Method, apparatus, and computer program product for filtering list in wireless request

ABSTRACT

Method, apparatus, and computer program product embodiments of the invention are disclosed to improve the discovery of wireless networks. In example embodiments of the invention, a method comprises: transmitting a wireless message including a list of one or more wireless devices, from which a response is not desired; and receiving zero or more responses from one or more other wireless devices that are not on the list.

FIELD

The embodiments relate to wireless communication, and more particularlyto improvements in discovering wireless networks.

BACKGROUND

Modern society has adopted, and is becoming reliant upon, wirelesscommunication devices for various purposes, such as connecting users ofthe wireless communication devices with other users. Wirelesscommunication devices can vary from battery powered handheld devices tostationary household and/or commercial devices utilizing an electricalnetwork as a power source. Due to rapid development of the wirelesscommunication devices, a number of areas capable of enabling entirelynew types of communication applications have emerged.

Cellular networks facilitate communication over large geographic areas.These network technologies have commonly been divided by generations,starting in the late 1970s to early 1980s with first generation (1G)analog cellular telephones that provided baseline voice communications,to modern digital cellular telephones. GSM is an example of a widelyemployed 2G digital cellular network communicating in the 900 MHZ/1.8GHZ bands in Europe and at 850 MHz and 1.9 GHZ in the United States.While long-range communication networks, like GSM, are a well-acceptedmeans for transmitting and receiving data, due to cost, traffic andlegislative concerns, these networks may not be appropriate for all dataapplications.

Short-range communication technologies provide communication solutionsthat avoid some of the problems seen in large cellular networks.Bluetooth™ is an example of a short-range wireless technology quicklygaining acceptance in the marketplace. In addition to Bluetooth™ otherpopular short-range communication technologies include Bluetooth™ LowEnergy, IEEE 802.11 wireless local area network (WLAN), Wireless USB(WUSB), Ultra Wide-band (UWB), ZigBee (IEEE 802.15.4, IEEE 802.15.4a),and ultra-high frequency radio frequency identification (UHF RFID)technologies. All of these wireless communication technologies havefeatures and advantages that make them appropriate for variousapplications.

SUMMARY

Method, apparatus, and computer program product embodiments of theinvention are disclosed to improve the discovery of wireless networks.

In example embodiments of the invention, a method comprises:

transmitting a wireless message including a list of one or more wirelessdevices, from which a response is not desired; and

receiving zero or more responses from one or more other wireless devicesthat are not on the list.

In example embodiments of the invention, the method further comprises:

wherein the wireless message is a probe request and the zero or moreresponses are probe responses.

In example embodiments of the invention, the method further comprises:

wherein the wireless message is a wireless generic advertisement servicerequest and the zero or more responses are wireless genericadvertisement service responses.

In example embodiments of the invention, the method further comprises:

wherein the one or more wireless devices included in the list, areaccess point devices.

In example embodiments of the invention, the method further comprises:

wherein the one or more wireless devices included in the list, arestations.

In example embodiments of the invention, the method further comprises:

transmitting a second wireless message including a second list of one ormore wireless devices, from which a response is not desired, the secondlist including the other devices that responded to the first said list,and

receiving zero or more responses from one or more additional otherwireless devices that are not on the first said list or the second list.

In example embodiments of the invention, the method further comprises:

wherein the one or more wireless devices included in the list, are knownfrom at least one previous scanning.

In example embodiments of the invention, the method further comprises:

wherein the one or more wireless devices included in the list, are knownfrom a location database.

In example embodiments of the invention, the method further comprises:

wherein the list includes at least one of device addresses and networkaddresses of the one or more wireless devices.

In example embodiments of the invention, the method further comprises:

prior to transmitting the wireless message, transmitting a precedingwireless message without the list of one or more wireless devices; and

omitting the inclusion of the list of one or more wireless devices inthe first said wireless message if no responses are received to thepreceding wireless message.

In example embodiments of the invention, an apparatus comprises:

at least one processor;

at least one memory including computer program code;

the at least one memory and the computer program code configured to,with the at least one processor, cause the apparatus at least to:

transmit a wireless message including a list of one or more wirelessdevices, from which a response is not desired; and

receive zero or more responses from one or more other wireless devicesthat are not on the list.

An example embodiment of the invention further comprises a computerprogram product comprising computer executable program code recorded ona computer readable, non-transitory storage medium, the computerexecutable program code, when executed by a computer processor,comprising:

code for transmitting a wireless message including a list of one or morewireless devices, from which a response is not desired; and

code for receiving zero or more responses from one or more otherwireless devices that are not on the list.

In example embodiments of the invention, a method comprises:

receiving by an apparatus, a wireless message from a sending device,including a list of one or more wireless devices, from which a responseto the wireless message is not desired; and

transmitting a response to the wireless message if the receivingapparatus is not on the list.

In example embodiments of the invention, the method further comprises:

wherein the wireless message is a probe request and the response is aprobe response or the wireless message is a wireless genericadvertisement service request and the response is a wireless genericadvertisement service response.

In example embodiments of the invention, the method further comprises:

wherein the one or more wireless devices included in the list, areaccess point devices or the one or more wireless devices included in thelist, are stations.

In example embodiments of the invention, the method further comprises:

receiving a second wireless message including a second list of one ormore wireless devices from which a response is not desired, the secondlist including the receiving apparatus that responded to the first saidlist, and

suppressing transmission of a response to the second message.

In example embodiments of the invention, the method further comprises:

wherein the one or more wireless devices included in the list, are knownfrom at least one previous scanning.

In example embodiments of the invention, the method further comprises:

wherein the one or more wireless devices included in the list, are knownfrom a location database.

In example embodiments of the invention, the method further comprises:

wherein the list includes device addresses of the one or more wirelessdevices.

In example embodiments of the invention, an apparatus comprises:

at least one processor;

at least one memory including computer program code;

the at least one memory and the computer program code configured to,with the at least one processor, cause the apparatus at least to:

receive a wireless message from a sending device, including a list ofone or more wireless devices, from which a response to the wirelessmessage is not desired; and

transmit a response to the wireless message if the apparatus is not onthe list.

An example embodiment of the invention further comprises a computerprogram product comprising computer executable program code recorded ona computer readable, non-transitory storage medium, the computerexecutable program code, when executed by a computer processor,comprising:

code for receiving by an apparatus, a wireless message from a sendingdevice, including a list of one or more wireless devices, from which aresponse to the wireless message is not desired; and

code for transmitting a response to the wireless message if thereceiving apparatus is not on the list.

In this manner, embodiments of the invention improve the discovery ofwireless networks.

DESCRIPTION OF THE FIGURES

FIG. 1A illustrates an example wireless network diagram of a sendingwireless node, NODE A, broadcasting a first message to a plurality ofseven receiving wireless nodes NODE 1 to NODE 7, in accordance withexample embodiments of the invention.

FIG. 1B illustrates the example wireless network diagram of FIG. 1A, ofthree receiving wireless nodes NODE 1, NODE 3, and NODE 4 of theplurality of seven receiving wireless node devices, replying to thewireless message with a response, in accordance with an exampleembodiment of the invention.

FIG. 1C illustrates the example wireless network diagram of FIG. 1B,wherein the sending wireless node, NODE A, broadcasts a second messageto the plurality of seven receiving wireless nodes, the wireless messageincluding a first filtering list of addresses of receiving wirelessnodes from which a response is not desired, the first filtering listcontaining the addresses of the receiving wireless nodes NODE 1, NODE 3,and NODE 4 that have previously responded to the first message, inaccordance with an example embodiment of the invention.

