 through a wireless access point 121 (e.g., wireless devices 110 aand 110 b). In general, the wireless mesh network 105 is an autonomouscollection of wireless devices 110 that exchange communications otherover wireless links. The wireless mesh network 105 may be decentralized,such that discovering a network topology and exchanging messages isperformed by the wireless devices 110 a and 110 b. In addition, whendecentralized routing and message delivery communications are used,wireless communications in the wireless mesh network 105 do not dependon distance to the nearest access point or base station. Rather, theydepend upon the distance to the next wireless device.

Each of wireless devices 110 a and 110 b may include a wireless routingcode segment to exchange communications. Wireless devices 110 a and 110b also may include instant messaging modules 115 a and 115 b,respectively, which enable wireless devices 110 a and 110 b tocommunicate with one another using instant messages without requiringinteraction with the instant messaging system 130. In oneimplementation, either or both of the wireless devices 110 a and 110 bmay be configured to provide other devices in the communication system100 with location information (e.g., GPS coordinates). For example, eachof the wireless devices 110 a and 110 b may include a global positioningsystem (GPS) receiver 120 a or 120 b that determines a geographiclocation.

The instant messaging system 130 enables users of computers 145 a and145 b, as well as users of wireless devices 110 a and 110 b, to exchangeinstant messaging communications. A user on computer 145 a may sign into a host system 140 that provides a connection to the data network 125.In one implementation, the host system 140 is operated by an Internetservice provider (ISP) that also provides an electronic mail system 140a. Since the instant messaging system 130 also is connected to the datanetwork 125, computers 145 a and 145 b may be indirectly connected tothe instant messaging system 130, thereby enabling users of thecomputers 145 a and 145 b to communicate using instant messages. Inaddition, instant messaging system 130 may be connected to the wirelessmesh network 105. This enables users of the wireless devices 110 a and110 b to communicate using instant messages without requiring use of aland-based network.

The instant messaging system 130 includes on-line presence information130 a that indicates the on-line presence of users. The on-line presenceof a user refers to the availability of the user to communicate using,for example, instant messaging system 130. In addition, the instantmessaging system 130 includes on-line notification information 130 bthat indicates notification preferences regarding the on-line presenceof different users. The on-line notification information 130 b permits auser to selectively release identification information.

Similarly, the instant messaging system 130 may include neighborselection/privacy settings 130 c. Using neighbor/privacy settings 130 c,a user may specify preferences that control how the neighbors areidentified during the neighbor discovery in the wireless mesh network.For example, the neighbor selection settings 130 c may include interestmetrics that organize neighbors into specific participant lists orgroups. In addition, neighbor selection/privacy settings 130 c mayrelate to a user's on-line IM settings or user's general mesh networkprivacy settings. For example, a user may enable on-line presenceinformation for the user be shared with others, including a subset ofco-users on a co-user list (e.g., a Buddy List) that is included in aset of participant lists 130 d.

The instant messaging system 130 also may store participant profiles 130e. Participant profiles 130 e may include information about users, suchas age, interest, hobbies, system preferences, and other informationpertinent to a user's on-line presence.

As mentioned above, the communications system 100 also includes the hostsystem 140 to which computers 145 a and 145 b may be connected. Users ofthe computers 145 a and 145 b have accounts with the host system 140.The host system 140 may be configured to support authenticated access,where a login server 141 of the host system 140 verifies authenticationinformation during login. If the login server 141 verifies theauthentication information, then the computer providing theauthentication information is allowed to access the host system 140.

The host system 140 also includes an electronic mail system 142 that maybe accessed by users of the computers 145 a and 145 b to send andreceive electronic mail. Users of the wireless devices 110 a and 110 balso may access the electronic mail system 142 to exchange and receiveelectronic mail using the wireless devices 110 a and 110 b.

After logging in, users of the computers 145 a and 145 b (or thewireless devices 110 a and 110 b) may access the instant messagingsystem 130. Alternatively or in addition, the wireless devices 110 a and110 b may communicate with each other without using instant messagingsystem 130, instead using a peer-to-peer capability in instant messengermodules 115 a and 115 b. If the peer-to-peer capability in instantmessenger modules 115 a and 115 b is used, communications betweenwireless devices 115 a and 115 b may be transmitted throughcommunication pathway 155 that represents a communication path across awireless mesh network.

FIGS. 2A-2C are exemplary block diagrams illustrating a sequence ofconfigurations in a wireless mesh network 105 that includes wirelessdevices 205 a-2053. As shown in FIG. 2A, a discovery process has begunwith establishment of a small wireless mesh network 200 a that includesan ad-hoc connection 210. As shown, the network 200 a is a two-nodenetwork between wireless devices 205 b and 205 c.

