Network discovery utilizing cellular broadcasts/multicasts

ABSTRACT

This document describes, e.g., a system and method for minimizing superfluous signaling traffic and for minimizing data processing pressures on a network including a network information repository (NIR), comprising: having mobile stations that enter a network domain compare and detect inconsistencies in network information received through different sources and report those inconsistencies to the NIR; having the NIR update a cell broadcast controller (CBC)/BMSC with said network information; and having the CBC/BMSC broadcast or multicast the updated information.

The present application is a continuation-in-part of U.S.Non-Provisional application Ser. No. 11/456,820, filed Jul. 11, 2006,and the present application claims priority to U.S. provisionalapplication Ser. No. 60/596,659, filed on Oct. 11, 2005, the entiredisclosures of which are incorporated herein by reference as thoughrecited herein in full. In addition, the entire disclosure of thepresent assignees' prior U.S. patent application Ser. No. 11/267,590,entitled Network Discovery Mechanisms, filed on Nov. 7, 2005, is alsoincorporated herein by reference for reference.

BACKGROUND

1. Field Of The Invention

The present application relates to wireless communications and inparticular to, inter alia, a methods and systems for network discovery.

2. Background Discussion:

Networks and Internet Protocol:

There are many types of computer networks, with the Internet having themost notoriety. The Internet is a worldwide network of computernetworks. Today, the Internet is a public and self-sustaining networkthat is available to many millions of users. The Internet uses a set ofcommunication protocols called TCP/IP (i.e., Transmission ControlProtocol/Internet Protocol) to connect hosts. The Internet has acommunications infrastructure known as the Internet backbone. Access tothe Internet backbone is largely controlled by Internet ServiceProviders (ISPs) that resell access to corporations and individuals.

With respect to IP (Internet Protocol), this is a protocol by which datacan be sent from one device (e.g., a phone, a PDA [Personal DigitalAssistant], a computer, etc.) to another device on a network. There area variety of versions of IP today, including, e.g., IPv4, IPv6, etc.Each host device on the network has at least one IP address that is itsown unique identifier. IP is a connectionless protocol. The connectionbetween end points during a communication is not continuous. When a usersends or receives data or messages, the data or messages are dividedinto components known as packets. Every packet is treated as anindependent unit of data.

In order to standardize the transmission between points over theInternet or the like networks, an OSI (Open Systems Interconnection)model was established. The OSI model separates the communicationsprocesses between two points in a network into seven stacked layers,with each layer adding its own set of functions. Each device handles amessage so that there is a downward flow through each layer at a sendingend point and an upward flow through the layers at a receiving endpoint. The programming and/or hardware that provides the seven layers offunction is typically a combination of device operating systems,application software, TCP/IP and/or other transport and networkprotocols, and other software and hardware.

Typically, the top four layers are used when a message passes from or toa user and the bottom three layers are used when a message passesthrough a device (e.g., an IP host device). An IP host is any device onthe network that is capable of transmitting and receiving IP packets,such as a server, a router or a workstation. Messages destined for someother host are not passed up to the upper layers but are forwarded tothe other host. The layers of the OSI model are listed below. Layer 7(i.e., the application layer) is a layer at which, e.g., communicationpartners are identified, quality of service is identified, userauthentication and privacy are considered, constraints on data syntaxare identified, etc. Layer 6 (i.e., the presentation layer) is a layerthat, e.g., converts incoming and outgoing data from one presentationformat to another, etc. Layer 5 (i.e., the session layer) is a layerthat, e.g., sets up, coordinates, and terminates conversations,exchanges and dialogs between the applications, etc. Layer-4 (i.e., thetransport layer) is a layer that, e.g., manages end-to-end control anderror-checking, etc. Layer-3 (i.e., the network layer) is a layer that,e.g., handles routing and forwarding, etc. Layer-2 (i.e., the data-linklayer) is a layer that, e.g., provides synchronization for the physicallevel, does bit-stuffing and furnishes transmission protocol knowledgeand management, etc. The Institute of Electrical and ElectronicsEngineers (IEEE) sub-divides the data-link layer into two furthersub-layers, the MAC (Media Access Control) layer that controls the datatransfer to and from the physical layer and the LLC (Logical LinkControl) layer that interfaces with the network layer and interpretscommands and performs error recovery. Layer 1 (i.e., the physical layer)is a layer that, e.g., conveys the bit stream through the network at thephysical level. The IEEE sub-divides the physical layer into the PLCP(Physical Layer Convergence Procedure) sub-layer and the PMD (PhysicalMedium Dependent) sub-layer.

Wireless Networks:

Wireless networks can incorporate a variety of types of mobile devices,such as, e.g., cellular and wireless telephones, PCs (personalcomputers), laptop computers, wearable computers, cordless phones,pagers, headsets, printers, PDAs, etc. For example, mobile devices mayinclude digital systems to secure fast wireless transmissions of voiceand/or data. Typical mobile devices include some or all of the followingcomponents: a transceiver (i.e., a transmitter and a receiver,including, e.g., a single chip transceiver with an integratedtransmitter, receiver and, if desired, other functions); an antenna; aprocessor; one or more audio transducers (for example, a speaker or amicrophone as in devices for audio communications); electromagnetic datastorage (such as, e.g., ROM, RAM, digital data storage, etc., such as indevices where data processing is provided); memory; flash memory; a fullchip set or integrated circuit; interfaces (such as, e.g., USB, CODEC,UART, PCM, etc.); and/or the like.

Wireless LANs (WLANs) in which a mobile user can connect to a local areanetwork (LAN) through a wireless connection may be employed for wirelesscommunications. Wireless communications can include, e.g.,communications that propagate via electromagnetic waves, such as light,infrared, radio, microwave. There are a variety of WLAN standards thatcurrently exist, such as, e.g., Bluetooth, IEEE 802.11, and HomeRF.

By way of example, Bluetooth products may be used to provide linksbetween mobile computers, mobile phones, portable handheld devices,personal digital assistants (PDAs), and other mobile devices andconnectivity to the Internet. Bluetooth is a computing andtelecommunications industry specification that details how mobiledevices can easily interconnect with each other and with non-mobiledevices using a short-range wireless connection. Bluetooth creates adigital wireless protocol to address end-user problems arising from theproliferation of various mobile devices that need to keep datasynchronized and consistent from one device to another, thereby allowingequipment from different vendors to work seamlessly together. Bluetoothdevices may be named according to a common naming concept. For example,a Bluetooth device may possess a Bluetooth Device Name (BDN) or a nameassociated with a unique Bluetooth Device Address (BDA). Bluetoothdevices may also participate in an Internet Protocol (IP) network. If aBluetooth device functions on an IP network, it may be provided with anIP address and an IP (network) name. Thus, a Bluetooth Device configuredto participate on an IP network may contain, e.g., a BDN, a BDA, an IPaddress and an IP name. The term “IP name” refers to a namecorresponding to an IP address of an interface.

An IEEE standard, IEEE 802.11, specifies technologies for wireless LANsand devices. Using 802.11, wireless networking may be accomplished witheach single base station supporting several devices. In some examples,devices may come pre-equipped with wireless hardware or a user mayinstall a separate piece of hardware, such as a card, that may includean antenna. By way of example, devices used in 802.11 typically includethree notable elements, whether or not the device is an access point(AP), a mobile station (STA), a bridge, a PCMCIA card or another device:a radio transceiver; an antenna; and a MAC (Media Access Control) layerthat controls packet flow between points in a network.