FIG. 1D illustrates the example wireless network diagram of FIG. 1C, ofthree additional receiving wireless nodes, NODE 2, NODE 5, and NODE 6 ofthe plurality of seven receiving wireless node devices, replying to thesecond message with a response, in accordance with an example embodimentof the invention.

FIG. 1E illustrates the example wireless network diagram of FIG. 1D,wherein the sending wireless node, NODE A, broadcasts a third message tothe plurality of seven receiving wireless nodes, the wireless messageincluding a second filtering list of addresses of receiving wirelessnodes from which a response is not desired, in accordance with anexample embodiment of the invention.

FIG. 1F illustrates the example wireless network diagram of FIG. 1E, ofthe last receiving wireless node, NODE 7, of the plurality of sevenreceiving wireless node devices, replying to the third message with aresponse, in accordance with an example embodiment of the invention.

FIG. 2 illustrates an example of the wireless message as a generalizedframe body that includes an information element, in accordance with anexample embodiment of the invention.

FIG. 2A illustrates an example of the wireless message as a proberequest frame, in accordance with an example embodiment of theinvention.

FIG. 2B illustrates an example frame body format of the probe responseframe, in accordance with an example embodiment of the invention.

FIG. 3A illustrates an example of the wireless message as a GenericAdvertisement Service Initial Request Frame, in accordance with anexample embodiment of the invention.

FIG. 3B illustrates an example frame body format of the GenericAdvertisement Service Initial Response Frame, in accordance with anexample embodiment of the invention.

FIG. 4A illustrates an example flow diagram of operational steps of anexample embodiment of the procedure performed in the sending wirelessnode, NODE A, according to an embodiment of the present invention.

FIG. 4B is an example flow diagram of operational steps of an exampleembodiment of the procedure performed in the receiving wireless nodedevice NODE 1, according to an embodiment of the present invention.

FIG. 5A illustrates an example wireless network and functional blockdiagram of the sending wireless node, NODE A, and the receiving wirelessnode, NODE 2, with the sending wireless node, NODE A, transmitting amessage frame, in accordance with an example embodiment of theinvention.

FIG. 5B illustrates the example wireless network and functional blockdiagram of FIG. 5A, of the sending wireless node, NODE A, and thereceiving wireless node, NODE 2, with the receiving wireless node, NODE2 transmitting a response frame, in accordance with an exampleembodiment of the invention.

FIG. 6 illustrates the example wireless network and functional blockdiagram of FIG. 5A, of the sending wireless node, NODE A, and a regionaldatabase containing the geographic locations of wireless nodes and theiraddresses, the sending wireless node, NODE A, and the regional databasecommunicating over a wide area wireless network, in accordance with anexample embodiment of the invention.

DISCUSSION OF EXAMPLE EMBODIMENTS OF THE INVENTION

This section is organized into the following topics:

A. WLAN Communication Technology

-   -   1. IEEE 802.11 MAC Frames and Information Elements    -   2. IEEE 802.11 Beacon, Probe Request and Response    -   3. Generic Advertisement Service (GAS)    -   4. Wi-Fi Direct—Software Access Points

B. Filtering List In Wireless Request

A. WLAN Communication Technology

An example wireless network, such as a Wireless Local Area Network(WLAN) may be organized as an independent basic service set (IBSS), meshbasic service set (MBSS) or an infrastructure basic service set (BSS).Wireless devices in an independent basic service set (IBSS) communicatedirectly with one another and there is no access point (AP) in the IBSS.A mesh basic service set (MBSS) consists of autonomous wireless devicesthat establish peer-to-peer wireless links that provide means formulti-hop communication. An infrastructure basic service set (BSS)includes a wireless access point that may be connected to one or moreservers and peripheral devices by a wired backbone connection. In aninfrastructure BSS, the access point is a central hub to which mobilewireless devices are wirelessly connected. The mobile wireless devicestypically do not communicate directly with one another, but communicateindirectly through the access point. An access point may be connected toother access points by a wired backbone connection in an extendedservice set (ESS). Mobile wireless devices may roam from one wirelessconnection with one access point to a second wireless connection with asecond access point in the ESS, and still be linked to the first accesspoint in the ESS via the wired backbone connection.

The IEEE 802.11 standard specifies methods and techniques of wirelesslocal area network (WLAN) operation. Examples include the IEEE 802.11band 802.11g wireless local area network specifications, which have beena staple technology for traditional WLAN applications in the 2.4 GHz ISMband. The various amendments to the IEEE 802.11 standard wereconsolidated for IEEE 802.11a, b, d, e, g, h, i, j protocols, into thebase standard IEEE 802.11-2007, Wireless Medium Access Control (MAC) andPhysical Layer (PHY) Specifications, June 2007 (incorporated herein byreference). Since then, emerging broadband applications have stimulatedinterest in developing very high-speed wireless networks for short rangecommunication, for example, the IEEE 802.11n, the planned IEEE 802.11ac, and the planned IEEE 802.11 ad WLAN specifications that are toprovide a very high throughput in higher frequency bands. Applicationsof these IEEE 802.11 standards include products such as consumerelectronics, telephones, personal computers, and access points for bothfor home and office.

According to an example embodiment, wireless local area networks (WLANs)typically operate in unlicensed bands. IEEE 802.11b and 802.11g WLANshave been a staple technology for traditional WLAN applications in the2.4 GHz ISM band and have a nominal range of 100 meters. The IEEE802.11ah WLAN standard is being developed for operation in the 900 MHzISM band and will have a greater range and lower obstruction losses dueto its longer wavelength.

1. IEEE 802.11 MAC Frames and Information Elements

There are three major types of medium access control (MAC) frames in theIEEE 802.11 protocol: the management frame, the control frame, and thedata frame. Management frames provide management services. Data framescarry payload data. Control frames assist in the delivery of dataframes. Each of these types of MAC frame consists of a MAC header, aframe body, and a frame check sequence (FCS). The header containscontrol information used for defining the type of 802.11 MAC frame andproviding information necessary to process the MAC frame. The frame bodycontains the data or information included in either management type ordata type frames. The frame check sequence is a value representing acyclic redundancy check (CRC) over all the fields of the MAC header andthe frame body field.

Management frames are used to provide management services that may bespecified by variable-length fields called information elements includedin the MAC frame body. An information element includes three fields: itsfunction is identified by an element ID field, its size is provided by alength field, and the information to deliver to the recipient isprovided in a variable-length information field.

