Systems and methods for implementing ad hoc wireless networking

ABSTRACT

This disclosure involves methods and systems for implementing IBSS networks between peer client devices. Devices function as registrar or enrollee in the network depending upon whether they are in configured or unconfigured mode. The WPS-PBC configuration routine allows the unconfigured enrollee device to obtain the necessary network configuration profile from the configured registrar device upon a successful WPS handshake process. Once a device has received the network configuration protocol, its status is switched to configured, allowing it to function as a registrar for the network for the subsequent addition of new devices. When both devices are initially in an unconfigured state, one is chosen to act as registrar so that it can automatically generate the necessary network configuration profile and pass it along to the other device. Following this process, both devices are set to configured mode.

FIELD OF THE PRESENT INVENTION

The present disclosure generally relates to ad hoc wireless networks andmore particularly to systems and methods for simplifying the formationof such networks.

BACKGROUND OF THE INVENTION

As the number of devices having wireless communication capabilitiesincreases, there is a growing demand for the formation of wirelessnetworks between these devices, such as Wireless Fidelity (WiFi)networks. Further, to help ensure the security of the informationtransmitted over such networks, it is often desirable to provide anencryption scheme to protect the data. However, setting up or joining anencrypted network typically requires a relatively high level ofsophistication from the users regarding the ability to properlyconfigure the appropriate settings, encryption methods, passwords andidentifiers

Accordingly, it is beneficial to simplify the process of establishingsecure wireless networks. For example, current 802.11 wireless LANstandards provide a protocol for providing infrastructure basic serviceset (BSS) or extended service set (ESS) networks called WiFi ProtectedSetup (WPS) that allows users to setup, configure and join encryptednetworks in a streamlined manner. Details regarding the WPS can be foundin the specification document “Wi-Fi Protected Setup Specification,”Version 1.0 h, December 2006, available from the Wi-Fi Alliance, whichis hereby incorporated by reference. Generally, establishing and joininga WPS network does not require the user to manually configure theencryption and network settings. Instead, much of the configurationprocess is automatically initiated and carried out by devices having theappropriate WPS certification.

Conventional WPS networks include a registrar, which is a deviceconfigured to control the network and authorize the addition of newdevices, and one or more enrollees, which are devices that are in theprocess of being authorized to join the network. In one implementation,the user of an enrollee device enters a Personal Identification Number(PIN), which validates the enrollee and triggers the registrar totransmit the relevant configuration settings, including the network name(SSID) and encryption security key. Upon receipt of this information,the enrollee then applies the appropriate settings and can join theencrypted network.

A variety of WPS further simplifies the enrollment process. The PushButton Control (PBC) extension of the WPS protocol allows an enrollee tobe added to the infrastructure network by pushing a physical or virtualbutton on both the registrar device and the enrollee device within agiven time window, typically two minutes. As will be appreciated, thisimplementation avoids the necessity of entering any specificinformation, such as a PIN, and the attendant risk of errors due tomistyping or misreading. Other implementations of the WPS protocolinclude additional mechanisms for validating devices seeking enrollment,for example using Near-Field Communication (NFC) strategies.

Despite the simplicity offered by the WPS protocol, its application hasbeen limited to infrastructure network configurations which necessarilyrequire some type of distribution system, often in the form of adedicated access point. Although applicable in many situations, aninfrastructure network cannot accommodate ad hoc networks formed solelybetween client devices. This type of network configuration is known asan independent basic service set (IBSS) and includes only two or moredevices, or stations (STA), that operate in a peer relationship. IBSSnetworks do not have a distribution system or any other dedicated devicethat regulates the network. Without recourse to a WPS protocol, IBSSnetworks have conventionally required substantial manual configurationin order to properly setup secure communications between theparticipating devices.

Accordingly, it would be beneficial to provide a WPS protocol to setupan IBSS network and to add new devices to such networks. Similarly, itwould be beneficial to provide a system and method for providing thecreation, configuration and, joining of an ad hoc network between peerdevices requiring minimal user input. It would also be beneficial toprovide systems and methods for IBSS networking that do not requiremodification of existing protocols. This invention provides these andother benefits.