In addition, Multiple Interface Devices (MIDs) may be utilized in somewireless networks. MIDs may contain two independent network interfaces,such as a Bluetooth interface and an 802.11 interface, thus allowing theMID to participate on two separate networks as well as to interface withBluetooth devices. The MID may have an IP address and a common IP(network) name associated with the IP address.

Wireless network devices may include, but are not limited to Bluetoothdevices, Multiple Interface Devices (MIDs), 802.11x devices (IEEE 802.11devices including, e.g., 802.11a, 802.11b and 802.11g devices), HomeRF(Home Radio Frequency) devices, Wi-Fi (Wireless Fidelity) devices, GPRS(General Packet Radio Service) devices, 3G cellular devices, 2.5Gcellular devices, GSM (Global System for Mobile Communications) devices,EDGE (Enhanced Data for GSM Evolution) devices, TDMA type (Time DivisionMultiple Access) devices, or CDMA type (Code Division Multiple Access)devices, including CDMA2000. Each network device may contain addressesof varying types including but not limited to an IP address, a BluetoothDevice Address, a Bluetooth Common Name, a Bluetooth IP address, aBluetooth IP Common Name, an 802.11 IP Address, an 802.11 IP commonName, or an IEEE MAC address.

Wireless networks can also involve methods and protocols found in, e.g.,Mobile IP (Internet Protocol) systems, in PCS systems, and in othermobile network systems. With respect to Mobile IP, this involves astandard communications protocol created by the Internet EngineeringTask Force (IETF). With Mobile IP, mobile device users can move acrossnetworks while maintaining their IP Address assigned once. See Requestfor Comments (RFC) 3344. NB: RFCs are formal documents of the InternetEngineering Task Force (IETF). Mobile IP enhances Internet Protocol (IP)and adds means to forward Internet traffic to mobile devices whenconnecting outside their home network. Mobile IP assigns each mobilenode a home address on its home network and a care-of-address (CoA) thatidentifies the current location of the device within a network and itssubnets. When a device is moved to a different network, it receives anew care-of address. A mobility agent on the home network can associateeach home address with its care-of address. The mobile node can send thehome agent a binding update each time it changes its care-of addressusing, e.g., Internet Control Message Protocol (ICMP).

In basic IP routing (e.g., outside mobile IP), routing mechanisms relyon the assumptions that each network node always has a constantattachment point to, e.g., the Internet and that each node's IP addressidentifies the network link it is attached to. In this document, theterminology “node” includes a connection point, which can include, e.g.,a redistribution point or an end point for data transmissions, and whichcan recognize, process and/or forward communications to other nodes. Forexample, Internet routers can look at, e.g., an IP address prefix or thelike identifying a device's network. Then, at a network level, routerscan look at, e.g., a set of bits identifying a particular subnet. Then,at a subnet level, routers can look at, e.g., a set of bits identifyinga particular device. With typical mobile IP communications, if a userdisconnects a mobile device from, e.g., the Internet and tries toreconnect it at a new subnet, then the device has to be reconfiguredwith a new IP address, a proper netmask and a default router. Otherwise,routing protocols would not be able to deliver the packets properly.

Network Discovery

Future Mobile Communication Systems will focus on integration ofheterogeneous Radio Access Technologies. These technologies may compriseof e.g., PANs (Personal Area Networks with very small coverage), WLANs(Local Area Networks with comparatively large coverage area), and WANs(Wide Area Networks with comparatively larger coverage area e.g.,cellular or WiMax). Since focus is on integration, the requirements aremore stringent than those for simply interworking. One such requirementis global roaming across these heterogeneous Radio Access Technologieswith ubiquitous and transparent service provisioning. Global Roamingnecessitates efficient method for quick vertical handovers, which inturn demands

(a) Identification of certain Network Elements ahead of time; and

(b) Communication of Mobile Station (MS) with these Network Elements inadvance.

Identification of Network Elements means determining the existence ofAPs (Access Points), Routers, DHCP Servers (Dynamic Host ConfigurationProtocol) and several Authentication Servers such as AAA,(Authentication, Authorization and Accounting), PANA Server (Protocolsfor carrying Access Network Authentication) and in some cases SIP Server(Session Initiation Protocols).

Communication with the Network Elements may comprise exchange ofmessages e.g., for fetching General Information about the Networks,Information about the Lower Layers and the available Information aboutHigher Layer Services for establishing proactive security associationand getting IP address. Identification of Network Elements andcommunicating with them is referred to as Network Discovery.

Network Discovery has gained a lot of interest these days. Severaltechniques have been proposed, however they have some drawbacks. Amongother things, known methods of “Networks Discovery” focus on two phaseapproach.

Phase-1: Establishing a NIR (Networks Information Repository), andfilling it with the Networks Information by means of Reporting Agents(RAs). The RAs collect the information about Network Elements in adomain and send it to the NIR. (e.g., if a specific network element isattached/detached or becomes operational/non-operational its informationis reported to the NIR). RAs are regular MSs that happen to be presentin that domain at that time. NIR i.e., Networks Information Repositoryis also referred to in literature as Networks Information Database, orMedia Independent Information Server.

Phase-2: Reuse of NIR information by new mobile entrants in that domain.i.e., any MS when it enters in a new domain can enquire to NIR about theNetwork Elements in that domain. The NIR was populated by the RAspreviously present in that domain. The MS can access NIR from any singleradio interface. (such as, e.g., 802.11 access network, 3GPP or 3GPP2networks) and can request information in advance about Network Elementsof any domain.

There are a number of drawbacks in both the above noted phases. InPhase-1 (Populating NIR), each and every MS that happens to enter in adomain, unaware of the fact that the previously present or passing-byMSs have already updated the NIR, keeps on sending/replicating the sameinformation about the domain it is passing through. This not onlyunnecessarily keeps the NIR busy in processing the replicatedinformation but also generates signaling burdens on the networkgratuitously.

In Phase-2 (Reuse of NIR Information), the prior methods assume that aMS is aware of NIR's reachable location. This method may not work wellor may be inefficient if a MS is not aware of the NIR's reachablelocation.

The present invention provides a variety of advances and improvementsover, among other things, the systems and methods in the background.

REFERENCES

Additionally, the present invention provides a variety of advances andimprovements over, among other things, the systems and methods in thebackground art described in the following references, the entiredisclosures of which references are incorporated herein by reference.

1. 3GPP TS 23.041, 3rd Generation Partnership Project (3GPP), TechnicalSpecification Group Terminals, Technical realization of Cell BroadcastService (CBS)(Releases 1 to7)(http://www.3gpp.org/ftp/Specs/archive/23_series/23.041/)

2. 3GPP TS 31.102, 3rd Generation Partnership Project (3GPP), TechnicalSpecification Group Core Network and Terminals, Characteristics of theUniversal Subscriber Identity Module (USIM) Application (Releases 1 to7) (http://www.3gpp.org/ftp/Specs/archive/31_(—)31.102/).

3. I.E.E.E. 802.21 Doc No. 21-05-0240-01-000 (e.g., submitted May,2005).

SUMMARY OF THE INVENTION

The present invention improves upon the above and/or other backgroundtechnologies and/or problems therein.