2. IEEE 802.11 Beacon, Probe Request and Response

a. Beacon

The beacon frame is a management frame that is transmitted periodicallyto allow wireless devices to locate and identify a network. The beaconframe includes the fields: timestamp, beacon interval, and capabilityinformation. The timestamp contains the value of the device'ssynchronization timer at the time that the frame was transmitted. Thecapability information field is a 16-bit field that identifies thecapabilities of the device. The information elements in a beacon frameare the service set identifier (SSID), the supported rates, one or morephysical parameter sets, an optional contention-free parameter set, andan optional traffic indication map.

i. Infrastructure BSS Networks with an Access Point

In an infrastructure BSS networks with an Access Point, beacon framesare used for enabling wireless devices to establish and maintain orderlycommunications. The beacon frames are transmitted by the Access Pointsat regular intervals and include a frame header and a body with variousinformation, including a SSID identifying the name of a specific WLANand a beacon interval specifying the intended time interval between twobeacon transmissions. One purpose of the beacon frames is to inform thewireless devices about the presence of an Access Point in the area. Theaccess point in an infrastructure BSS IEEE 802.11 WLAN network, may be acentral hub that relays all communication between the mobile wirelessdevices (STAs) in an infrastructure BSS. If a STA in an infrastructureBSS wishes to communicate a frame of data to a second STA, thecommunication may take two hops. First, the originating STA may transferthe frame to the AP. Second, the AP may transfer the frame to the secondSTA. In an infrastructure BSS, the AP may transmit beacons or respond toprobes received from STAs. After a possible authentication of a STA thatmay be conducted by the AP, an association may occur between the AP anda STA enabling data traffic to be exchanged with the AP. The AccessPoint in an Infrastructure BSS may bridge traffic out of the BSS onto adistribution network. STAs that are members of the BSS may exchangepackets with the AP.

ii. Ad Hoc IBSS Networks

The first ad hoc wireless device to become active establishes an IBSSand starts sending beacons to inform the other wireless devices aboutthe presence of an ad hoc network in the area. Other ad hoc wirelessdevices may join the network after receiving a beacon and accepting theIBSS parameters, such as the beacon interval, found in the beacon frame.

Each wireless device that joins the ad hoc network may send a beaconperiodically if it doesn't hear a beacon from another device within ashort random delay period after the beacon is supposed to be sent. If awireless device doesn't hear a beacon within the random delay period,then the wireless device assumes that no other wireless devices areactive in the ad hoc network and a beacon needs to be sent.

A beacon signal is periodically transmitted from the ad hoc network. Thebeacon frame is transmitted periodically and includes the address of thesending device.

b. Probe Request

The probe request frame is a management frame that is transmitted by awireless device attempting to quickly locate a wireless local areanetwork (LAN). It may be used to locate independent basic service sets(IBSSs), infrastructure basic service sets (BSSs) or mesh basic servicesets (MBSSs) only or any of them. It may be used to locate a wirelessLAN with a particular SSID or to locate any wireless LAN. The proberequest frame may contain a service attribute request.

For active scans, the wireless device either broadcasts or unicasts aprobe request on the channel it is scanning. It may set the SSID in theprobe request to a wildcard SSID or to a specific SSID value. It may setthe BSSID in the probe request a wildcard BSSID or to a specific BSSIDvalue. With these options the wireless device can look for any SSID orBSSID, any representative of a specific SSID or a specific BSSID. Thewireless device will add any received beacons or probe responses to acached BSSID scan list. For passive scans, the wireless device does notsend a probe request, but instead, listens on a channel for a period oftime and adds any received beacons or probe responses to its cachedBSSID scan list. The wireless device may scan both infrastructure and adhoc networks, regardless of the current setting of its network mode. Thewireless device may use either the active or passive scanning methods,or a combination of both scanning methods. The wireless device performsthe scan across all the frequency channels and bands that it supports.

i. Infrastructure BSS Networks with an Access Point

The wireless device may transmit a probe request and receive a proberesponse from the access point in the BSS. The probe request istransmitted by a wireless device to obtain information from anotherstation or access point. For example, a wireless device may transmit aprobe request to determine whether a certain access point is available.In the infrastructure BSS, only the AP responds to probe requests. Theprobe response sent back by the AP contains a timestamp, beaconinterval, and capability information. It also includes the SSID of theBSS, supported rates, and PHY parameters. The wireless device STA maylearn that the access point AP will accept the STA's credentials.

Exemplary rules applied by the scanning wireless device (i.e. scanner)and the APs with active scanning are as follows:

1) Scanner (for each channel to be scanned):

-   -   a. Transmit a probe request frame (or multiple of thereof) with        the SSID and the BSSID fields set as per the scan command;    -   b. Reset ProbeTimer to zero and start it upon the probe request        transmission;    -   c. If nothing is detected (any signal with high enough energy)        on the channel before the ProbeTimer reaches MinChannelTime        (a.k.a. Min Probe_Response_Time), then go to scan the next        channel (if any), else when the ProbeTimer reaches        MaxChannelTime (i.e., Max_Probe_Response_Time), process all        received probe responses and go to scan the next channel (if        any).

2) APs:

-   -   a. An AP shall respond with a probe response only if:        -   i. The Address 1 field in the probe request frame is the            broadcast address or the specific MAC address of the AP; and        -   ii. The SSID in the probe request is the wildcard SSID, the            SSID in the probe request is the specific SSID of the AP, or            the specific SSID of the AP is included in the SSID list            element of the probe request, or the Address 3 field in the            probe request is the wildcard BSSID or the BSSID of the AP.    -   b. Some further conditions may be set as well for the generation        of a probe response.

In general, the probe request transmitter specifies the conditions thatwireless devices need to meet in order to respond to with a proberesponse. All wireless devices that fulfill the condition try to send aprobe response frame. The active scanning mechanism defines thesignaling.

ii. Ad Hoc IBSS Networks

The effect of receiving a probe request is to cause the wireless deviceto respond with a probe response if the conditions indicated in theprobe request are met. When a wireless device arrives within thecommunication range of any member of an ad hoc network, its proberequest frame inquiry signals are answered by a member of the ad hocnetwork detecting the inquiry. A device in an ad hoc network thatbroadcasted the latest beacon in the network responds to the proberequest frame inquiry signals with a probe response containing theaddress of the responding device. The probe response frame also includesthe timestamp, beacon interval, capability information, informationelements of the SSID, supported rates, one or more physical parametersets, the optional contention-free parameter set, and the optional adhoc network parameter set.

Once a device has performed an inquiry that results in one or more adhoc network descriptions, the device may choose to join one of the adhoc networks. The joining process may be a purely local process thatoccurs entirely internal to the wireless device. There may be noindication to the outside world that a device has joined a particular adhoc network. Joining an ad hoc network may require that all of thewireless device's MAC and physical parameters be synchronized with thedesired ad hoc network. To do this, the device may update its timer withthe value of the timer from the ad hoc network description, modified byadding the time elapsed since the description was acquired. This willsynchronize the timer to the ad hoc network. The BSSID of the ad hocnetwork may be adopted, as well as the parameters in the capabilityinformation field. Once this process is complete, the wireless devicehas joined the ad hoc network and is ready to begin communicating withthe devices in the ad hoc network.

c. Probe Response

The probe response sent back by a wireless device that met theconditions set by the received probe request contains a timestamp,beacon interval, and capability information. It also includes the SSIDof the BSS, supported rates, and PHY parameters.

According to an example embodiment, standard spacing intervals aredefined in the IEEE 802.11 specification, which delay a station's accessto the medium, between the end of the last symbol of the previous frameand the beginning of the first symbol of the next frame. The shortinterframe space (SIFS), the shortest of the interframe spaces, mayallow acknowledgement (ACK) frames and clear to send (CTS) frames tohave access to the medium before others. The longer duration distributedcoordination function (DCF) interframe space (IFS) or DCF InterframeSpace (DIFS) interval may be used for transmitting data frames andmanagement frames.

According to an example embodiment, after the channel has been released,IEEE 802.11 and before a probe response is transmitted, wireless devicesnormally employ a spectrum sensing capability during the SIFS intervalor DIFS interval, to detect whether the channel is busy. A carriersensing scheme may be used wherein a node wishing to transmit a proberesponse has to first listen to the channel for a predetermined amountof time to determine whether or not another node is transmitting on thechannel within the wireless range. If the channel is sensed to be idle,then the node may be permitted to begin the transmission process. If thechannel is sensed to be busy, then the node may delay its transmissionof a probe response for a random period of time called the backoffinterval. In the DCF protocol used in IEEE 802.11 networks, thestations, on sensing a channel idle for DIFS interval, may enter thebackoff phase with a random value between 0 and a maximum value CWmin.The backoff counter may be decremented from this selected value as longas the channel is sensed idle for a predetermined time interval. Afterevery received frame one may however wait for a DIFS before sensing thechannel status and resuming backoff counter update.