SUMMARY OF THE INVENTION

In accordance with the above objects and those that will be mentionedand will become apparent below, this disclosure is directed to a methodfor wireless communication comprising the steps of activating aconfiguration routine on a first device to cause the first device totransmit an activation information element and to scan for transmissionshaving an activation information element, wherein the first device is inunconfigured mode, receiving a transmission from a second device withthe first device, wherein the transmission includes an activationinformation element, exchanging information wirelessly between the firstdevice and the second device to provide the first device with a networkconfiguration profile, applying the network configuration profile to thefirst device to enable communication over an independent basic serviceset network with the second device, and setting the first device to aconfigured mode. As indicated, aspects of the method, such as thetransmission of activation information elements, conform to WPSprotocols. Preferably, the independent basic service set network employsWPA2 encryption. Also preferably, the step of activating a configurationroutine on the first device comprises pushing a button.

In one aspect, the step of receiving a transmission from the seconddevice comprises receiving a transmission including a configurationinformation element indicating the second device is in configured mode.Further, the step of transmitting a configuration information elementwith the first device preferably includes indicating whether the firstdevice is in configured or unconfigured mode.

Additionally, this embodiment can include activating a configurationroutine on the first device when the first device is in configured modeto cause the first device to transmit an activation information element,activating a configuration routine on a third device to cause the thirddevice to transmit an activation information element and to scan fortransmissions having an activation information element, wherein thethird device is in unconfigured mode, receiving a transmission from thefirst device with the third device, wherein the transmission includes anactivation information element, exchanging information wirelesslybetween the first device and the third device to provide the thirddevice with the network configuration profile, and applying the networkconfiguration profile to the third device to enable communication overan independent basic service set network with the first device and thesecond device. Additionally, this aspect can also include setting thethird device in configured mode after applying the network configurationprofile.

In yet another aspect, when the transmission received from the seconddevice includes a configuration information element indicating thesecond device is in unconfigured mode, the method includes the steps ofestablishing the second device as registrar and the first device asenrollee, generating the network configuration profile on the seconddevice, and setting the second device to a configured mode, beforeexchanging information wirelessly between the first device and thesecond device to provide the first device with the network configurationprofile. In the noted embodiment, establishing the second device asregistrar is preferably based on a comparison of the MAC address of thedevices.

The disclosure is also directed to a system for wireless communicationcomprising a first device transmitting an activation information elementand a second device transmitting an activation information element;wherein the first device is configured to receive a transmission havingthe activation information element from the second device, exchangeinformation wirelessly with the second device to obtain a networkconfiguration profile to allow communication with the second device overan independent basic service set network, and change status fromunconfigured to configured. Preferably, the first device and the seconddevice transmit activation information elements conforming to WPSprotocols. Also preferably, the independent basic service set networkemploys WPA2 encryption and the first device and the second device areconfigured to exchange information conforming to extensibleauthentication protocols. In another aspect of the disclosure, the firstdevice and second device are configured to transmit the activationinformation element for a set period of time after a user pushes abutton. Further, the first device and the second device can beconfigured to transmit a configuration information element thatindicates configured or unconfigured status.

In one embodiment, the system includes a third device, wherein the thirddevice is configured to receive a transmission from the first deviceincluding an activation information element and a configurationinformation element and exchange information wirelessly with the seconddevice to obtain a network configuration profile to allow communicationwith the second device over an independent basic service set networkwhen the configuration information element of the first device indicatesconfigured status. Preferably, the third device is configured to receivethe transmission from the first device after a configuration routine onthe third device is activated.

In another aspect of the system, the second device is configured tofunction as registrar when unconfigured and receiving a transmissionfrom the first device including a activation information element and aconfiguration information element indicating the first device isunconfigured by generating the network configuration profile andtransmitting a configuration information element indicating the seconddevice is configured. In such embodiments, the second device can beconfigured to function as registrar based upon a comparison of a MACaddress of the first device with a MAC address of the second device.

BRIEF DESCRIPTION OF THE DRAWINGS

Further features and advantages will become apparent from the followingand more particular description of the preferred embodiments of theinvention, as illustrated in the accompanying drawing, and in which likereferenced characters generally refer to the same parts or elementsthroughout the views, and in which:

FIG. 1 is a schematic representation of an IBSS network including threestations, showing the addition of two devices to a network establishedby a first configured device, according to the invention;

FIG. 2 is a schematic representation of an IBSS network including threestations, showing the addition of two devices to a network establishedby a first configured device when multiple PBC beacons are present,according to the invention; and

FIG. 3 is a schematic representation of an IBSS network including twostations, that is established when the two devices are initiallyunconfigured, according to the invention.