According to some embodiments, a method for minimizing superfluoussignaling traffic and for minimizing data processing pressures on anetwork including a network information repository (NIR), comprising:having mobile stations that enter a network domain compare and detectinconsistencies in network information received through differentsources and report those inconsistencies to the NIR; having the NIRupdate a cell broadcast controller (CBC) with the network information;and having the CBC broadcast or multicast the updated information. Insome examples, the method further includes having the NIR receive onlyupdated information about network elements of a domain through mobilestations that first discover whether network elements are attached ordetached. In some examples, the method further includes having the NIRconfigured to store information about network elements mapped withgeographical location coordinates. In some other examples, the methodfurther includes having the NIR configured to store information aboutnetwork elements mapped with time. In yet some other examples, themethod further includes having the NIR maintain primary information andsecondary information, wherein primary Information includes names and/oraddresses of networks and/or network components, and wherein secondaryinformation include network capabilities.

In some other examples, the method includes that the NIR is configuredto communicate to the CBC primary information for cell broadcast that ispushed to mobile stations in a given geographical area. In someembodiments, the cell broadcast provides for multitudes of broadcastchannels with different types of messages broadcasted on differentchannels. In some other examples, the method includes having the NIRdefine a geographical area for the CBC to which the information is to bebroadcasted to. In yet some other examples, the method includes havingthe NIR communicate with a plurality of CBCs belonging to differentnetwork operators. In some other examples, the method includes havingthe mobile stations acquire primary information through cell broadcastand secondary Information through direct inquiry to the NIR aboutneighboring networks and their parameters ahead of time. Preferably, themobile stations are configured to listen to and to compare thebroadcasts received from cellular networks and beckons from non-cellularnetworks and to discern inconsistencies between the messages received.In some embodiments, the mobile stations are configured to pullsecondary information from the NIR and to compare the pulled secondaryinformation with that which that it obtains after actually connecting toa candidate network and discerning inconsistencies between the messagesreceived from the NIR and the actual candidate network. In yet otherembodiments, the mobile stations are configured to notify the NIR ofprimary and/or secondary inconsistencies, whereby the NIR will updateits primary and/or secondary information database and will conveyupdates to the CBC.

In some examples, the mobile station is configured to decide whether theprimary information is enough for the mobile station's sessioncontinuity or whether it needs secondary information. In preferredembodiments, the mobile station is equipped with multiple interfaces,including WLAN and cellular interfaces. In some examples, the NIRs areconnected to each other in a hierarchical manner with a highest levelNIR connected to a CBC. In some examples, the method further includesemploying efficient query/response communications between a NIR and MSsbased on use of message format hints such that a MS will send a query toa NIR only if the MS receives a hint in a cellular broadcast that theNIR contains the desired information.

In addition, some preferred embodiments of the invention provide noveland non-obvious systems and methods for populating a NIR with networkdiscovery information, such as, e.g., employing systems and methodsdescribed herein.

In addition, some preferred embodiments of the invention provide noveland non-obvious systems and methods for providing network discoveryinformation from a NIR, such as, e.g., employing systems and methodsdescribed herein in which, e.g., network discovery information within aNIR is broadcasted and/or multicasted, and, in particular, wherein suchinformation is broadcasted via a CBC and/or multicasted via a BM-SC.

The above and/or other aspects, features and/or advantages of variousembodiments will be further appreciated in view of the followingdescription in conjunction with the accompanying figures. Variousembodiments can include and/or exclude different aspects, featuresand/or advantages where applicable. In addition, various embodiments cancombine one or more aspect or feature of other embodiments whereapplicable. The descriptions of aspects, features and/or advantages ofparticular embodiments should not be construed as limiting otherembodiments or the claims.

BRIEF DESCRIPTION OF THE DRAWINGS

The preferred embodiments of the present invention are shown by a way ofexample, and not limitation, in the accompanying figures, in which:

FIG. 1 is an architectural diagram showing illustrative networkinterface repositories (NIRs) interfaced with a cell broadcast centers(CBC) of a Cellular System according to some illustrative embodiments;

FIG. 2 is an illustrative flow diagram showing illustrative processsteps performed by an MC in an active mode;

FIG. 3 is an illustrative flow diagram showing illustrative processsteps performed by an MC in an active mode;

FIG. 4 is an illustrative flow diagram showing illustrative processsteps performed by an MC in a passive mode;

FIG. 5 is an illustrative architectural diagram showing illustrativecomponents of some illustrative network elements;

FIG. 6 is an illustrative architectural diagram depicting someillustrative device components in some illustrative embodiments;

FIG. 7 is an illustrative architectural diagram depicting anillustrative environment in which a mobile device having a plurality ofinterfaces communicates with a plurality of networks;

FIG. 8(A) is an architectural diagram showing illustrative networkinterface repositories (NIRs) interfaced with an illustrativebroadcast-multicast service center (BMSC) according to some illustrativeembodiments;

FIG. 8(B) is a diagram schematically showing architecture common topreferred implementations of embodiments shown in both FIGS. 1 and 8(A);and

FIG. 9 is a schematic diagram showing modifications to illustrative 3GPParchitecture according to some embodiments of the invention.

DISCUSSION OF THE PREFERRED EMBODIMENTS

While the present invention may be embodied in many different forms, anumber of illustrative embodiments are described herein with theunderstanding that the present disclosure is to be considered asproviding examples of the principles of the invention and that suchexamples are not intended to limit the invention to preferredembodiments described herein and/or illustrated herein.

Illustrative Architecture

In the preferred embodiments, devices, such as, e.g., radio networkcontrollers, (RNCs), cell broadcast centers (CBCs), network interfacerepositories (NIRs), access points (APs), mobile stations (MSs), etc.,are employed, each of which includes, e.g., computer components as knownin the art. By way of example, each can include data processingcapabilities and can include hardware and/or software components knownin the art, including basic computer components, such as, e.g.,processor(s), data storage, memory, and means for sending/receivingdata, such as, e.g., transceivers and/or other appropriate components aswould be understood by those in the art based on this disclosure. By wayof illustration, FIG. 5 depicts some illustrative architecturalcomponents that can be employed in some illustrative and non-limitingimplementations including wireless access points to which mobile devicescommunicate. In this regard, FIG. 5 shows an illustrative wirelinenetwork 20 connected to a wireless local area network (WLAN) generallydesignated 21. The WLAN 21 includes an access point (AP) 22 and a numberof user stations 23, 24. For example, the wireline network 20 caninclude the Internet or a corporate data processing network. Forexample, the access point 22 can be a wireless router, and the userstations 23, 24 can be, e.g., portable computers, personal desk-topcomputers, PDAs, portable voice-over-IP telephones and/or other devices.The access point 22 has a network interface 25 linked to the wirelinenetwork 21, and a wireless transceiver in communication with the userstations 23, 24. For example, the wireless transceiver 26 can include anantenna 27 for radio or microwave frequency communication with the userstations 23, 25. The access point 22 also has a processor 28, a programmemory 29, and a random access memory 31. The user station 23 has awireless transceiver 35 including an antenna 36 for communication withthe access point station 22. In a similar fashion, the user station 24has a wireless transceiver 38 and an antenna 39 for communication to theaccess point 22. By way of example, in some embodiments an authenticatorcould be employed within such an access point (AP) and/or a supplicantor peer could be employed within a mobile node or user station.