3. Generic Advertisement Service (GAS)

IEEE 802.11u-2011 is an amendment to the IEEE 802.11-2007 base standardpublished as IEEE 802.11u-2011, Wireless LAN Medium Access Control (MAC)and Physical Layer (PHY) Specifications, Amendment 9: Interworking withExternal Networks, Feb. 25, 2011 (incorporated herein by reference).IEEE 802.11u-2011 adds features to improve interworking with externalnetworks. IEEE 802.11u-2011 amendment establishes MAC and physical layerPHY protocols for an interworking service to permit a wireless device toexchange information with an external network, to enable the selectionof networks to connect to, and to enable access to emergency services. AGAS is specified in the IEEE 802.11u amendment to enable mobile wirelessdevices or STAs to discover the availability of information related todesired network services. For example, the GAS enables discovery ofinformation about services provided in an infrastructure basic serviceset, information about local access services, information from availableSubscription Service Providers (SSP) and/or Subscription ServiceProvider Networks (SSPNs) or other external networks. GAS enables awireless device to transmit a generic advertisement service initialrequest frame to request information about network services from accesspoints and it enables an access point to use a generic container, a GASinitial response frame, to advertise information about network servicesover an IEEE 802.11 network. The GAS protocol has been proposed to beupdated to operate with broadcast request and response messages. Publicaction frames are used to transport the GAS initial request frame andthe GAS initial response frame.

4. Wi-Fi Direct

The Wi-Fi Alliance has developed a Wi-Fi Peer-to-Peer technology namedWi-Fi Direct™ that is specified in the Wi-Fi Alliance Peer-to-PeerSpecification, October 2010 (incorporated herein by reference). Wi-FiDirect is also referred to herein as Peer-to-Peer (P2P) orDevice-to-Device (D2D). Wi-Fi Direct enables IEEE 802.11a, g, or ndevices to connect to one another, peer-to-peer, without prior setup orthe need for wireless access points. Devices that support Wi-Fi Directmay discover one another and advertise available services. Wi-Fi Directdevices support typical Wi-Fi ranges and the same data rates as can beachieved with an 802.11a, g, or n infrastructure connection. When adevice enters the range of the Wi-Fi Direct device, it may connect to itusing the specified protocol.

Wi-Fi Direct enables wireless devices that support Wi-Fi Direct, toconnect to one another, point-to-point, without joining aninfrastructure network. Wireless devices that support the specificationwill be able to discover one another and advertise available services.Wi-Fi Direct devices will support typical Wi-Fi ranges and the same datarates as can be achieved with an infrastructure connection. Wi-Fi Directprovides point-to-point connections for networks by embedding a softwareaccess point into any Wi-Fi Direct devices.

Wi-Fi Direct-certified devices may create direct connections betweeneach other without requiring the presence of a traditional Wi-Fiinfrastructure network of an access point or router. Wi-Fi Direct DeviceDiscovery and Service Discovery features allow users to identifyavailable devices and services before establishing a connection, forexample, discovering which Wi-Fi Direct devices have a printer. Wi-FiDirect devices may use Wi-Fi Protected Setup to create connectionsbetween devices.

A Wi-Fi Direct device is capable of a peer-to-peer connection and maysupport either an infrastructure network of an access point or router ora peer-to-peer connection. Wi-Fi Direct devices may join infrastructurenetworks as stations (STAs). Wi-Fi Direct devices may connect by forminggroups in a one-to-one or one-to-many topology. The groups functions ina manner similar to an infrastructure basic service set. A single Wi-FiDirect device will be the group owner that manages the group, includingcontrolling which devices are allowed to join and when the group isstarted or terminated. The group owner is responsible for responding toprobe requests in a similar manner as an AP of an infrastructure BSS.The group owner will appear as an access point to legacy client devices.A significant difference between a group owner and an access point isthat it is optional for the group owner to route and forward trafficbetween clients associated to it.

Wi-Fi Direct devices include Wi-Fi Protected Setup Internal Registrarfunctionality. A Wi-Fi Direct device may be a group owner of a group andmay be able to negotiate which device adopts this role when forming agroup with another Wi-Fi Direct device. A group may include both Wi-FiDirect devices and legacy devices (i.e., that are not compliant with theWi-Fi Alliance Peer-to-Peer Specification). Legacy devices may onlyfunction as clients within a group.

Wi-Fi Direct devices may support discovery mechanisms. Device discoveryis used to identify other Wi-Fi Direct devices and establish aconnection by using a scan similar to that used to discoverinfrastructure access points. If the target is not already part of agroup, a new group may be formed. If the target is already part of agroup, the searching Wi-Fi Direct device may attempt to join theexisting group. Wi-Fi Protected Setup may be used to obtain credentialsfrom the group owner and authenticate the searching Wi-Fi Direct device.Wi-Fi Direct devices may include service discovery that enables theadvertisement of services supported by higher layer applications toother Wi-Fi Direct devices. Service discovery may be performed at anytime (e.g. even before a connection is formed) with any other discoveredWi-Fi Direct device.

A Group may be created by a single Wi-Fi Direct device. When forming aconnection between two Wi-Fi Direct devices, a group may be formedautomatically and the devices may negotiate to determine which device isthe group owner. The group owner may decide if this is a temporary(single instance) or persistent (multiple, recurring use) group. After agroup is formed, a Wi-Fi Direct device may invite another Wi-Fi Directdevice to join the group. The decision of whether or not to accept aninvitation may be left to the invited Wi-Fi Direct device.

B. Filtering List in Wireless Request

Many use cases for wireless local area networks (WLANs) may be improvedby a faster initial link setup. For example, offloading traffic from awide area network to a WLAN in an efficient way requires a fast initiallink setup for the local area network.

Example WLANs that may be available for offloading traffic from a widearea network include, for example, IEEE 802.11, Digital EnhancedCordless Telecommunications (DECT), and HiperLAN networks.

WLAN discovery mechanisms include passive and active scanning. In thepassive scanning mode, a device or station listens to a channel for nolonger than an interval determined for the scan. In practice, thepassively scanning device looks for beacon frames from any access points(APs) or alternatively beacon frames that meet a given criterion, suchas a device address or network ID. When a device uses the activescanning, it generates probe request frames and transmits them torequest APs to reply with probe response frames providing requestedinformation.

It may be beneficial for scanning devices to reduce the level of trafficcontributed by their scanning operations. In some example embodiments, ascanning device may have already detected a responding network or accesspoint and, thus, may no longer need to receive additional proberesponses from the already discovered network or access point. In otherexample embodiments, the scanning device may have learned of theproximity of a network or access point, using a geolocation-baseddatabase.

In accordance with example embodiments of the invention, the scanningdevice may transmit a wireless request including a filtering list of oneor more access point devices or networks, from which no response isdesired, and the access point devices or networks will not respond tothe request if they are represented on the filtering list.

In example embodiments, the request may be a generalized management,control, or data frame including an information element that containsthe filtering list of addresses of wireless nodes from which a responseis not desired, in accordance with an example embodiment of theinvention. In example embodiments, the request may be an IEEE 802.11probe request or a generic advertisement service initial request. Inexample embodiments, one or more of the access point devices may begeneralized as a hub device representing either an access point devicein an infrastructure network or a group owner device in a peer-to-peernetwork, in accordance with example embodiments of the invention.