As shown in FIG. 2B, more devices have joined the wireless mesh networkand a larger wireless mesh network 200 b has been formed. The network200 b includes connections between the wireless devices 205 a-205 e.FIG. 2C illustrates that the wireless mesh network 200 c has grownfurther to reach the wireless access point 121, thereby enablingwireless devices to access the data network 125.

The wireless mesh network 105 may include at least one wireless devicethat is configured support a wireless routing protocol or a subset of awireless routing protocol so that, for example, the wireless device mayact as a wireless routing client in a wireless mesh network where thewireless client is not configured to perform more computationallyburdensome routing calculations. The wireless device may include adevice dedicated solely to wireless communications (e.g., a wirelessaccess point 121). Alternatively, the wireless device may be used forother applications and communications, such as wireless device 205 b.The wireless device may be configured to disseminate routing informationto other wireless devices. For example, a wireless router may storeinformation about the topology of the wireless mesh network 105 andassist proximate wireless devices in discovering wireless neighbors.

In addition, the wireless router may identify data paths in the wirelessnetwork 105. For example, identifying data paths in the wireless meshnetwork 105 may include administering a self-configuring wirelessrouting protocol, such as a version of Routing Information Protocol(RIP) adapted to ad-hoc wireless networks. Examples of other wirelessrouting protocols that be used include TORA (“Temporally-Ordered RoutingAlgorithm”) and AODV (“Ad-hoc On-demand Distance Vector”).

A wireless devices 205 a-205 e joining a wireless mesh network 105 maydiscover a group of other wireless devices configured to participate inthe wireless mesh network. In one example, a wireless device maydiscover other wireless devices by broadcasting “HELLO” advertisements.In another example, the wireless device may discover other wirelessdevices by querying a wireless router, and/or by using other discoverytechniques. In addition to discovering direct neighbors (i.e., theneighboring wireless devices with whom wireless device 205 a maydirectly exchange communications), a wireless device in the wirelessmesh network may discover a network topology for a larger wireless meshnetwork with wireless devices that are not directly accessible.

Peer propagation techniques may be used to generate a network topology.For example, if wireless device 205 a in FIG. 200C attempts to discoverthe wireless devices within N hops of itself, the wireless device 205 amay send a discovery packet to each of its direct neighbors. Asneighbors, wireless devices 205 b and 205 c reply to device 205 a withthe network topology information for wireless devices 205 d and 205 e.The information may include the number of hops, and/or the availablelink bandwidth to wireless devices 205 d and 205 e. In addition,wireless devices 205 b and 205 c may further propagate a discoverypacket to wireless devices 205 d or 205 e, which may in turn inform thewireless device 205 a of known neighbors. Thus, the propagation of thediscovery package may continue until the discover packet has propagatedthe specified number of “hops.”

However, wireless devices that are further than N hops away fromwireless device 205 a may stop propagating the discovery packet to avoidflooding device 205 a with too much discovery information. When apredetermined number of the wireless device's neighbors have replied,the wireless device 205 a may have sufficient information to generatethe network topology. The network topology may include a list ofneighboring devices within a predetermined number of hops to wirelessdevice 205 a and associated link costs. In another example, the networktopology reflects available bandwidth to neighboring devices.

FIG. 3 is an exemplary network topology of a wireless mesh network 105.Specifically, FIG. 3 illustrates how a wireless device 305 computes thenetwork topology from the point of view of the wireless device 305 afterperforming network discovery. The wireless device 305 may assigninterest metrics to wireless neighbors. The wireless neighbor's interestmetrics may be used to indicate whether the wireless device 305 shouldfoster or enable messaging communications with that wireless neighborscorresponding to the interest metrics. In general, the wireless device305 may enable messaging communications with wireless neighbors thathave higher interest metrics and avoid enabling messaging communicationswith wireless neighbors with lower interest metrics. The determinationof enabling messaging communications may be performed by comparing aninterest metric to a threshold. For example, if the interest metric fora wireless neighbor device is greater or equal to the threshold, thenthe wireless device 305 enables messaging communications with thatneighbor device. On the other hand, if the interest metric for theneighbor is smaller than the threshold, then the wireless device 305disables messaging communications with that neighbor device.