FIG. 6 shows an illustrative computer or control unit that can be usedto implement computerized process steps, to be carried out by devices,such as, e.g., an access point, a mobile station and/or other devices,in some embodiments of the invention. In some embodiments, the computeror control unit includes a central processing unit (CPU) 322, which cancommunicate with a set of input/output (I/O) device(s) 324 over a bus326. The I/O devices 324 can include, for example, a keyboard, monitor,and/or other devices. The CPU 322 can communicate with a computerreadable medium (e.g., conventional volatile or non-volatile datastorage devices) 328 (hereafter “memory 328”) over the bus 326. Theinteraction between a CPU 322, I/O devices 324, a bus 326, and a memory328 can be like that known in the art. Memory 328 can include, e.g.,data 330. The memory 328 can also store software 338. The software 338can include a number of modules 340 for implementing the steps ofprocesses. Conventional programming techniques may be used to implementthese modules. Memory 328 can also store the above and/or other datafile(s). In some embodiments, the various methods described herein maybe implemented via a computer program product for use with a computersystem. This implementation may, for example, include a series ofcomputer instructions fixed on a computer readable medium (e.g., adiskette, a CD-ROM, ROM or the like) or transmittable to a computersystem via and interface device, such as a modem or the like. Acommunication medium may be substantially tangible (e.g., communicationlines) and/or substantially intangible (e.g., wireless media usingmicrowave, light, infrared, etc.). The computer instructions can bewritten in various programming languages and/or can be stored in memorydevice(s), such as semiconductor devices (e.g., chips or circuits),magnetic devices, optical devices and/or other memory devices. In thevarious embodiments, the transmission may use any appropriatecommunications technology.

DISCUSSION OF THE PREFERRED EMBODIMENTS

The preferred embodiments provide some illustrative new methods andsystems that can, among other things, overcome the above-noted and/orother flaws.

For reference, FIG. 1 depicts an illustrative architecturalrepresentation of some illustrative and non-limiting embodiments of theinvention. As shown in FIG. 1, at least one network informationrepository (NIR) is provided that communicates, see numeral 1, with aCell Broadcast Center (CBC). In the illustrated example, as discussedbelow, a plurality of NIRs are arranged in a hierarchical fashion.However, in other embodiments, a non-hierarchical structure can beemployed, such as, e.g., with only a single NIR. As shown in FIG. 1, theCBC can be used to achieve cellular broadcasts via, e.g., a radionetwork controller (RNC) that cause broadcasts to be achieved via basestations or the like, such as, e.g., via one of the two illustrated basestations shown in the box UTRAN in FIG. 1. As also depicted, the basestations have a cell coverage area, illustrated schematically withsix-sided cells in the figure, within which one or more of networks,such as, e.g., WLANs and MSs can be situated.

For reference, FIG. 7 also shows an illustrative and non-limitinggeneral architectural diagram of an illustrative environment withinwhich components of the present invention can be employed, if desired.As depicted, the mobile stations, MSs, preferably have multipleinterfaces, enabling communications with Access Points (APs) of WLANs orthe like and Base Stations (BSs) of Cellular Networks or the like asshown. In particular, the illustrated example shows an illustrativenetwork configuration in which a mobile device 1 is shown as havinginterfaces for communicating with base stations 2A, 2B and access points3A, 3B. In this illustrative example, the base stations 2A and 2B areshown as communicating with a base station controller 4 that in turncommunicates with a call agent 7 which is in communication with thepublic switched telephone network (PSTN) 12. As also shown, the accesspoints 3A and 3B can include, e.g., IP network access points and can bein communication with a gateway 5 that communicates, in turn to a router6 that communicates via an IP network 10, such as, e.g., the Internet,via a trunking gateway 11 to the public switched telephone network 12.

According to the preferred embodiments of the new approach, the NIR(which can include, e.g., a server computer) is made capable ofperforming the following functions:

1. The NIR will be capable of Receiving ONLY Updated Information aboutNetwork Elements of any domain through those MSs only who will firstdiscover whether at least some Network Element(s) is/are attached ordetached. Thus, each and every MS, that happens to enter in a domain,will not be compelled to send the same information over and over again.This will provide relief to the NIR from processing the replicas ofinformation; and will also lower the signaling volume on the network.

2. The NIR will be capable of Storinq Information about Network ElementsCategorically Duly Mapped with Geographical Location Coordinates andTime. There will preferably be two categories of stored information;“Primary Information” and “Secondary Information.” Primary Informationmay include, for example, SSIDs of available networks, addresses of theDHCP server, and address of authentication server, etc. SecondaryInformation can be, e.g., primarily comprised of network capabilities.In such cases, in various embodiments, the networking capabilities thateach mobile device wishes to know can vary significantly depending onthe capabilities and applications of the particular mobile device. Thus,Secondary Information can be considered as the additional informationthat can include, e.g., higher layer information and/or detailedinformation about lower layers. For example, Type of Security Protocolssupported (e.g., Open Access Control, Universal Access Control, or802.1X Access Control, etc.), Type of Internet Protocols supported(e.g., IPv4, IPv6, etc.), Support for QoS, Support for interworking withother networks, Existence of Roaming Relationship and Names of RoamingPartners, Pricing Information, and Services Supported by the networks.Notable bases for categorizing the information in Primary and Secondaryis explained in the following paragraphs. However, both categories ofinformation will help an MS to determine the candidate networks and toperform pre-authentication with the best one ahead of time.

3. The NIR will be capable of Communicatinq to the CBC (Cell BroadcastCenter [2]) to convey Primary Information for Cell Broadcast. Thus,Primary Information can also be regarded as Push Type Information. CellBroadcasting is an existing, but rarely used, function of cellularnetworks and is defined by the standardization bodies such as 3GPP and3GPP2. Cell broadcasting allows messages to be broadcasted to all mobilehandsets in a given geographical area. This area can range from the areacovered by a single cell to the whole network. Because cell broadcastworks by targeting particular cells, no knowledge of mobile telephonenumbers is required. Also, cell broadcasting places a very low load on acellular network; a cell broadcast to every subscriber on the network isessentially equivalent to sending an SMS message to a single phone. Thecell broadcast technology provides for 64000 broadcast channels so thatdifferent types of message (such as, e.g., by way of example, messagesrelated to traffic conditions, severe or other weather, terroristactivities or threats, public announcements, missing children, and/orvarious other types of messages) could be broadcast on differentchannels. Preferably, not every subscriber would necessarily receive allthe channels and, hence, all of the messages. In some embodiments,channels can be activated from the handset or can be activated remotelyby the network. In some embodiments, certain channels are allocated forcertain message types (preferably, standardized on a wide geographicarea, such as, e.g., regionally or globally) so that travelers canreceive, e.g., alerts substantially wherever or wherever they happen tobe. Preferably, the essential or Primary Information about the NetworkElements will be broadcasted on such channels. Thus, the PrimaryInformation can also be referred as Push Type Information. (Note:Depending on the business case or the particular circumstances, thisinformation can be alternatively multicast to the subscribed usersinstead of using broadcasting. Illustrative multicasting examples arediscussed further below in the section entitled Illustrative MulticastEmbodiments).

4. The NIR will be capable of Defining a Geographical Area to CBC wherethe information is to be broadcasted to—. e.g., the NIR is preferablycapable of explaining to the CBC to transmit the Network Informationpertaining to, for example, Area-A from the Base Station that is locatedin Area A and Network Information pertaining to, for example, Area B,from the Base Station that is located in Area B, and so on.

5. The NIR will be capable of Communicatinq with (in some embodiments)Numerous CBCs belonging to different network operators.

6. The NIR will also be capable of delivering Secondary InformationDirectly to the MSs that send direct inquiries to NIR. Thus, in someembodiments, the MSs can become equipped with Primary Information(through Cell broadcast) and Secondary Information (through directinquiry) about neighboring networks and their parameters ahead of time.In this manner, the MSs can, among other things, be in a better positionof implementing advanced capabilities for enhanced mobility supportand/or other time sensitive mobile applications.