DETAILED DESCRIPTION OF THE INVENTION

At the outset, it is to be understood that this disclosure is notlimited to particularly exemplified materials, methods or structures assuch may, of course, vary. Thus, although a number of materials andmethods similar or equivalent to those described herein can be used inthe practice of embodiments of this disclosure, the preferred materialsand methods are described herein.

It is also to be understood that the terminology used herein is for thepurpose of describing particular embodiments of this disclosure only andis not intended to be limiting.

Unless defined otherwise, all technical and scientific terms used hereinhave the same meaning as commonly understood by one having ordinaryskill in the art to which the disclosure pertains.

Some portions of the detailed descriptions which follow are presented interms of procedures, logic blocks, processing and other symbolicrepresentations of operations on data bits within a computer memory.These descriptions and representations are the means used by thoseskilled in the data processing arts to most effectively convey thesubstance of their work to others skilled in the art. In the presentapplication, a procedure, logic block, process, or the like, isconceived to be a self-consistent sequence of steps or instructionsleading to a desired result. The steps are those requiring physicalmanipulations of physical quantities. Usually, although not necessarily,these quantities take the form of electrical or magnetic signals capableof being stored, transferred, combined, compared, and otherwisemanipulated in a computer system.

It should be borne in mind, however, that all of these and similar termsare to be associated with the appropriate physical quantities and aremerely convenient labels applied to these quantities. Unlessspecifically stated otherwise as apparent from the followingdiscussions, it is appreciated that throughout the present application,discussions utilizing the terms such as “accessing,” “receiving,”“sending,” “using,” “selecting,” “determining,” “normalizing,”“multiplying,” “averaging,” “monitoring,” “comparing,” “applying,”“updating,” “measuring,” “deriving” or the like, refer to the actionsand processes of a computer system, or similar electronic computingdevice, that manipulates and transforms data represented as physical(electronic) quantities within the computer system's registers andmemories into other data similarly represented as physical quantitieswithin the computer system memories or registers or other suchinformation storage, transmission or display devices.

Embodiments described herein may be discussed in the general context ofcomputer-executable instructions residing on some form ofcomputer-usable medium, such as program modules, executed by one or morecomputers or other devices. Generally, program modules include routines,programs, objects, components, data structures, etc., that performparticular tasks or implement particular abstract data types. Thefunctionality of the program modules may be combined or distributed asdesired in various embodiments.

By way of example, and not limitation, computer-usable media maycomprise computer storage media and communication media. Computerstorage media includes volatile and nonvolatile, removable andnon-removable media implemented in any method or technology for storageof information such as computer-readable instructions, data structures,program modules or other data. Computer storage media includes, but isnot limited to, random access memory (RAM), read only memory (ROM),electrically erasable programmable ROM (EEPROM), flash memory or othermemory technology, compact disk ROM (CD-ROM), digital versatile disks(DVDs) or other optical storage, magnetic cassettes, magnetic tape,magnetic disk storage or other magnetic storage devices, or any othermedium that can be used to store the desired information.

Communication media can embody computer-readable instructions, datastructures, program modules or other data in a modulated data signalsuch as a carrier wave or other transport mechanism and includes anyinformation delivery media. The term “modulated data signal” means asignal that has one or more of its characteristics set or changed insuch a manner as to encode information in the signal.

In the figures, a single block may be described as performing a functionor functions; however, in actual practice, the function or functionsperformed by that block may be performed in a single component or acrossmultiple components, and/or may be performed using hardware, usingsoftware, or using a combination of hardware and software. Also, theexemplary transmission and receiving stations may include componentsother than those shown, including well-known components such as aprocessor and memory and perhaps audio and visual components.

Further, all publications, patents and patent applications cited herein,whether supra or infra, are hereby incorporated by reference in theirentirety.

Finally, as used in this specification and the appended claims, thesingular forms “a, “an” and “the” include plural referents unless thecontent clearly dictates otherwise.

As indicated above, this disclosure is directed to the creation andjoining of IBSS networks using existing WPS protocols. WPS specifiesthat each compliant device periodically transmit a beacon indicatingnetwork status. Using the techniques of this disclosure, client devicessignal their state as configured or unconfigured to dictate whether theyfunction as registrar or enrollee in the network by including aconfiguration information element in the WPS beacon. Accordingly, whenthe configuration routine available though WPS-PBC is activated on eachdevice, the unconfigured enrollee device obtains the necessary networkconfiguration profile from the configured registrar device upon asuccessful WPS handshake process. Once a device has received the networkconfiguration profile, its status is switched to configured, allowing itto function as a registrar for the network for the subsequent additionof new devices. When both devices are initially in an unconfiguredstate, one is chosen to act as registrar, such as by comparison of MACaddresses, so that it can automatically generate the necessary networkconfiguration profile and pass it along to the other device. Followingthis process, both devices are set to configured mode. Specific detailsof these schemes are set forth in the scenarios depicted in the figuresand as discussed below.