The interest metric may be based in part on a network topology from thewireless mesh network 105. For example, some neighbors discovered bywireless device 305 may be topologically closer than others. From theperspective of wireless device 305, the interest metrics of otherwireless devices may be determined using proximity indicators, such as anumber of hops or an available bandwidth to the wireless devices. Forexample, wireless devices 310, 315, and 320 are located within a singlenetwork hop of the wireless device 305, as also indicated by the circle360. Similarly, wireless devices 325, 330, 335, and 340 are locatedwithin a two-hop radius of device 305, since they are separated from thewireless device 305 by two hops, as also indicated by the circle 370.Other devices, such as devices 345, 350, 355 and 357, are outside thetwo-hop radius.

Wireless device 305 may be configured to only enable messagingcommunications with the neighbors within its N-hop radius. For example,the wireless device 305 may elect to only communicate with neighborswithin two hops in order to avoid long network or processing delays whenexchanging voice, video information, or other bandwidth-intensivecontent. In such instances, a neighbor's network proximity (e.g., thenumber of hops away) may be used to represent geographic proximity.However, in a wireless mesh network, knowledge of a particulargeographic operating range may be used to determine geographic neighborsbased on a network distance. For example, a wireless device that is twonetwork hops away is likely to be geographically closer than a wirelessdevice that is ten network hops away.

The interest metric also may be based on neighbor characteristics. Forexample, neighbor characteristics may include neighbor types, such as“business,” “individual,” or “advertiser.” In addition, neighbor typesmay be further subdivided or categorized into sub-types by a variety ofcharacteristics. In one example, the neighbor type “restaurant” may besub-divided into multiple sub-groups, such as “Italian,” “Thai,”“French,” and others. In another example, the neighbor characteristicsdepend on the content advertised by the neighbor, such as the specificvalue of store discounts. In addition, the neighbor characteristics mayindicate a neighbor's interests or social activities, such as interestsin poker, science fiction, or kung-fu movies. The user may assigndifferent interest metrics to different neighbor characteristics. Hence,the user may set the interest metrics to the highest value for theindividuals interested in poker, the medium value for the storesadvertising free pizza, and the smallest value for stores advertisingdiscounts on winter clothes that are less than 20% off. As a result, thewireless device 305 may prevent messaging communications with the storesadvertising discounts on winter clothes, because these stores' haveinterest metrics that are too low for the user.

Finally, enabling communications based at least in part on networkproximity may also assist businesses in identifying potential customers.In one example, the owner of a pizzeria may only want to advertise a“7:30 special” to the customers who are close-by to the pizzeria toavoid advertising to customers who are too far away to take advantage ofthe “7:30 special.” In another example, a department store with a largenumber of diverse products may tailor its promotional advertisements tothe customers shopping within specific store sections. Hence, customersshopping in a “Women's Shoes” section may receive advertisements thatare different from advertisements received by customers shopping in a“Men's Suits” section.

FIG. 4 shows an exemplary graphical user interface 400 configured toexchange instant messages. After a sender of instant messages isnotified that a recipient is “present” and available to exchange instantmessages, the sender may use the instant messaging interface 400 toexchange instant messages with the recipient. The instant messaginginterface 400 includes a message history box 405 that lists the instantmessages sent between the sender and the recipient. The message historybox 405 also may be referred to as a message transcript box 405. Asshown, each message is presented with an indication of a screen name bywhich the sender or the recipient is identified as the source of themessage. Each message listed in the message history box 405 alsoincludes the text of the instant message sent by the sender or therecipient. For example, the message history box 405 includes a message406 sent by a user with a screen name “ProductRep” and a message 407sent by a user with a screen name “Subscriber.” The users exchangingmessages 406 and 407 are, respectively, the sender and the recipient. Inone implementation, each message listed in the message history box 405includes a time stamp of when the message was sent.

The instant messaging interface also includes a message specificationbox 410 in which the sender generates a message to be sent to therecipient. The sender may enter text to be sent to the recipient in themessage specification box 410. The instant message interface 400includes a set of format controls 415 that may be used to format thetext entered in the message specification box 410. More particularly,the format controls 415 enable the user to change the size, foregroundcolor, background color, style, and effects of the text entered in themessage specification box 410. The format controls 415 also permit theinsertion of items that are not plain text, such as hyperlinks andemoticons, into the message specification box 410.