According to the preferred embodiments of the present invention, theMobile Stations (MSs) are configured to perform the following functions:

1. The MSs are configured to listen to the Broadcasts to get PrimaryInformation about Network Elements.

2. The MSs are configured to obtain Secondary or Additional Informationabout Network Elements by sending a direct query to NIR. Both thePrimary and Secondary Information received through Broadcasts andthrough query to NIR, respectively, will help the MS to determine thecandidate networks and to perform pre-authentication with the best oneahead of time. Secondary Information about the Network Elements will beextracted or pulled from the NIR based on inquiry. Therefore, it canalso be referred as Pull Type Information.

In addition to above tasks, the MSs are also preferably configured toperform the following tasks:

3. MSs are configured to Listen and Compare the Broadcasts received fromCellular Networks (e.g., 3GPP, 3GPP2, etc) and Beckons from Non-Cellularnetworks (e.g., WLANs, WiMax, PANs, etc.) and to Comprehend theInconsistencies between the messages received from two differentinterfaces. These Inconsistencies are referred as PrimaryInconsistencies and may result, for example, if some specific NetworkElement is attached/detached or becomes operational/non-operational, butyet the CBC is not yet aware of these updates and still broadcasts theold Primary Information.

4. MSs are configured to Pull the information from the NIR and toCompare the Pulled/Secondary Information with that which that it obtainsafter actually connecting to a candidate network and Comprehending theInconsistencies between the messages received from two different sources(i.e., the NIR and the Actual Network). These inconsistencies arereferred as Secondary Inconsistencies and may result, for example, ifsome specific Network Element is attached/detached or becomesoperational/non-operational in an actual network, but the NIR is unawareof these updates and still responds to the inquiries with the oldSecondary Information.

5. MSs are configured to Notify both the Primary Inconsistencies (seeabove at step-3) and the Secondary Inconsistencies (see above at step-4)to the NIR (e.g., if the MS determines that information received througha Broadcast is inconsistent to that which it received through theBeckons, or, the information pulled from the NIR is inconsistent to thatwhich it received from the network as part of its normal process forconnecting to the visited network, the MS immediately, through anyavailable interface, will inform NIR). Consequently, the NIR will updateits Secondary and Primary Information database (e.g., either add ordelete the entry from its database as the case may be) and, in turn,will convey the Primary Updates to the CBC. In this manner, even thoughthis particular MS will have learned of the discrepancies by actuallyconnecting to the Network, that MS's sharing of the Information with theNIR will enable other users to obtain the most correct Primary andSecondary Information in the event that they happen to visit the samenetwork and inquire to NIR about it.

In some embodiments, the MSs can perform these tasks in Active orPassive Modes. In Active mode, both Primary Inconsistencies andSecondary Inconsistencies can be conveyed to the NIR, as depicted, e.g.,in FIG. 2. However, in Passive Mode, only Primary Inconsistencies can besent, such as shown, e.g., in FIG. 4. Preferably, the SecondaryInconsistencies, however, will be sent by some other MS if they areoperating in Active Mode in that domain. This will also reduce thesignaling traffic on the network and replicated data processing pressureon the NIR. Note that these tasks are in addition to the actual ActiveMode tasks and can be performed either in parallel, or during the silentperiods (i.e., during periods when there is no or essentially notransmission is occurring). As to the preferred embodiments, the actualActive Mode Tasks carried by an MS are listed below.

1. To perform a proactive secured handoff, the MS sends PANAauthentication message to the PANA server.

2. The MS renews the IP address with the DHCP server of the candidatenetwork.

3. The MS sends a binding update to the correspondent host (CH) or tothe home agent.

According to the preferred embodiments, the NIR will be connected to theCBC. The information relating to Primary Category will be sent to theCBC for Cell Broadcast. As discussed above, a Cell Broadcast Area isdefined in some embodiments as related to geographical areas where NIRmessages are broadcasted. Its size may vary considerably. It is muchsmaller in dense urban areas (e.g., few hundred yards), and may be quitelarger in less dense urban areas (around 3 miles). A larger CellBroadcast Area may encompass hundreds of WLANs in its footprint.Broadcasting all the information (Primary as well as Secondary) aboutall the WLANs (existing in Cell Broadcast foot print) may not befeasible from CBC's capacity point of view. Thus, broadcasting only thePrimary information makes a prolific sense to use the CBC capacityefficiently.

The message format; and the interface/protocols between NIR and CBC(indicated by “1” in FIG. 1 of this document) can be defined, however werecommend to reuse the protocols established in [2] for Interfacebetween CBC and Radio Network Controller (RNC) (indicated by “2” in FIG.1 of [2]). The reuse (with some refinements, if needed) will not onlyavoid reinvention of the wheel, but will also alleviate CBC fromunnecessary translation of one type of protocols into other. Forreference, a RNC typically manages connections to a plurality of basestations. For example, from the RNC, packet traffic and call traffic cantypically be split off—e.g., with call traffic is sent on to a mobileswitching center while data traffic is diverted to make their way to theInternet or a private IP network.

In another embodiment of the present invention, the NIRs can beconnected to each other in a hierarchical manner and the highest levelNIR can be connected to a CBC as shown in FIG. 1. For the sake ofsimplicity, only two hierarchal levels are shown, however depending oncircumstances these could be more that meet the implementationrequirements. In this illustrative example, Level-1 NIRs will sendinformation to Level-2 NIRs, and Level-2 NIRs will send information tothe Level-3 NIR, and the Level-3 NIR will send information to the CBC.In the preferred embodiments, the CBC will process the information basedon location coordinates and will forward the information to a specificBase Station to broadcast it in a specific cell area.

In another embodiment of the present invention, the Primary Information,broadcasted through the cell broadcast, is structured or organized intwo ways—i.e., “P_(SF) Format” or “P_(SE) Format”. Both Formatsessentially carry the same Primary Information for the MSs. However, oneFormat may be differentiated from the other by inserting an additionalbit or header to give the MSs the following hints:

1. In preferred embodiments, a P_(SE) Format informs the MSs that theSecondary Information associated with that Primary Information isavailable in an NIR (i.e., that the NIR is Filled with SecondaryInformation) and that the MSs may contact the NIR to pull thatinformation.

2. In preferred embodiments, a P_(SE) Format informs the MSs that (a)the Secondary Information associated with the Primary Information is notavailable in an NIR (i.e., that the NIR is Empty) and, hence, that it ispointless to contact the NIR to pull the Secondary Information and that(b) the NIR needs the Secondary Information to be Filled in and if anyMS finds any information, it should forward it to the NIR too.

Preferably, once the information is updated, its format category ispromoted from P_(SE) to P_(SF) Format. Among other things, thistechnique helps to provide efficient Query Response communicationsbetween an NIR and MSs, because 1) a MS will send a query to a NIR onlyif the MS receives a hint in the Cellular Broadcast that the NIRcontains the desired information, and 2) a MS will also only report theinformation about any new Networks Elements if the NIR needs it.

In some advantageous embodiments, communication between an NIR and MSs(e.g., either direct or indirect through broadcast) using differentformats or codes can trigger MSs to perform any specific task for theNIR—thus, it can create a variety of other applications. A couple ofillustrative applications are explained below under the sectioncaptioned “Illustrative Applications.”