In a first implementation of the disclosure, FIG. 1 represents ascenario in which three devices, STA1 112, STA2 114 and STA3 16communicate wirelessly by way of an IBSS network. Each device supportsthe WPS protocol in that both registrar and enrollee functions areenabled. Here, STA1 112 has already established an IBSS network and thushas been configured to act as a registrar. As such, STA1 already hascertain configuration parameters such as SSID and encryption method, forexample WPA2-PK and passphrase. Preferably, this profile is setautomatically by following the conventional WPS methods. Alternatively,the configuration can be performed manually. Since STA1 112 is set toconfigured mode, it will act as registrar and a configurationinformation element (IE) for STA1 112 is set to indicate that it is inconfigured mode, such as WiFi Simple Configuration information element(WSC IE). Similarly, STA2 114 and STA3 116, which seek to join thenetwork, start with configuration IEs set to unconfigured mode. Thisconfiguration IE is included in the WPS beacon transmissions of thedevices so as to communicate the status of the devices to members andpotential members of the network.

As indicated by block 118, the user of STA1 112 activates its PBCroutine by pressing a physical (hard) button or a virtual (soft) buttonimplemented in software, or through other suitable mechanisms. At thispoint, the WPS protocol allows STA1 112 to include in its beacon anactivation IE, such as PBC IE, indicating its role as registrar for thenetwork. A device seeking to join the network then follows the WPS-PBCprotocol by the user pressing a button on STA2 114, indicated by block120, activating its PBC routine. Activation of the PBC function on STA2114 similarly causes the inclusion of an activation IE in its beacon andinitiates a search for WPS-PBC beacons in the vicinity. At this point,STA2 114 can receive the beacon from STA1 112 and respond. The PBCroutine of each device is preferably set to time out after a set periodto minimize the chance of unauthorized devices being able to join thenetwork. In a preferred embodiment, the time out period is in the rangeof approximately 2 min.

As one of skill in the art will recognize, STA1 112 will now act asregistrar and STA2 114 as enrollee following the conventional WPSprotocol. This involves an exchange of information between STA1 112 andSTA2 114 as indicated by block 122. Generally, the information exchangedincludes a probe, an authentication routine and WPS and encryptionhandshaking. A successful exchange terminates with the transmission ofthe necessary configuration information and a confirmation ofencryption. At this point, STA2 114 has joined the IBSS network,allowing encrypted communication between STA1 112 and STA2 114 asindicated by network cloud 124.

As will be recognized by one of skill in the art, block 122 preferablyinvolves an initial probe request sent from the enrollee and a responsefrom the registrar. At this point, WPS utilizes the ExtensibleAuthentication Protocol (EAP), which includes a request from theregistrar that is answered by an EAP over LAN (EAPOL)-START frame. Next,EAP-Response/Identify and EAP-Request frames are used to exchangeWPS-defined messages, M1-M8. The WPS handshake routine includes thetransfer of relevant configuration profile information is delivered tothe enrollee, including SSID and encryption key, such as CCMPpassphrase/PSK. Finally, a WPA2 handshake routine between registrar andenrollee confirms successful encryption.

In a preferred implementation of the disclosure, the IBSS networksutilize Wi-Fi Protected Access 2 (WPA2). This encryption scheme isbackwards compatible with WPA and employs the EAP framework to allowcentralized mutual authentication and dynamic key management. However,if desired, appropriate modifications can be made to allow otherencryption methods such as Wired Equivalent Privacy (WEP) to be used.

The IE of STA2 114 is now set to configured mode, allowing STA2 114 toalso act as registrar for the network. The role of STA2 114 as registraris depicted with regard to STA3 116 joining the network as shown inFIG. 1. Upon STA2 114 being set to configured mode, both STA1 112 andSTA2 114 have the capability to act as registrar for the network. In thescenario shown in FIG. 1, the user of STA2 114 activates the PBCfunction, by pressing a button as represented by block 126, causing STA2114 to transmit a beacon having an IE indicating its status asconfigured and, thus, its availability as a WPS registrar for thenetwork.