After a message has been specified in the message specification box 410,it may be sent by selecting a send button 418 included in a second setof controls 420. After the send button 418 has been selected, the textthat has been entered in the message specification box 410 is sent tothe recipient, the message specification box 410 is cleared, and themessage is added to the message history box 405. The message also isdisplayed in a message history box 405 of an instance of the instantmessaging interface 400 being viewed by the recipient. Also included inthe second control set 420 are controls for warning (421) or blocking(422) instant messages or adding (423) the recipient to a participantlist maintained by the sender. In one implementation (not shown), thecommunications interface provides information descriptive of thecommunications pathway. For example, an instant message interface mayindicate (1) that the remote user is a specified number of hops away,(2) that a specified bandwidth is available across the communicationspathway, and (3) that the communications pathway supports one or more ofthe following applications. Displaying information related to thecommunications pathway may include updating the displayed information asthe network topology changes.

FIGS. 5A-5C show exemplary graphical user interfaces for a messagingapplication that indicates proximity information in a wireless meshnetwork 105. Specifically, instant messaging system 130 may organizeusers based on various interest metrics. The identities appearing in theco-user list 505 may be separated into one or more groups based onvarious interest metrics, such as network proximity to the user, networkproximity combined with geographic proximity, or neighborcharacteristics.

For example, the co-user list 505 a in the participant list interface500A includes a “Nearby Buddies” group 510 a, a “Local Promotions” group510 b, a “Poker Enthusiasts” group 510 c, a “Sci-Fi Lovers” group 510 d,and a “NC Basketball Fans” group 510 e. The identities are organized ingroups based on interest metrics, activity interests, and/or othercharacteristics. For example, the identities appearing in the “NearbyBuddies” group 510 a may be identified in response to a determinationthat of whether a wireless device associated with an identity is locatedwithin a predetermined threshold, as evidenced by the proximityindicator icon 515 a. On the other hand, the identities in “Sci-FiLovers” group 510 d share an interest in science fiction, as indicatedin an online profile.

In addition, some groups may be generated by virtue of a businessinterest. For example, a group selection protocol may distinguishbetween business users and consumers. The “Local Promotions” group 510 bincludes business identities, advertisements, and/or promotions frombusiness entities in the wireless mesh network. For example, “Joe's” maysolicit the nearby users in a wireless mesh network by transmittinginformation related to current promotions, such as a free pizza withsome additional purchase (510 b).

A proximity indicator 515 a may include a graphical or alphanumericalrepresentation of a neighbor's proximity to the user. For example, theproximity indicator 515 a may show the number of network hops from theuser to a neighbor. Additionally or alternatively, the proximityindicator 515 b may use color or another graphical representation toindicate a relative distance to a neighbor, as illustrated by a circularproximity indicator 515 b. For example, a green circle indicator 515 bmay indicate a nearby neighbor, while a red circle indicator 515 b mayindicate a distant neighbor.

In another implementation, as shown in FIG. 5B, a participant listinterface 500 b may include a co-user list 505 b that is organized basedon network proximity to neighbors. For example, neighbors within onenetwork hop of the user may be listed in “1 Hop” group 520 a, whileneighbors within two network hops of the user may be listed in “2 Hop”group 520 b. Such organization of the network neighbors may enable theuser to quickly determine the closest neighbors in the wireless meshnetwork.

In yet another implementation, as shown with respect to the participantlist interface 500 c of FIG. 5C, in addition to network proximity, theidentities appearing in the co-user list 505C may be further organizedbased on an advertised interest/social activity. For example, users mayorganize themselves into activity groups by broadcasting a desire toengage in a specific social activity, such as carpooling, playingsports, or going to a concert. By enabling a user to specify a socialactivity, a user may walk into a book store and search for other userswith wireless devices who wish to play a pick-up game of softball at anearby park. In another example, GUI 500 c includes a “Carpool to X”group 530 having members who are users with proximate wireless deviceslooking to share a ride to location X. GUI 500 c also includes a “NeedTickets to Concert!” group 540 that is made up of users wishing topurchase tickets to a specific music concert.

Each of GUIs 500A-500C also may include a setup button 550 that may beselected to enroll in or start a group. In one implementation, selectingthe setup button 550 displays an interface for specifying neighborselection settings (e.g., neighbor selection privacy settings shown inFIG. 1).

FIG. 6 shows a graphical user interface 600 that enables a user tospecify neighbor search settings in a wireless mesh network 105. A usermay interact with GUI 600 to specify interest metrics, which in turn,place neighbors into a specific coverage list and/or group. GUI 600 maybe used to control how a user interacts with instant messaging system130, and may be rendered, for example, on the wireless device 110 a, thecomputer 145 a, or the host system 140 described previously with respectto FIG. 1. The settings rendered in GUI 600 may be locally stored orstored online (e.g., in on-line notification information 130 b in FIG.1).