In another embodiment of the present invention, cellular networkassisted/associated location detection mechanisms can be implied. Thiscan relinquish MSs to have their own mechanism of detecting theirgeographical location. Thus, a MS client may no longer be required to beGPS equipped in some circumstances.

In yet another embodiment of the present invention, a MS may have adecision power to decide whether the Primary Information is enough forthe MS's session continuity or whether it needs Secondary Information.In some applications/scenarios, an MS would not need SecondaryInformation and, thus, in such cases, there would be no need of sendingqueries to NIR each time. An illustrative flow diagram for thisembodiment is depicted in FIG. 3.

Embodiments of the present invention, can not only surmount the flawspresent in the existing techniques, but can also provide a number ofother advantages, such as, e.g.:

(a) In some preferred embodiments, the MSs will always receive reliableinformation about the NIR's reachable location through cellularbroadcasts. Notably, the prior known systems were inefficient because,among other things, such assumed that a MS was aware of a NIR'sreachable location, which may not always be the case.

(b) In some preferred embodiments, a superfluous signaling traffic onthe network and replicated data processing pressures on an NIR will bereduced. In preferred embodiments, every MS that happen to enter in adomain will first compare and detect the inconsistencies in theinformation received through different sources and will report thoseinconsistencies to the NIR. Once the NIR updates the CBC, and the CBCstarts broadcasting the updating information, inconsistencies willvirtually never exist and there will be virtually nothing for the otherMSs to report anymore. This not only eliminates redundant signalingtraffic, but, at the same time, relieves the NIR from unnecessaryprocessing of replicated information. In contrast to this, in priortechniques all Reporting Agents whenever and wherever they would findany network, they would just keep on sending the information to theNetworks Data Server, which would increases signaling traffic on thenetwork and processing burdens on the NIR.

(c) In some preferred embodiments, the broadcasting of hints for themobiles (e.g., P_(SF) and P_(SE) Formats as noted above) will alsorefrain a MS from contacting a NIR if the NIR does not contain desiredinformation. This will not only provide efficient Query Responsecommunication between a NIR and a MS, but will also inform the MS thatthe NIR needs Secondary Information and will inform the MS that if findsany information it should forward the information to the NIR too.

(d) In some preferred embodiments, the broadcasting of only the PrimaryInformation, will use the CBC capacity efficiently. Moreover, since thefootprint of a CBC broadcast area is large, a MS will typically receiveessential information exceedingly ahead of time and will be better-offto support advance mobility and other time sensitive mobileapplications.

(e) In some preferred embodiments, regardless of where a MS is and whichlocal network it is connected to, the MS will always use a singleprotocol to communicate with the NIR to retrieve the desiredinformation.

To facilitate reference, a further discussion of the illustrative andnon-limiting embodiments depicted in the figures is now provided.Further discussion of the figures is now provided. With reference toFIG. 2, as discussed above, FIG. 2 shows an illustrative algorithm orprocess flow that can be performed in some illustrative embodiments byan MC or MS in an active mode. In this illustrative embodiment, at step120 the mobile listens to cellular broadcasts, and, at step 121, themobile listens to WLAN beckons. At step 127, the mobile compares theseand evaluates if there are any inconsistencies. If the answer is no, theprocess goes back to step 120. If the answer is yes, then the processgoes onward to step 128 and obtains the present GPS coordinates andsends actually discovered information about network elements to the NIR.In the meantime, after step 122, the mobile discerns if there is enoughinformation for performing a proactive handoff. If the answer is yes,the process goes to step 125 and performs the proactive/active handoff.On the other hand, if the answer is no, the process goes to step 123 andsends a query to the NIR. Responsive thereto, at step 124, the mobilereceives information from the NIR. Then, the process goes to step 125and performs the proactive/active handoff. At step 126, the mobileobtains network elements information from the newly attached network.Then, at step 129, the process compares the information acquired at step126 with that received at step 124 and determines if any inconsistenciesexist. If the answer is no, this further process goes to stop. On theother hand, if the answer is yes, the process goes onward to step 128and obtains the present GPS coordinates and sends actually discoveredinformation about network elements to the NIR.

Referring now to FIG. 3, FIG. 3 shows another embodiment of anillustrative algorithm or process flow that can be performed in someillustrative embodiments by an MC or MS in an active mode. Inparticular, as shown, at step 201, the mobile listens to WLAN beckons,and, at step 202, the mobile listens to cellular broadcasts. At step210, the mobile discerns if secondary information is available in theNIR. If the answer is no, the process goes to step 215 at which themobile discerns whether it should perform the handoff with limitedavailable information. At that point, if the answer is then no, thehandoff fails. On the other hand, if the answer is yes, then the processgoes to step 250. However, if the answer in step 210 is yes, the processgoes to step 220 and discerns if secondary information is needed. If theanswer is no, the process goes to step 250. However, if the answer isyes, the process goes to step 230 and sends a query to the NIR. Then,the mobile receives the information from the NIR at step 240. At step250, which can be reached via any appropriate path noted above, themobile performs a proactive/active handoff. At step 260, the mobile getsnetwork elements information from the newly attached network. As shownat step 205, in some embodiments, the information acquired by the mobileat step 260 and the information received from the NIR at step 240 arecompared by the mobile to discern if there are inconsistencies. If theanswer is no, this further process goes to stop. On the other hand, ifthe answer is yes, at step 204, the mobile receives present GBScoordinates and sends actually discovered information about the NetworkElements to the NIR. As shown at step 203, in some embodiments, theinformation received from steps 201 and 202 (i.e., from the beckons andthe broadcasts) are compared for inconsistencies. If the answer is no,then the system continues back to step 202. On the other hand, if theanswer is yes, then the system continues to step 204.

Referring now to FIG. 4, FIG. 4 shows an embodiment of an illustrativealgorithm or process flow that can be performed in some illustrativeembodiments by an MC or MS in a passive mode. Here, at step 410 themobile listens to WLAN beckons, and, at step 420, listens to cellularbroadcasts. At steps 430-440, the mobile compares the WLAN beckons andthe cellular broadcasts for inconsistencies and discerns if anyinconsistencies exist. If the answer reached in step 440 is no, then theprocess returns to step 410. On the other hand, if the answer reached instep 440 is yes, then the process goes on to step 450 and the mobileobtains the present GPS coordinates. Thereafter, the process goes tostep 460 and the system sends actually discovered information aboutnetwork elements to NIR. Thereafter, the process returns to step 410.

Illustrative Architectures

According to some illustrative embodiments, NIRs, CBCs and MSs utilizedto perform aspects of the preferred embodiments will be configured so asto achieve the following functions. It should be understood based onthis disclosure that the functions performed by the components (e.g.,NIRs, CBCs and MSs) can be varied based on circumstances.

NIR Functions:

In some illustrative embodiments, an NIR will be configured so as toperform some or all, preferably all, of the following functions.

1. In some embodiments, the NIR is configured such that the NIR receivesupdates from MSs or requests MSs to send updates to replace any expiredpiece of information in its database.

2. In some embodiments, the NIR is configured such that the NIR sendsthese updates to the CBC.

3. In some embodiments, the NIR is configured such that apart from theinformation to be broadcasted, the NIR also sends some AdministrativeInformation meant for CBC use or higher level NIR use only. For example,the NIR can outline the geographical scope of the messages to bebroadcasted (e.g., mapping the Networks Information with theGeographical Areas or with the list of Cell IDs for which broadcasts aremeant).

4. In some embodiments, the NIR is configured such that each NIR sendsits own identity (such as, e.g., its IP Address) to the higher level NIRor to the CBC.