In a similar manner to the process described above, when the user ofSTA3 116 seeks to join the network, the user activates the PBC routine,as indicated by block 128, such as by pressing a hard or soft button.Prior to joining the network, the WPS status of STA3 116 isunconfigured. Once the PBC function is activated in block 128, STA3 116scans for WPS-PBC devices and finds the beacon frame having theregistrar IE from STA2 114. This initiates the exchange of informationindicated by block 130, which includes the initial probe request andresponse, the EAP for the WPS handshakes. STA2 114 and STA3 116 nowcomplete the WPA2 handshakes to allow STA3 116 to join the IBSS networkand communicate with STA1 112 and STA2 114 as indicated by cloud 132.

Another implementation of the disclosure is shown in FIG. 2. In thisscenario, three devices, STA1 212, STA2 214 and STA3 216 are shownjoining an IBSS network. The process of STA2 214 joining issubstantially the same as described above with regard to FIG. 1.Specifically, STA1 212 is in configured mode and acts as the registrarand STA2 214 is initially unconfigured, and therefore the enrollee. Inblock 218, the user of STA1 212 activates its PBC functionality bypressing a button, causing the inclusion of a PBC IE in its beacon allowconfiguration of an enrollee device. STA2 214 initiates the process ofjoining the network by pressing a button in block 220 so that STA2 214will look for a WPS-PBC network to join. Since the scan will return thebeacon information from STA1 212, STA2 214 can then automatically jointhe network as described above by transferring the necessaryauthentication and configuration information in block 222. STA2 214joining the IBSS network is indicated by network cloud 224.

As before, an IE of STA2 214 is now set to configured mode, allowingSTA2 214 to also act as registrar for the network. As depicted in FIG.2, there are times that multiple WPS-PBC beacons will be in range of adevice, such as STA3 216 seeking to join a network. In this scenario,the users of STA1 212 and STA2 214 have both activated the PBC function,as represented by blocks 226 and 228, causing both devices to broadcastbeacons having IEs indicating being in configured mode and availabilityas WPS registrar.

Accordingly, when the user of STA3 216 seeks to join the network byactivating the PBC function, as indicated by block 230, the scan returnsbeacon information from both STA1 212 and STA2 214. Although not shown,one of skill in the art will recognize that STA3 216 could also receiveinformation corresponding to additional WPS-PBC networks in thevicinity. Therefore, the user of STA3 216 is presented with a list ofthe WPS-PBC networks found, allowing selection of the desired network,which in this embodiment is performed by selecting the beaconcorresponding to STA2 214 as indicated by block 232. As a result, STA3216 joins the IBSS network as indicated by cloud 234 and it is set toconfigured mode, so that it can be a registrar for the network. As willbe appreciated, a similar result would have been achieved had the userof STA3 216 selected STA1 212 as the registrar.

Yet another aspect of the disclosure is depicted in FIG. 3, in which twodevices, STA1 312 and STA2 314 initiate an IBSS network. This scenariodemonstrates the automatic configuration aspects of the WPS protocol.Initially, STA1 312 and STA2 314 have not joined a network. Accordingly,their beacon frame includes a configuration IE indicating they are inunconfigured mode. Next, the users of STA1 312 and STA2 314 initiate theformation of an IBSS network by activating the PBC functionality ontheir devices, such as by pushing hard or soft buttons as indicated byblocks 316 and 318, respectively. At this stage, STA1 312 and STA2 314now transmit beacon frames with an activation IE.

Upon discovery of each other's beacons, STA1 312 and STA2 314 thenexchange information in block 320 according to the WPS protocol asdescribed above. Since both enter the information exchange inunconfigured mode, a suitable scheme for establishing which device isgoing to act as registrar and which as enrollee is implemented. In apreferred embodiment, the device having the higher MAC address isdesignated the registrar. As such, it preferably automatically generatesthe necessary configuration information for the IBSS network, includingSSID, encryption method and passphrase. In the depicted embodiment, STA1312 has the higher MAC address to it becomes the registrar, performs thenetwork configuration and passes the configuration profile to enrollee,STA2 314. The result of this process is the formation of the IBSSnetwork, allowing secured wireless communication between STA1 312 andSTA2 314 as indicated by network cloud 322. Additionally, upongenerating the configuration profile and receiving the profile,respectively, STA1 312 and STA2 314 are then set to configured mode, sothat either can act as registrar for additional devices seeking to jointhe network.

Described herein are presently preferred embodiments, however, oneskilled in the art that pertains to the present invention willunderstand that the principles of this disclosure can be extended easilywith appropriate modifications to other applications.