In example embodiments, the filtering list may specify attributes suchas a device MAC address and/or a network SSID or BSSID. If any of theparameters in filtering list matches those of a wireless noderesponsible for responding with a probe response, then the wireless nodemay not send a probe response.

In accordance with example embodiments of the invention, the filteringlist may enable obtaining the identity of all networks, access pointsand/or stations in an area, which match the characteristics that arerequested in the probe request, by virtue of limiting the quickerresponding networks from continuing to repeat their responses whileslower responding networks are attempting to access the channel.

In accordance with embodiments of the invention, all networks accesspoints and/or stations within one channel and location may beidentified. For example, the clocks in WLAN devices may run at differentspeeds or their CSMA/CA-based backoff calculations may have beenimplemented incorrectly or differently in different devices. As aresult, the different clock speeds and different backoff implementationsmay skew the randomness in obtaining a transmit opportunity (TXOP) andmay cause some devices achieve TXOP faster than others. For transmittinga probe response, a consistently longer random delay in achieving a TXOPmay cause the device to fail to respond within theMax_Probe_Response_Time, since other devices competing for the channelare able to exclusively seize it. In accordance with example embodimentsof the invention, the scanning device may transmit a wireless requestincluding a filtering list specifying the faster devices that havealready responded, from which no response is desired. Those fasterdevices will not respond to the request if they are represented on thefiltering list.

In accordance with example embodiments of the invention, unnecessaryresponses are eliminated, resulting in higher speed scanning, improveddevice discovery time, reduced network load, and a reduction in powerconsumption of the scanning device.

FIG. 1A illustrates an example wireless network diagram of a sendingwireless node, NODE A, broadcasting a first message 100 to a pluralityof seven receiving wireless nodes NODE 1 to NODE 7, in accordance withexample embodiments of the invention. In example embodiments, the firstmessage 100 may be a generalized management, control, or data frame, forexample an IEEE 802.11 probe request or a generic advertisement service(GAS) initial request. In example embodiments, the sending wirelessnode, NODE A, may be generalized as a mobile or fixed station device ora hub device representing either an access point device in aninfrastructure network or a group owner (GO) device in a peer-to-peer(P2P) network, in accordance with example embodiments of the invention.In example embodiments, one or more of the seven receiving wireless nodedevices NODE 1 to NODE 7, may be generalized as a mobile or fixedstation device or a hub device representing either an access pointdevice in an infrastructure network or a group owner (GO) device in aP2P network, in accordance with example embodiments of the invention.Any of the devices NODE 1 to NODE 7A may be a modern smartphoneconfigured as an access point so that it may share its cellulartelephone connection with other surrounding devices via a WLAN link.

FIG. 1B illustrates the example wireless network diagram of FIG. 1A, ofthree receiving wireless nodes NODE 1, NODE 3, and NODE 4 of theplurality of seven receiving wireless node devices, replying to thewireless message with a response 120(1), 120(3), 120(4) with theirrespective discovery data, for example node name, MAC address and/orSSID, in accordance with an example embodiment of the invention. Allseven receiving wireless nodes NODE 1 to NODE 7 may have responded. But,the three receiving wireless nodes NODE 1, NODE 3, and NODE 4 may havefaster clocks or their CSMA/CA-based backoff intervals may be shorterand, as a result, may cause the other receiving wireless nodes NODE 2,NODE 5, NODE 6, and NODE 7 to fail to respond within theMax_Probe_Response_Time, since the faster nodes NODE 1, NODE 3, and NODE4 competing for the channel are able to exclusively seize it.

FIG. 1C illustrates the example wireless network diagram of FIG. 1B,wherein the sending wireless node, NODE A, broadcasts a second message100′ to the plurality of seven receiving wireless nodes, the wirelessmessage including a first filtering list 110′ of addresses of receivingwireless nodes from which a response is not desired, the first filteringlist 110′ containing information, such as the addresses and/or SSIDs ofthe receiving wireless nodes NODE 1, NODE 3, and NODE 4 that havepreviously responded to the first message 100, in accordance with anexample embodiment of the invention. In example embodiments, the secondmessage 100′ may be a generalized management, control, or data frameincluding an information element that contains the filtering list 110′of addresses of wireless nodes from which a response is not desired, inaccordance with an example embodiment of the invention. In exampleembodiments, the second message 110′ may be an IEEE 802.11 probe requestor a generic advertisement service (GAS) initial request, in accordancewith an example embodiment of the invention.

In example embodiments of the invention, prior to transmitting thewireless message 100′, the preceding wireless message 100 is transmittedwithout a filtering list 110′ of addresses of receiving wireless nodesfrom which a response is not desired. If there are no responses receivedto the preceding wireless message 100, then omit the inclusion of thelist 110′ in the second wireless message 100′.

FIG. 1D illustrates the example wireless network diagram of FIG. 1C, ofthree additional receiving wireless nodes, NODE 2, NODE 5, and NODE 6 ofthe plurality of seven receiving wireless node devices, replying to thesecond message 100′ with respective responses 120(2), 120(5), 120(6)with their respective discovery data, for example node name, MAC addressand/or SSID, in accordance with an example embodiment of the invention.The four receiving wireless nodes NODE 2, NODE 5, NODE 6, and NODE 7 mayhave responded, since the first filtering list 110′ contains theaddresses for the other receiving wireless nodes NODE 1, NODE 3, andNODE 4 from which a response is not desired. But, the additionalreceiving wireless nodes NODE 2, NODE 5, and NODE 6 may have fasterclocks or their CSMA/CA-based backoff intervals may be shorter and, as aresult, may cause the remaining receiving wireless node, NODE 7 to failto respond within the Max_Probe_Response_Time, since the fasterreceiving wireless nodes NODE 2, NODE 5, and NODE 6 competing for thechannel are able to exclusively seize it.

FIG. 1E illustrates the example wireless network diagram of FIG. 1D,wherein the sending wireless node, NODE A, broadcasts a third message100″ to the plurality of seven receiving wireless nodes, the wirelessmessage 100″ including a second filtering list 110″ of information, suchas the addresses and/or SSIDs of receiving wireless nodes from which aresponse is not desired, the second filtering list 110″ containing theaddresses of the receiving wireless nodes NODE 1, NODE 3, and NODE 4that have previously responded to the first message 100 and the secondfiltering list 110″ further containing information, such as theaddresses and/or SSIDs of the receiving wireless nodes NODE 2, NODE 5,and NODE 6 that have previously responded to the second message 100′, inaccordance with an example embodiment of the invention.

FIG. 1F illustrates the example wireless network diagram of FIG. 1E, ofthe last receiving wireless node, NODE 7, of the plurality of sevenreceiving wireless node devices, replying to the third message 100″ witha response 120(7) with its discovery data, in accordance with an exampleembodiment of the invention. Only the receiving wireless node, NODE 7may respond, since the second filtering list 110″ contains information,such as the addresses and/or SSIDs for all of the other receivingwireless nodes NODE 1 to NODE 6 from which a response is not desired.