5. In some embodiments, the NIR is configured such that each NIR appendssome reference number to the messages. In some examples, this may be aSerial Number or a Version Number, or both. For instances, a SerialNumber may be used if both Geographical Coordinates and Information bothare new/changed, and a Version Number may be used if only theinformation contents are changed and Geographical Coordinates areunchanged.

Additional NIR Functions:

In some other illustrative embodiments, an NIR will be configured so asto perform some or all, preferably all, of the following functions. Inparticular, in order to make the NIR smarter, following additionalcapabilities can be built in NIR.

1. In some embodiments, the NIR is configured such that the NIR iscapable for all aspects of formatting the messages to be delivered toCBC. For example, the NIR could use any well-known format, such as,e.g., RDF (Resource Description Framework) discussed, e.g., in reference[3] above.

2. In some embodiments, the NIR is configured such that the NIR is alsocapable of classifying the messages into two classes: (a) intended foruser (e.g., service provider name, tariff, etc.) and (b) not essentiallyintended for the users (e.g., address of NIR or other servers). Thus,the MSs can selectively pick and display only those messages required bythe MS user.

3. In some embodiments, the NIR is configured such as to communicate thepreferred time and preferred frequency at which message broadcast isdesired. By way of example, this may involve a calculation taking intoconsideration several factors, such as, e.g., the amount of informationto be broadcasted, the speed of mobiles with which they move in thecells, etc.

4. In some embodiments, the NIR is configured such as to categorize themessages from a priority point of view—such as, e.g., a High Prioritymessage can be requested to be broadcasted at the earliest opportunityand Normal Messages can be requested to be broadcasted according to,e.g., an associated repetition period. In some embodiments, the NIR canalso instruct the CBC to cease message broadcasting, if needed.

5. In some embodiments, the NIR is configured such as to Use coding ordifferent formats that can trigger MSs to perform certain desiredactions for the NIR.

CBC Functions:

The CBC is a part of the cellular network and it may be connected toseveral BSCs/RNCs. It is responsible for the management of broadcastmessages referred to as CBS messages. In some illustrative embodiments,a CBC performs some or all, preferably all, of the following functions.

1. In some embodiments, the CBS is configured such as to allocate serialnumbers to its messages.

2. In some embodiments, the CBS is configured such as to determine thecells to which a CBS message should be broadcasted.

3. In some embodiments, the CBS is configured such as to determine atime at which a CBS message should be broadcasted.

4. In some embodiments, the CBS is configured such as to determine afrequency at which CBS message broadcast should be repeated.

5. In some embodiments, the CBS is configured such as to be capable ofinstructing each BSC and/or RNC to cease broadcast of the CBS message,if needed.

6. In some embodiments, the CBS is configured such as to be capable ofinitiating broadcast by sending fixed length messages to a BSC and/orRNC and where necessary padding the pages to a length of, e.g., 82octets. Here, a length of 82 octets, using the default character set,equates to 93 characters. Up to 15 of these pages may be concatenated.In some embodiments, in order to enhance the message capacity, otherData Coding Schemes may also be used, such as, e.g., as schemesdescribed in 3GPP Technical Specification TS 23.038, the contents ofwhich are incorporated herein by reference.

7. In some embodiments, the CBS is configured such as to be capable ofmodifying or deleting CBS messages held by the BSC and/or RNC.

8. In some embodiments, the CBS is configured such as to be capable ofdetermining the cell broadcast channel on which the message should bebroadcasted.

9. In some embodiments, the CBS is configured such as to be capable ofusing Compression and/or Decompression that may take place between a NIRand an MS.

10. In some embodiments, the CBS is configured such as to be capable ofassigning a message class to permit mobiles to selectively display onlythose messages required by the MS user. In some embodiments, the messageclass reveals the category of information and the language in which themessage has been compiled. Through the use of appropriateMan-Machine-Interface, the user is then able to ignore message typesthat he does not wish to receive—such as, e.g., advertising informationand/or messages in an unfamiliar language.

MS Functions:

In some illustrative embodiments, a MS will be configured so as toperform some or all, preferably all, of the following functions.

1. In some embodiments, the MS is configured such that it is equippedwith multiple interfaces, such as, e.g., dual interfaces including WLANand Cellular interfaces. In preferred embodiments, the MS listens to thecellular broadcasts and attempts to receive the CBC messages whoseMessage IDs are in a “search list”. This “search list” preferablycontains the Message IDs stored in, e.g., the EF_(CBMI), EF_(CBMID) andEF_(CBMIR) files on the USIM [see Reference [2] incorporated herein byreference above] and any Message Identifiers stored in the UserEquipment (UE) in a “list of CBC messages to be received”. Forreference, UE relates to, e.g., a cellular phone and all peripheralssuch as, e.g., USIM related to the MS. If the User Equipment (UE) hasrestricted capabilities with respect to the number of Message IDs it cansearch for, the IDs stored in the USIM shall take priority over anystored in the UE. In preferred embodiments, it learns about theavailable networks and the addresses of the associated network elements(such as, e.g., a DHCP Server, an Authentication server, etc.) operatingin the cell of a cellular network footprint. These networks can be apart of same domain or different domains. In addition, the MS alsolearns about the IP address of the NIR.

2. In some embodiments, the MS is configured such that in case ofconcatenated pages, each of message will have the same messageidentifier (e.g., indicating the source of the message), and the sameserial number. Using this information, the MS/UE is able to identify andignore re-broadcasts of already received messages.

Illustrative Applications:

Road Congestion Information:

In some illustrative embodiments, a road congestion informationapplication can be employed which informs users, on a real time basis,about the section on a road or highway that is facing congestion at anyparticular time. To embody this application, an MS is preferably madecapable of getting vehicle speed from the odometer on Bluetooth or anyshort range WLAN. Preferably, the MS is also capable of receiving aspecified speed limit being broadcasted from the local base station.Preferably, the MS compares own speed and the broadcasted speed limit,and if there is a significant difference (i.e., inconsistency), the MSsends a message to the NIR.

Accordingly, the NIR will receive such messages from a plurality of MSsfrom a congested segment of the road or highway. Preferably, the NIR cantranslate the intensity of the congestion for display within a car orvehicle, such as, e.g., using color codes (such as, e.g., red, yellow,etc.) on a car's navigation device. In various embodiments, thisinformation can be sent though any air or wireless interface to thesubscribed users.

In addition, information about Department of Transportation can be madeto feed the Specified Speed Limits mapped with Highway No. and Location(taking into account construction zones speed limits etc.) to the localNIR directly (or CBC of Cellular System). Thus the base station willbroadcast the specified speed limits specified in that local area.

Electronic Cab Dispatching:

In some illustrative embodiments, a cab dispatching application can beprovided that eliminates the need for Cab Dispatching Agencies. In someembodiments, a user needing a taxi can be, e.g., located or standing ata certain location. In preferred embodiments, his mobile device knowsthe NIR address (e.g., which he may have received from a cell broadcastas described in embodiments above). In some embodiments, the userpresses a taxi icon on the user's MS or otherwise uses the MS to send amessage to the NIR with the user's present location coordinates. The NIRcan then search for a qualifying taxi in its database. Upon finding one,the NIR can send a message to the taxi operator, such as, e.g., an SMSon the driver's cell phone, through a CBC. For reference, SMS (ShortMessage Service) is a service for sending messages of up to 160 or 224characters to mobile phones that use Global System for Mobile (GSM)communication. Typically, SMS messages are transmitted within the samecell or to anyone with roaming service capability. In addition, SMSmessages can also be sent to digital phones from a Web site applicationequipped with, e.g., PC Link or from one digital phone to another. Thequalifying cab is the one:

1. In the preferred embodiments, whose cell phone number is registeredin an established database (e.g., those cab's who have subscribed to theservice).