What is claimed is:
 1. A method for wireless communication comprising:activating a configuration routine on a first device to cause the firstdevice to transmit a first frame having an activation informationelement and to scan for transmissions having an activation informationelement, wherein the first device is in unconfigured mode; receiving atransmission from a second device with the first device, wherein thereceived transmission has an activation information element; exchanginginformation wirelessly between the first device and the second device toprovide the first device with a network configuration profile,negotiated between the first device and the second device; applying thenetwork configuration profile to the first device to enablecommunication over an independent basic service set network with thesecond device; and setting the first device to a configured mode,wherein the first device and the second device are configured tofunction as registrars after exchanging the network configurationprofile and communicate the network configuration profile to a thirddevice in unconfigured mode.
 2. The method of claim 1, wherein thetransmission of the first frame having an activation information elementconforms to WPS protocols.
 3. The method of claim 2, wherein activatinga configuration routine on the first device comprises pushing a button.4. The method of claim 1, wherein the independent basic service setnetwork employs WPA2 encryption.
 5. The method of claim 1, whereinreceiving a transmission from the second device comprises receiving atransmission including a configuration information element indicatingthe second device is in configured mode.
 6. The method of claim 1,further comprising transmitting a configuration information element withthe first device, wherein the configuration information elementindicates whether the first device is in configured or unconfiguredmode.
 7. The method of claim 6, further comprising: activating aconfiguration routine on the first device when the first device is inconfigured mode to cause the first device to transmit a second framehaving an activation information element; activating a configurationroutine on the third device to cause the third device to transmit aframe having an activation information element and to scan fortransmissions having an activation information element; receiving atransmission from the first device with the third device, wherein thereceived transmission includes an activation information element;exchanging information wirelessly between the first device and the thirddevice to provide the third device with the network configurationprofile; and applying the network configuration profile with the thirddevice to enable communication over the independent basic service setnetwork with the first device and the second device.
 8. The method ofclaim 7, further comprising setting the third device in configured modeafter applying the network configuration profile.
 9. The method of claim1, wherein the transmission received from the second device includes aconfiguration information element indicating the second device is inunconfigured mode; further comprising: establishing the second device asregistrar and the first device as enrollee; generating the networkconfiguration profile on the second device; setting the second device toa configured mode; before exchanging information wirelessly between thefirst device and the second device to provide the first device with thenetwork configuration profile.
 10. The method of claim 9, whereinestablishing the second device as registrar is based on a comparison ofa MAC address of the first device to a MAC address of the second device.11. A system for wireless communication comprising a first devicetransmitting a first frame having an activation information element;wherein the first device is configured to receive a transmission havingan activation information element from a second device, exchangeinformation wirelessly with the second device to negotiate a networkconfiguration profile to allow communication with the second device overan independent basic service set network, and change status fromunconfigured to configured, wherein the first device and the seconddevice are configured to function as registrars after exchanging thenetwork configuration profile and communicate the network configurationprofile to a third device in unconfigured mode.
 12. The system of claim11, wherein the first device and the second device transmissions havingan activation information element conform to WPS protocols.
 13. Thesystem of claim 12, wherein the first device is configured to transmit aplurality of frames having an activation information element for a setperiod of time after a user pushes a button.
 14. The system of claim 11,wherein the independent basic service set network employs WPA2encryption.
 15. The system of claim 11, wherein the first device isconfigured to exchange information conforming to extensibleauthentication protocols.
 16. The system of claim 11, wherein the firstdevice is configured to transmit a frame having a configurationinformation element that indicates configured or unconfigured status.17. The system of claim 11, further comprising the third device, whereinthe third device is configured to receive a second frame transmitted bythe first device including an activation information element and aconfiguration information element and exchange information wirelesslywith the first device to obtain the network configuration profile toallow communication with the second device over the independent basicservice set network when the configuration information element of thefirst device indicates configured status.
 18. The system of claim 17,wherein the third device is configured to receive the second frame fromthe first device after a configuration routine on the third device isactivated.
 19. The system of claim 11, wherein the first device isconfigured to function as registrar when unconfigured and: receive atransmission from the second device including an activation informationelement and a configuration information element indicating the seconddevice is unconfigured; generate the network configuration profile: andtransmit a frame having a configuration information element indicatingthe first device is configured.
 20. The system of claim 19, wherein thefirst device is configured to function as registrar based upon acomparison of a MAC address of the first device with a MAC address ofthe second device.