GUI 600 includes a co-user list window 605 of identities managed by theuser. A co-user list may be configured to include identities of peoplewith whom the user exchanges communications and/or identities associatedwith mesh network neighbors. A co-user list or group may be generated orpopulated dynamically (e.g., based on identification of other users withsimilar interests (607 a)), and/or statically, based on pre-definedco-user lists from the messaging system (607 b). Interest metrics forlisting and grouping identities may include network proximity,geographic proximity, social activities, and/or other informationavailable from another user's profile. For example, co-user list window605 includes groups 607 a and 607 b. The “Network Neighbors” group 607 ais associated with wireless devices of neighbors having similarinterests, such as those included on a “North Carolina basketball fans”list 610 a, a “Science Fiction Lovers” list 610 b, and a “PokerEnthusiasts” list 610 c.

In some implementations, the GUI 600 includes a neighbor selectioncriteria window 620. The user may select from one of the pre-determinedinterests in neighbor selection section 620 a, and may limit a discoveryprocess to other users sharing the specified types of interests. Forexample, a user may choose “90's rock music” as one of the requiredcategories in the window 620. As a result of this selection, only theneighbors who have specified that they listen to “90's rock music” arepresented to the user in response to the discovery of other wirelessdevices. In yet another implementation, a user specifies a set ofkeywords in a keyword specification section 620 b to ensure that thespecified keywords are used during searches for neighbors with similarinterests. Using keywords may enable a user to perform a more detailedsearch in identifying other users. In one implementation, the keywordspecification section 620 b enables the user to specify the search termsusing regular or Boolean expressions to improve the utility of thesearch.

GUI 600 includes a network search granularity specification window 630.A user may configure options in the network search granularityspecification window 630 to specify the network-specific attributes. Forexample, the user may attempt to avoid overpopulating a list or a groupby setting the limit on the number of per-list/group neighbors using a“maximum number of discovered users” setting section 630 a. In onespecific example, as shown in FIG. 6, the user may specify a maximumlimit to be at most five North Carolina fans at a time. In addition, theuser may limit the discovery process for other wireless devices byspecifying that only neighbors within a certain N-hop radius be includedin the co-user list section 605 (630 b). In yet another example, theuser may wish to limit the selection process to other wireless devicesassociated with a prerequisite signal strength (630 c). Requiring aprerequisite signal strength may ensure that the user maintainssufficient bandwidth with the neighboring wireless devices for voice orvideo communications. Requiring a prerequisite signal strength also mayfavor neighboring devices that are geographically close to the user. Inanother implementation, the user may specify a distance that is used asan indication of proximity. The wireless device may be configured torelate the specified distance to network proximity using the approximaterange of intervening networks to quantify the specified distanceaccording to network proximity metrics.

Still, in other implementations, GUI 600 specifies a geographic locationthat is used during the process of neighbor search and discovery. Asshown in GUI 600, an address window 640 enables the user to enter adesired address and/or zip code so that neighbor discovery in thewireless mesh network is responsive to a specified geographic location.For example, a user may use a zip code to express a demographic profile,limit results to a particular geographic area, and/or limit results tousers associated with a particular geographic area.

In yet another implementation, the co-user list represents mixed typesof users. For example, a user's instant messaging account may includethe participant list 610 d from an instant messaging system and aparticipant list 610 a based on wireless mesh network topology.

In still another implementation, a wireless device may only display alimited number of entries in a co-user list (e.g., a buddy list withscreen names) where a larger number of identities are available. Inselecting a subset of identities to display, the co-user list may beconfigured to select identities based on wireless network topologyinformation. For example, a wireless device may be configured to displaythe closest X number of users where X represents a number of entriesthat may be displayed. Alternatively, a user on a wireless device mayprefer a degree of anonymity and being further away from other userswith whom the user is exchanging communications. As a result, thewireless device may be configured to display (1) identities associatedwith other wireless devices that are between X and Y hops away or (2)identities that are at least Z hops away. In yet another implementation,the wireless device may be configured to display a list of close friendsat all times in a first group of identities, and to display the closestN users in a second group of identities.

FIG. 7 illustrates a graphical user interface 700 that enables a user tospecify privacy preferences in a wireless mesh network 105. The privacysettings may relate to a user's on-line instant messaging settingsand/or a user's general mesh network privacy settings. GUI 700 may berendered so that a user may interact with the instant messaging system130, using, for example, the wireless device 110 a or 110 b, thecomputer 145 a or 145 b, and/or the host system 140 that is describedwith respect to FIG. 1. In one implementation, the neighbor selectionsettings specified through GUI 700 are stored in the on-linenotification information 130C of FIG. 1.