FIG. 2 illustrates an example of the wireless message 100′ broadcast bythe sending wireless node, NODE A, as a generalized frame body thatincludes an information element 102, in accordance with an exampleembodiment of the invention. In example embodiments, the message 100′may be a generalized management, control, or data frame including aninformation element 102 that contains the filtering list 110′ ofinformation, such as addresses and/or SSIDs of wireless nodes from whicha response is not desired, in accordance with an example embodiment ofthe invention. The message 100′ includes a header with MAC frame controlinformation field 211 and address fields 212 and the information element102. The information element 102 includes the element ID field 213, thelength field 214, and the information field that contains the filteringlist 110′. In example embodiments, the wireless message 100′ may be ageneralized management, control, or data frame including an informationelement that contains the filtering list 110′ of information, such asthe addresses and/or SSIDs of wireless nodes from which a response isnot desired, in accordance with an example embodiment of the invention.

In example embodiments, the information element 102 may be freely usedin management frames, depending on the information element definition.For example, if the information element is defined as a responsefiltering information element, the information element may be primarilyuseful in request frames transmitted with a broadcast or groupcastaddress to other devices that may respond. However, the informationelement 102 may also be used for informational purposes in proberesponse frames, GAS response frames, beacons, and data frames,depending on the information element definition.

FIG. 2A illustrates an example of the wireless message 100′ broadcast bythe sending wireless node, NODE A, as a management frame, such as aprobe request frame, in accordance with an example embodiment of theinvention. Probe request frame 100′ includes an IEEE 802.11 managementheader that includes MAC frame type 221 indicating it is a managementframe. Field 222 identifies the frame 100′ as a probe request packet.Field 224 is the source address for NODE A and field 225 is thebroadcast address. The payload portion of the probe request frame 100′includes the information element 102 that includes the filtering list110′ of information, such as addresses and/or SSIDs of wireless nodesfrom which a response is not desired.

FIG. 2B illustrates an example frame body format of the probe responseframe 120(1), in accordance with an example embodiment of the invention.FIG. 2B illustrates one example embodiment of a probe response frame120(1) sent by the receiving wireless node, NODE 1 to the sendingwireless node, NODE A. The probe response frame 120(1) includes an IEEE802.11 management header that includes MAC frame type 221 indicating itis a management frame. Field 222 identifies the frame 120(1) as a proberesponse packet. Field 224 is the source address for NODE 1 and field225 is the destination address NODE A. The payload portion 227 of theresponse frame 120(1) includes receiving wireless node, NODE 1 responsedata. In example embodiments, the receiving wireless node device NODE 1may be generalized as a mobile or fixed station device or a hub devicerepresenting either an access point device in an infrastructure networkor a group owner device in a peer-to-peer network, in accordance withexample embodiments of the invention.

FIG. 3A illustrates an example frame body format of the GenericAdvertisement Service Initial Request Frame 100′, in accordance with anexample embodiment of the invention. The IEEE 802.11 MAC managementframe 302 shown in FIG. 3A may have the frame control field indicatethat this is a management frame, the frame type and subtype fields areset to indicate an action frame. The frame body 304 category field thatmay indicate a public action frame to allow communications between anaccess point and an unassociated STA. An action field value of 10 mayindicate a GAS initial request, transmitted by a requesting STA torequest information from another STA. The GAS protocol has been proposedto be updated to operate with broadcast request and response messages.

In accordance with an example embodiment of the invention, as shown inFIG. 3A, when the public action field is set to value of 10 to indicateGAS initial request 100′, access network query protocol (ANQP)information elements may be sent with query request data. In accordancewith an example embodiment of the invention, the query request data mayinclude the filtering list 110′ of addresses of devices from which aresponse is not desired, sent from the sending wireless node, NODE A, toa broadcast address. The dialog token field may be set by the requestingstation with any value, such as “123”, to identify the GAS initialrequest frame. The GAS initial request frame 100′ may include a lengthvalue for the length of the following query request field.

FIG. 3B illustrates an example frame body format of the GenericAdvertisement Service Initial Response Frame 120(1), transmitted by thereceiving wireless node device NODE 1 to the sending wireless node, NODEA, in accordance with an example embodiment of the invention. The GASinitial response frame 120(1) shown in FIG. 3B, may include a categoryfield that is set to a value of 4 indicating a public action frame. TheGAS initial response frame 120(1) shown in FIG. 3B, may be sent to aunicast address, such as to sending wireless node, NODE A. There havebeen proposals to allow use of a broadcast address with the GAS initialresponse frame. The GAS initial response frame 120(1) shown in FIG. 3B,may include a dialog token field which is set to a value, such as “123”,identical to the corresponding value in the GAS initial request frame100, to enable relating the response frame to the request frame. The GASinitial response frame 120(1) shown in FIG. 3B, may include a comebackdelay value field.

In accordance with an example embodiment of the invention, the GenericAdvertisement Service Initial Response Frame 120(1) may have accessnetwork query protocol (ANQP) information elements sent in the queryresponse field for the receiving wireless node device NODE 1 responsedata. In example embodiments, the receiving wireless node device NODE 1may be generalized as a mobile or fixed station device or a hub devicerepresenting either an access point device in an infrastructure networkor a group owner device in a peer-to-peer network, in accordance withexample embodiments of the invention.

FIG. 4A illustrates an example flow diagram of operational steps of anexample embodiment of the procedure performed in the sending wirelessnode, NODE A, according to an embodiment of the present invention. FIG.4A illustrates an example embodiment of a flow diagram 400 for theprocess in the sending wireless node, NODE A. FIG. 4A illustrates anexample of steps in the procedure carried out by an apparatus, forexample the wireless device in executing-in-place program code stored inthe memory of the device. The steps in the procedure of the flow diagrammay be embodied as program logic stored in the memory of the wirelessdevice in the form of sequences of programmed instructions which, whenexecuted in the microprocessor control logic of the device, carry outthe functions of an exemplary disclosed embodiment. The steps may becarried out in another order than shown and individual steps may becombined or separated into component steps. Additional steps may beinserted into this sequence. The steps in the procedure are as follows:

Step 402: transmitting a wireless message by an apparatus, including alist of one or more wireless devices, from which a response is notdesired; and

Step 404: receiving zero or more responses by the apparatus, from one ormore other wireless devices that are not on the list.

FIG. 4B is an example flow diagram of operational steps of an exampleembodiment of the procedure performed in the receiving wireless nodedevice NODE 1, according to an embodiment of the present invention. FIG.4B illustrates an example embodiment of a flow diagram 450 for theprocess in the receiving wireless node device NODE 1. FIG. 4B is anexample of steps in the procedure carried out an apparatus, for examplethe wireless device in executing-in-place program code stored in thememory of the device. The steps in the procedure of the flow diagram maybe embodied as program logic stored in the memory of the wireless devicein the form of sequences of programmed instructions which, when executedin the microprocessor control logic of the device, carry out thefunctions of an exemplary disclosed embodiment. The steps may be carriedout in another order than shown and individual steps may be combined orseparated into component steps. Additional steps may be inserted intothis sequence. The steps in the procedure are as follows:

Step 452: receiving by an apparatus, a wireless message from a sendingdevice, including a list of one or more wireless devices, from which aresponse to the wireless message is not desired; and

Step 454: transmitting a response to the wireless message if thereceiving apparatus is not on the list.

FIG. 5A illustrates an example wireless network and functional blockdiagram of the sending wireless node, NODE A, and the receiving wirelessnode device NODE 2, with the sending wireless node, NODE A, transmittinga message frame 100′ that includes the filtering list 110′ of addressesfrom which a response is not desired, in accordance with an exampleembodiment of the invention. In example embodiments, the message 100′may be a generalized management, control, or data frame including aninformation element that contains the filtering list 110′ of addressesof wireless nodes from which a response is not desired, in accordancewith an example embodiment of the invention. In example embodiments, themessage 100′ may be an IEEE 802.11 probe request or a GAS initialrequest, in accordance with an example embodiment of the invention.Examples of wireless devices embodying NODE A and/or NODE 2 may includemobile phones, smartphones, personal digital assistants, pagers,Bluetooth™ headsets, wireless microphones, wireless remote controls,wireless sensors, laptops, palmtops, tablet computers, appliances withan embedded wireless micro-controller, engine control computers with awireless interface, video game consoles with a wireless interface,digital toys with a wireless interface, such as a wireless robot, andthe like.

FIG. 5B illustrates the example wireless network and functional blockdiagram of FIG. 5A, of the sending wireless node, NODE A, and thereceiving wireless node device NODE 2, with the receiving wireless nodedevice NODE 2 transmitting a response frame 120(2), to the sendingwireless node, NODE A, in accordance with an example embodiment of theinvention.

In accordance with an example embodiment of the invention, the sendingwireless node, NODE A, and the receiving wireless node device NODE 2 areshown in FIGS. 5A and 5B in functional block diagram form to illustratean example embodiment of their components. The receiving wireless nodedevice NODE 2 may include a processor 522′, which includes a single corecentral processing unit (CPU) or multiple core CPU 524′ and 525′, arandom access memory (RAM) 526′, a programmable read only memory (PROM)527′, and interface circuits 528′ to interface with one or more radiotransceivers 508′, battery or house power sources, keyboard, display,etc. The RAM and PROM may be removable memory devices such as smartcards, SIMs, WIMs, semiconductor memories such as RAM, ROM, PROMS, flashmemory devices, etc. Buffer 548, which may be a partition of the RAM526′ in NODE 2, buffers the response data.

In accordance with an example embodiment of the invention, the sendingwireless node, NODE A, may include a processor 522, which includes adual core central processing unit 524 and 525, a random access memory(RAM) 526, a programmable read only memory (PROM) 527, and interfacecircuits 528 to interface with one or more radio transceivers 508,battery and other power sources, key pad, touch screen, display,microphone, speakers, ear pieces, camera or other imaging devices, etc.in the sending wireless node, NODE A. The RAM and PROM may be removablememory devices such as smart cards, SIMs, WIMs, semiconductor memoriessuch as RAM, ROM, PROMS, flash memory devices, etc. A buffer that may bea partition of the RAM 526 in NODE A, buffers the filtering list 110′ ofaddresses from which a response is not desired.

In accordance with an example embodiment of the invention, an exampleembodiment of the WLAN protocol stack 502 may include the IEEE 802.11protocol in the sending wireless node, NODE A. An example embodiment ofthe WLAN protocol stack 502′ may include the IEEE 802.11 protocol in thereceiving wireless node device NODE 2. The protocol stacks 502 and 502′may be computer code instructions stored in the RAM and/or PROM memoryof the respective processors 522 and 522′, which when executed by thecentral processing units (CPU), carry out the functions of the exampleembodiments of the invention.

In an example embodiment of the sending wireless node, NODE A, ageolocation detector 550 establishes the current location of the sendingwireless node, NODE A. The detected location may then be compared withlocation and address data in the local database 552 in the sendingwireless node, NODE A, device, to determine if there are any otherwireless devices in the area. For example, by using the database 552, ifa receiving wireless node device NODE 1 is determined to be located inthe area, then the address of the receiving wireless node device NODE 1may be included in the filtering list 110′ of addresses from which aresponse is not desired, in accordance with an example embodiment of theinvention. The contents of the database 552 may be updated via the widearea radio 554 providing a wireless link to a regional database, such asthe regional database 600 of FIG. 6.

FIG. 6 illustrates the example wireless network and functional blockdiagram of FIG. 5A, of the sending wireless node, NODE A, and a regionaldatabase 600 containing data representing the geographic locations ofreceiving wireless nodes NODE 1 to NODE 7 and their addresses, thesending wireless node, NODE A, and the regional database 600communicating over a wide area wireless network, in accordance with anexample embodiment of the invention. The regional database 600 mayinclude a processor 622, which includes a single core central processingunit (CPU) or multiple core CPU 624 and 625, a random access memory(RAM) 626, a read only memory (ROM) 627. Buffer 630, which may be apartition of the RAM 626 in regional database 600, buffers the datarepresenting the geographic locations of the nodes and their addresses.

The wide area wireless network may be, for example, an IEEE 802.16hwireless metropolitan area network (WMAN) (IEEE Standard 802.16h-2010)or a cellular telephone network. The contents of the local database 552in sending wireless node, NODE A, may be updated via the wide area radio654 in the regional database 600.

The regional database 600 may be part of a hierarchical distributeddatabase referred to as the territory domain system. The territorydomain system enables locating and identifying the geographic area ofspecific hosting entities, related services and information required toaccess the hosting entities and their services. The communicationterritories and interference territories are unique geographical areasthat are managed by a server associated with the correspondinggeographic area, in the territory domain system.

In accordance with example embodiments of the invention, a HIPERLAN Type1 device may perform groupcasting or broadcasting of a wireless requestto a plurality of other HIPERLAN Type 1 devices, specifying one or morerequired characteristics, the request including a request frame 100′that includes the filtering list 110′ of information, such as addressesor SSIDs from which a response is not desired, in accordance with anexample embodiment of the invention. The requesting HIPERLAN Type 1device may receive one or more wireless responses from only one or moreof the plurality of HIPERLAN Type 1 devices that are not represented onthe filtering list 110′.

The HIPERLAN standard provides a wireless LAN with a high data rate ofup to 54 Mbps and a medium-range of 50 meters. There are two HIPERLANstandards. HIPERLAN Type 1 is a dynamic, priority driven channel accessprotocol similar to wireless Ethernet. HIPERLAN Type 2 is reservedchannel access protocol similar to a wireless version of ATM. HIPERLANType 1 ad hoc networks support distributed activities similar those ofthe Bluetooth piconets and IEEE 802.11 IBSS. The HIPERLAN Type 1standard provides wireless devices with service inquiry features similarto those of the Bluetooth inquiry and scanning features and the IEEE802.11 probe request and response features. An overview of the HIPERLANType 1 principles of operation is provided in the publication HIPERLANType 1 Standard, ETSI ETS 300 652, WA2 Dec. 1997.

In accordance with example embodiments of the invention, a HIPERLAN Type2 device may perform groupcasting or broadcasting of a wireless requestto a plurality of other HIPERLAN Type 2 devices, specifying one or morerequired characteristics, the request including a request frame 100′that includes the filtering list 110′ of addresses from which a responseis not desired, in accordance with an example embodiment of theinvention. The requesting HIPERLAN Type 2 device may receive one or morewireless responses from only one or more of the plurality of HIPERLANType 2 devices that are not represented on the filtering list 110′.

HIPERLAN Type 2 is a reserved channel access protocol that forms ad hocnetworks. HIPERLAN Type 2 ad hoc networks support distributed activitiessimilar those of the HIPERLAN Type 1 ad hoc networks, Bluetooth piconetsand IEEE 802 IBSS. Centralized mode is used to operate HIPERLAN Type 2as an access network via a fixed access point. In addition a capabilityfor direct link communication is provided. This mode is used to operateHIPERLAN Type 2 as an ad hoc network without relying on a cellularnetwork infrastructure. Restricted user mobility is supported within thelocal service area. Wide area roaming mobility can also be supported. Anoverview of the HIPERLAN Type 2 principles of operation is provided inthe Broadband Radio Access Networks (BRAN), HIPERLAN Type 2, SystemOverview, ETSI TR 101 683 VI.I.1 (2000-02) and a more detailedspecification of its ad hoc network architecture is described inHIPERLAN Type 2. Data Link Control (DLC) Layer; Part 4. Extension forHome Environment, ETSITS 101 761-4 V1.2.1 (2000-12).