GUI 700 includes a participant list 705 and a general privacy settingwindow 710. The participant list (or co-user list) 705 includes a listof online identities for other users. The general privacy setting window710 may be used to specify preferences related to a general behavior ofa user's wireless device in a wireless mesh network. For example, theuser may enable instant messaging with users located within thespecified N-hop radius of the user in the wireless network (710 a).Enabling instant messaging within the specified N-hop radius may enableperception of presence information and/or the exchange of messages fromthe proximate neighbors, thereby enabling the user to exert a greatdesire of control.

Alternatively, in a large wireless mesh network, a user may preserve agreater desire of privacy and may avoid neighbors located further away.For example, a user may block distribution of identification informationfor users located beyond the N-hop radius of the user in the wirelessnetwork (710 b). The user also may specify preferences with regard tobroadcast (710 c) or advertisement messages (710 c-d). Broadcastmessages may include communications intended for all proximate wirelessdevices. For example, a wireless neighbor may ask proximate wirelessdevices for directions to place X or a recommendation for a nicerestaurant, or may broadcast a desire to sell/purchase concert tickets.However, a user may elect to avoid these and other types of broadcastinquiries by blocking broadcast messages via a broadcast messageselection box 710 c. Similarly, the user may choose to avoid advertisingmessages from vendors via an advertisement message selection box 710 d.While an advertisement may be similar to or sent as broadcast messages,advertisements generally are deemed to originate from commercialorganizations.

Alternatively or in addition, GUI 700 includes a per group/list/userprivacy setting window 720. Privacy setting window 720 enables a user tospecify privacy settings for a particular group, list, and/or user. Forexample, a user may highlight a group in the participant list 705 andspecify privacy settings for the highlighted group. The user may allowor block messages arriving from specific groups, lists, or users (720a). In addition, the user may elect to remain visible/invisible (or usea non descript or one-time identity) to the highlighted group (720 b).If the user elects to be invisible, network presence is not conveyed tothe highlighted group. In addition, the user may elect to show/hide aprofile (720 c) or login (720 d) information from the highlightedgroups. When the user elects to hide a profile or login information,other users are not able to view the user's profile or track the user'slogin/logout times. In yet another implementation, the user may specifythat (1) the user's identity should be invisible to a first group ofusers (e.g., wireless devices more than a specified actual or networkdistance away), (2) that a nondescript identity should be used for asecond group of users (e.g., wireless devices located more than a firstthreshold number of “hops” away and less than a second threshold numberof “hops” away), and (3) the user will reveal a persistent identity to athird group of users (e.g., selectively reveal a favored screen name tousers located less than the first threshold number of hops away).

FIGS. 8A-8C show diagrams illustrating the distribution of informationin a wireless mesh network 105. The information may include profiles,preferences, and user-specific information. In addition, thedistribution operations described below may apply to the distribution ofdifferent types of content, such as messages, broadcasts,advertisements, text, voice, music, video, and/or other types ofinformation.

Diagram 800A of FIG. 8A illustrates a user on a wireless device 805accessing the information from a system server 820 (e.g., the instantmessaging system 130 in FIG. 1). For example, a user on wireless device805 may want to view a profile for a user on wireless device 810. Theuser on wireless device 805 sends a request to the system server 820,which may transmit the request through the data network 115. Afterreceiving the request, the system server 820 replies to the wirelessdevice 805 using the same path.

In another implementation, as shown in diagram 800 b of FIG. 8B,wireless device 805 obtains information directly from the wirelessdevice 810 without querying the server 820. For example, the wirelessdevice 810 may locally store a profile. Locally storing a profile mayprovide a faster response time and/or afford resilience when access tothe system service 820 is not available.

In yet another example, as shown in diagram 800 c of FIG. 8C, thewireless device 805 may obtain information about wireless device 810from wireless device 815. Wireless device 815 may have previouslyobtained information about wireless device 810 and hence, may supportwireless device 805 with locally-cached information. As a result, thewireless device 810 is still able to access the requested informationfrom a local neighbor without requesting access to the system server820.

A wireless device may be configured to communicate with a communicationsservice (e.g., the instant messaging system 130 in FIG. 1) withoutexplicit instruction from a user, though a user may control how thewireless device communicates with the communications service. Forexample, a wireless device may interact with a communication servicewithout explicit instructions by a user to ensure that the neighbors arediscovered and participant lists are populated (e.g., by automaticallyrunning a self-configuring wireless routing protocol and instantmessaging software). Presence information and the proximity informationmay be exchanged automatically using an automated agent configured todevelop a network topology and identify identities on proximate wirelessdevices.