In addition to IEEE 802.11 based WLAN, the features described herein maybe employed in other short-range communication technologies, such asBluetooth, Wireless Universal Serial Bus (WUSB), Ultra Wide-band (UWB),ZigBee (IEEE 802.15.4, IEEE 802.15.4a), and ultra-high frequency radiofrequency identification (UHF RFID) technologies.

An example embodiment of the invention further comprises a computerprogram product comprising computer executable program code recorded ona computer readable, non-transitory storage medium, the computerexecutable program code, when executed by a computer processor,comprising:

code for receiving by an apparatus, a wireless message from a sendingdevice, including a list of one or more wireless devices, from which aresponse to the wireless message is not desired; and

code for transmitting a response to the wireless message if thereceiving apparatus is not on the list.

An example embodiment of the invention further comprises a computerprogram product comprising computer executable program code recorded ona computer readable, non-transitory storage medium, the computerexecutable program code, when executed by a computer processor,comprising:

code for transmitting a wireless message including a list of one or morewireless devices, from which a response is not desired; and

code for receiving zero or more responses from one or more otherwireless devices that are not on the list.

Using the description provided herein, the embodiments may beimplemented as a machine, process, or article of manufacture by usingstandard programming and/or engineering techniques to produceprogramming software, firmware, hardware or any combination thereof.

Any resulting program(s), having computer-readable program code, may beembodied on one or more computer-usable media such as resident memorydevices, smart cards or other removable memory devices, or transmittingdevices, thereby making a computer program product or article ofmanufacture according to the embodiments. As such, the terms “article ofmanufacture” and “computer program product” as used herein are intendedto encompass a computer program that exists permanently or temporarilyon any computer-usable, non-transitory medium.

As indicated above, memory/storage devices include, but are not limitedto, disks, optical disks, removable memory devices such as smart cards,SIMs, WIMs, semiconductor memories such as RAM, ROM, PROMS, etc.Transmitting mediums include, but are not limited to, transmissions viawireless communication networks, the Internet, intranets,telephone/modem-based network communication, hard-wired/cabledcommunication network, satellite communication, and other stationary ormobile network systems/communication links.

Although specific example embodiments have been disclosed, a personskilled in the art will understand that changes can be made to thespecific example embodiments without departing from the spirit and scopeof the invention. For instance, the features described herein may beemployed in other networks beside short-range wireless networks, forexample wireless local area networks.

What is claimed is:
 1. A method comprising: transmitting, by anapparatus, a first wireless request message; receiving, by theapparatus, zero or more responses from one or more other wirelessdevices; transmitting, by the apparatus, a second wireless requestmessage including a first list of one or more wireless devices, fromwhich a response is not desired, the first list including the otherdevices that responded to the first wireless request message, in thezero or more responses received by the apparatus; receiving, by theapparatus, zero or more responses from one or more other wirelessdevices that are not on the first list; transmitting, by the apparatus,a third wireless request message including a second list of one or morewireless devices, from which a response is not desired, the second listincluding the other devices that responded to the first wireless requestmessage and the other devices that responded to the first said list, inthe zero or more responses received by the apparatus; and receiving, bythe apparatus, zero or more responses from one or more additional otherwireless devices that are not on the first said list or the second list.2. The method of claim 1, further comprising: wherein the wirelessrequest message is a probe request and the zero or more responses areprobe responses.
 3. The method of claim 1, further comprising: whereinthe wireless request message is a wireless generic advertisement servicerequest and the zero or more responses are wireless genericadvertisement service responses.
 4. The method of claim 1, furthercomprising: wherein the one or more wireless devices included in thelist, are access point devices.
 5. The method of claim 1, furthercomprising: wherein the one or more wireless devices included in thelist, are stations.
 6. The method of claim 1, further comprising:wherein the one or more wireless devices included in the list, are knownfrom at least one previous scanning.
 7. The method of claim 1, furthercomprising: wherein the one or more wireless devices included in thelist, are known from a location database.
 8. The method of claim 1,further comprising: wherein the list includes at least one of deviceaddresses and network addresses of the one or more wireless devices. 9.The method of claim 1, further comprising: prior to transmitting thewireless request message, transmitting a preceding wireless messagewithout the list of one or more wireless devices; and omitting theinclusion of the list of one or more wireless devices in the first saidwireless request message if no responses are received to the precedingwireless message.
 10. The method of claim 1, further comprising: whereinthe wireless request message is a first management frame and the zero ormore responses are second managed frames.
 11. The method of claim 1,further comprising: wherein the wireless request message is at least oneof a broadcast message and a groupcast message.
 12. An apparatuscomprising: at least one processor; at least one memory includingcomputer program code; the at least one memory and the computer programcode configured to, with the at least one processor, cause the apparatusat least to: transmit a first wireless request message; receive zero ormore responses from one or more other wireless devices; transmit asecond wireless request message including a first list of one or morewireless devices, from which a response is not desired, the first listincluding the other devices that responded to the first wireless requestmessage, in the zero or more responses received by the apparatus;receive zero or more responses from one or more other wireless devicesthat are not on the first list; transmit a third wireless requestmessage including a second list of one or more wireless devices, fromwhich a response is not desired, the second list including the otherdevices that responded to the first wireless request message and theother devices that responded to the first said list, in the zero or moreresponses received by the apparatus; and receive zero or more responsesfrom one or more additional other wireless devices that are not on thefirst said list or the second list.
 13. A method comprising: receivingby an apparatus, a wireless request message from a sending device,including a first list of one or more wireless devices, from which aresponse to the wireless request message is not desired, the first listincluding other devices that have responded to prior wireless requestmessages from the sending device; transmitting a response to thewireless request message if the receiving apparatus is not on the firstlist; receiving a second wireless request message including a secondlist of one or more wireless devices from which a response is notdesired, the second list including the other devices that have respondedto prior wireless request messages from the sending device and thereceiving apparatus that responded to the first said list; andsuppressing transmission of a response to the second wireless requestmessage.
 14. The method of claim 13, further comprising: wherein thewireless request message is a probe request and the response is a proberesponse or the wireless request message is a wireless genericadvertisement service request and the response is a wireless genericadvertisement service response.
 15. The method of claim 13, furthercomprising: wherein the one or more wireless devices included in thelist, are access point devices or the one or more wireless devicesincluded in the list, are stations.
 16. The method of claim 13, furthercomprising: wherein the one or more wireless devices included in thelist, are known from at least one previous scanning.
 17. The method ofclaim 13, further comprising: wherein the list includes device addressesof the one or more wireless devices.
 18. An apparatus comprising: atleast one processor; at least one memory including computer programcode; the at least one memory and the computer program code configuredto, with the at least one processor, cause the apparatus at least to:receive a wireless request message from a sending device, including afirst list of one or more wireless devices, from which a response to thewireless request message is not desired, the first list including otherdevices that have responded to prior wireless request messages from thesending device; transmit a response to the wireless request message ifthe receiving apparatus is not on the first list; receive a secondwireless request message including a second list of one or more wirelessdevices from which a response is not desired, the second list includingthe other devices that have responded to prior wireless request messagesfrom the sending device and the receiving apparatus that responded tothe first said list; and suppress transmission of a response to thesecond wireless request message.