Instant messaging programs typically allow instant message senders tocommunicate in real-time with each other in a variety of ways. Forexample, an instant messaging program may allow instant message sendersto send text as an instant message, transfer files, and communicate byvoice. One example of an instant messaging communication application isAIM (America Online Instant Messenger). Although many of the operationswere discussed with respect to instant messaging applications, theoperations may be applicable to other messaging applications (e.g.,voice communications, chat, and electronic mail messaging applications).In one example, the operations described above may be used by ananimated avatar that acts as an information assistant conveying news,weather, and other information.

FIG. 9 is a flow chart 900 of an exemplary process by which messagingcommunications are enabled. Initially, a wireless device joins thewireless mesh network that includes at least one wireless deviceconfigured to operate a wireless routing protocol (910). Joining thewireless mesh network may include initiating a connection to a wirelessrouter device (e.g., a wireless access point or another wireless device)and/or transmitting a handshaking message to the wireless router device.The wireless router device may store information about the topology ofthe wireless mesh network and assist the wireless device in discoveringneighbors (e.g., by providing a network topology and/or routing table).Alternatively or in addition, the wireless router device may registerthe newly-joined wireless device in its routing tables.

Next, the wireless device discovers a group of other wireless devicesconfigured to participate in the wireless mesh network (920). Thewireless device may discover the group of other wireless devices bybroadcasting “HELLO” advertisements, by querying the wireless routerdevice, and/or by using other discovery techniques. In oneimplementation, the wireless device discovers a network topology for alarger wireless mesh network using peer propagation techniques.

Once the wireless device discovers the group of other neighboringdevices, the wireless device accesses an interest metric for anotherwireless device in the group of other wireless devices, with theinterest metric being based in part on a network topology from thewireless mesh network (930). For example, the interest metric may bespecified in terms of the number of network hops to the other wirelessdevice or the strength of signal from the other wireless device.Alternatively, or in addition, the interest metric also may be specifiedin terms of network proximity combined with the geographic proximity orthe characteristics of the other wireless device.

After accessing the interest metric, the wireless device relates theinterest metric to an interest threshold and determines whether relatingthe interest metric to the interest threshold supports enablingmessaging communications with the other wireless device (940-950). Forexample, if the interest metric for the other wireless device is greaterthan or equal to the threshold, then the wireless device enablesmessaging communications with the other wireless device. On the otherhand, if the interest metric for the other wireless device is less thanthe threshold, then the wireless device may disable messagingcommunications with the other wireless device. The threshold may bespecified in terms of the number of network hops, an amalgamation ofnetwork distance (e.g., hops) and available bandwidth, signal strength,and/or other characteristics (e.g., network stability).

Finally, if the interest threshold supports enabling messagingcommunications with the other wireless device, the wireless deviceenables messaging communications to be exchanged (960). For example, thewireless device may add online identities to a co-user list, initiate achat or an instant messaging session, and/or initiate a file exchangewith the other wireless device.

The described systems, methods, and techniques may be implemented indigital electronic circuitry, computer hardware, firmware, software, orin combinations of these elements. An apparatus using these techniquesmay include appropriate input and output devices, a computer processor,and a computer program product tangibly included in a machine-readablestorage device for execution by a programmable processor. A processrelying on these techniques may be performed by a programmable processorexecuting a program of instructions to perform desired functions byoperating on input data and generating appropriate output. Thetechniques may be implemented in one or more computer programs that areexecutable on a programmable system including at least one programmableprocessor coupled to receive data and instructions from, and to transmitdata and instructions to, a data storage system, at least one inputdevice, and at least one output device. Each computer program may beimplemented in a high-level procedural or object-oriented programminglanguage or in assembly or machine language if desired; and in any case,the language may be a compiled or interpreted language. Suitableprocessors include, by way of example, both general and special purposemicroprocessors. Generally, a processor will receive instructions anddata from a read-only memory and/or a random access memory. Storagedevices suitable for tangibly representing computer program instructionsand data may include forms of non-volatile memory, including by way ofexample semiconductor memory devices, such as Erasable ProgrammableRead-Only Memory (EPROM), Electrically Erasable Programmable Read-OnlyMemory (EEPROM), and flash memory devices; magnetic disks such asinternal hard disks and removable disks; magneto-optical disks; andCompact Disc Read-Only Memory (CD-ROM). Any of the foregoing may besupplemented by, or incorporated in, specially-designed ASICs(application-specific integrated circuits).

It will be understood that various modifications may be made withoutdeparting from spirit and scope of the claims. For example, the steps ofthe disclosed techniques and concepts may be performed in a differentorder and/or the components in the disclosed systems may be combined ina different manner and/or replaced or supplemented by other components.As another example, a screen name is used throughout to represent aunique identifier of an account, but any other unique identifier of anaccount may be used to identify an account. Other implementations arewithin the scope of the following claims.

1. A method of communicating using a first wireless device, the methodcomprising: joining a wireless mesh network that includes at least onewireless device configured to operate a wireless routing protocol;discovering a group of other wireless devices configured to participatein the wireless mesh network; accessing an interest metric for a secondwireless device in the group of other wireless devices, wherein theinterest metric is based in part on a network topology from the wirelessmesh network; relating the interest metric to an interest threshold;determining whether relating the interest metric to the interestthreshold supports it enabling messaging communications between thefirst and second wireless devices; and if so, enabling messagingcommunications to be exchanged between the first and second wirelessdevices.
 2. The method of claim 1 wherein enabling messagingcommunications to be exchanged includes rendering an icon representing acommunications pathway so that a user may interact with the icon toexchange communications.
 3. The method of claim 1 wherein accessing theinterest metric for the second wireless device includes accessinginformation that is based at least in part on characteristics of anentity operating the second wireless device.
 4. The method of claim 3wherein accessing characteristics of the entity operating the secondwireless includes accessing at least one of an entity type, a contenttype, one or more interests of the entity, and a social interest.
 5. Themethod of claim 3 wherein accessing the interest metric for the secondwireless device includes accessing information that is based at least inpart on a geographic location of the second wireless device.
 6. Themethod of claim 5 wherein accessing information that is based at leastin part on the geographic location of the second wireless deviceincludes accessing at least one of a zip code, a state, a region, astreet address, and a location based on a Global Positioning Signal. 7.The method of claim 2 further comprising rendering a participant listperceivable to the user.
 8. The method of claim 7 wherein rendering theparticipant list includes: identifying users; organizing identifiedusers into categories based on network proximity; and displayinginformation for identified users.
 9. The method of claim 8 whereinidentifying users includes accessing privacy settings for the usersbeing identified.
 10. The method of claim 9 wherein organizing theidentified users into categories includes rendering the identified usersbased on the privacy settings.
 11. The method of claim 8 whereinorganizing the identified users includes also organizing the identifiedusers by associated interest metrics.
 12. A system on configured tocommunicate across a wireless network on a computer readable medium, thesystem comprising: a communications interface structured and arrangedto: join a wireless mesh network that includes at least one wirelessdevice configured to operate a wireless routing protocol; discover agroup of other wireless devices configured to participate in thewireless mesh network; a processor structured and arranged to access aninterest metric for a second wireless device in the group of otherwireless devices, wherein the interest metric is based in part on anetwork topology from the wireless mesh network; relate the interestmetric to an interest threshold; determine whether relating the interestmetric to the interest threshold supports enabling messagingcommunications between the first and second wireless devices; and if so,enable messaging communications to be exchanged between the first andsecond wireless devices.
 13. The system of claim 12 wherein enablingmessaging communications to be exchanged includes rendering an iconrepresenting a communications pathway so that a user may interact withthe icon to exchange communications.
 14. The system of claim 12 whereinaccessing the interest metric for the second wireless device includesaccessing information that is based at least in part on characteristicsof an entity operating the second wireless device.
 15. The system ofclaim 14 wherein accessing characteristics of the entity operating thesecond wireless includes accessing at least one of an entity type, acontent type, one or more interests of the entity, and a socialinterest.
 16. The system of claim 14 wherein accessing the interestmetric for the second wireless device includes accessing informationthat is based at least in part on a geographic location of the secondwireless device.
 17. The system of claim 16 wherein accessinginformation that is based at least in part on the geographic location ofthe second wireless device includes accessing at least one of a zipcode, a state, a region, a street address, and a location based on aGlobal Positioning Signal.
 18. The system of claim 13 further comprisingrendering a participant list perceivable to the user.
 19. The system ofclaim 18 wherein rendering the participant list includes: identifyingusers; organizing identified users into categories based on networkproximity; and displaying information for identified users.
 20. Thesystem of claim 19 wherein identifying the users includes accessingprivacy settings for the users being identified. 21.-23. (canceled)