2. In the preferred embodiments, which is in the proximity of thegeographical coordinates of the user.

3. In the preferred embodiments, whose flag is up (e.g., a vacant cabnot currently serving any passenger). In this regard, a cab can transmita message identifying its status as vacant or not-vacant as would beunderstood by those in the art based on this disclosure.

Illustrative Multicast Examples:

As explained herein-above, instead of using broadcasting, informationreceived from the NIR can be alternatively multicasted to subscribedusers. While those in the art would understand how to implementmulticasting to subscribed users based on the foregoing description,some background information related to the advantages of suchembodiments, as well as some illustrative embodiments to facilitatereference, are described in this section. A notable distinction betweenbroadcast modes and multicast modes is that a user does not need tosubscribe in each broadcast service separately, while in multicast mode,the services can be ordered separately. As a result, broadcast servicesare generally not charged, while multicast services can be changed orbilled to subscribed users.

In general, broadcasting via a CBC can have a number of practicalproblems in some applications. First, a CBC would commonly be operatedby a cellular operator network, such as, e.g., VERIZON, or anothercompany. As a result, such an operator may have limited incentive tobroadcast information related to competitor networks. Thus, this couldcreate a practical problem in respect to actual implementation inrelation to competitor information. Second, a CBC and cellular networkwould commonly be involved in open broadcasting to even non-subscribedusers. Thus, this could create a practical problem in respect to actualimplementation in relation to transmission to non-subscribed users. Forexample, it could create a practical problem in terms of ensuring thatcertain users pay for subscriptions and based on such payments receivedsuch transmissions. Third a CBC and cellular network would commonly beinvolved in open broadcasting to even less privileged subscribers, whereas cellular operator might like to offer a service to only, e.g.,Platinum or Gold subscribers and not to less privileged ones, e.g.,general subscribers or less dedicated ones.

For illustrative purposes, in some embodiments, multicasting can beimplemented in accordance with the standards related thereto under the3GPP. In this regard, the entire contents of the following standardsdocuments are incorporated herein by reference: 1) 3GPP TS 22.146, 3GPPMultimedia Broadcast Multicast Service Stage-1 and 2) 3GPP TS 23.246,3GPP Multimedia Broadcast Multicast Service, Architecture and Functionaldescription. In this regard, reference is made to the following twosummarizing documents, the entire disclosures of which are alsoincorporated herein by reference: 1) Support of Multicast Services in3GPP, by Th. Lohmar, H. Wiemann, F. Hundscheidt, M. Meyer and R. Keller,published by 3G Evolving Technologies at<<http://www.3get.de/pdf/MBMS_PIK_(—)060404.pdfhttp://www.3get.delpdf/MBMS_PIK_(—)060404.pdf>>; and 2) Mobile Broadcast/Multicast Service(MBMS), whitepaper by TELIASONERA, published at<<http://www.medialab.sonera.fi/workspace/MBMSWhitePaper.pdf>> and viaZDNET at<<http://whitepapers.zdnet.co.uk/0,39025945,60154728p-39000516q,00.htm>>.The MBMS service described in the above-referenced documents involves anIP datacast type of service that can be offered via, e.g., existing GSMand UMTS cellular networks. Among other things, the MBMS infrastructureallows for using an uplink channel for the interactions between aservice and a user. In practice, multicast users need a return channelfor the interaction procedures in order to be able to subscribe tocertain desired services. Among other things, MBMS does not interferewith, e.g., already existing GSM and UMTS services, and mobile devicesnot supporting MBMS will work in networks that offer MBMS for customerswith MBMS capabilities. Moreover, the MBMS infrastructure allows for amulticast mode that uses radio resources efficiently by using a commonradio channel. Data can be transmitted over a multicast service area asdefined by a network (e.g., a NIR in some embodiments herein). Amongother things, multicast mode enables a network to selectively transmitto those cells within a multicast service area that contain members of amulticast group.

For illustrative purposes, FIG. 8(A) is an illustrative architecturaldiagram showing illustrative network interface repositories (NIRs)interfaced with an illustrative broadcast-multicast service center(BM-SC) according to some illustrative embodiments for implementingMBMS. Among other things, in some embodiments, while a CBC may operatein an open manner (e.g., even to non-subscribed users) and may notinvolve IP layer or layer 3 information processing, a BM-SC can operatein a closed manner (e.g., to subscribed users) and can involve IP layeror layer 3 information processing.

To facilitate reference, FIG. 8(B) schematically shows generalarchitecture common to preferred implementations of embodiments shown inboth FIGS. 1 and 8(A). As shown, the NIR system preferably communicatesto a cellular operator network, via a controlling system or device, suchas, e.g., a CBC or a BM-SC, which communicates with a radio accessnetwork via a core network in some illustrative embodiments. As would beappreciated, some illustrative radio access networks include, e.g., GRAN(GSM radio access network) and UTRAN (UMTS radio access network).

Additionally, in some preferred embodiments, a mobile device isconfigured so as to 1) store information about available networks and to2) pick the available network that best meets the mobile's policy, suchas, e.g., employing methods disclosed in U.S. patent application Ser.No. 11/161,775, entitled IP NETWORK INFORMATION DATABASE IN MOBILEDEVICES FOR USE WITH MEDIA INDEPENDENT INFORMATION SERVER), filed onAug. 16, 2005, by the present inventor Raziq Yaqub, et al., the entiredisclosure of which is incorporated herein by reference. Additionally,in some preferred embodiments, a mobile device is configured to be ableto store and reuse the information received as needed. In someembodiments, a system can be provided wherein a cell broadcast is usedin, e.g., GSM/UMTS coverage areas where MBMS is not supported, whereas amulticast can be used where MBMS is supported.

Illustrative Hybrid Mobile Stations:

In some embodiments, as under Section 5 of TR 23.882, which says: “[i]tshall be possible for the operator to provide the UE with access networkinformation pertaining to locally supported 3GPP and non-3GPP accesstechnologies”, as set forth above, a UE is configured so as to becapable of receiving/requesting information about access networksthrough, e.g., MBMS, CBC Cell Broadcast, and protocols defined by802.21.

In this regard, one important matter in relation to TR 23.882 (SystemArchitecture Evolution) is to support a variety of access systemsincluding 3GPP and non 3GPP IP access systems. This brings into scopediscovering available and/or supported networks in the vicinity of theUE. A review of TR 23.882 V1.2.2 reveals that Access Network InformationDiscovery is an open issue. As set forth in this application, this issuecan be resolved by the following approaches:

Broadcast/Multicast-based Approach

According to 3GPP specifications, broadcasts are of following types:

1. Channel Broadcast via BCCH: wherein the Access System advertises theinformation of neighborhood cells of the same access technology toassist UEs in discovering neighborhood cells. This capability may beextended to advertise information pertaining to other Access Networks,however: this extension may be wasteful of radio resources foradvertising/broadcasting large amounts of network information onbroadcast control channels.

2. Cell Broadcast via CBC: wherein Access Networks information can bebroadcast to all UEs within a particular cell based on location. Thiscan be a better approach for some reasons; however, as discussed above,operators may not be interested in advertising the information toall/unauthenticated UEs.

3. Multicast via MBMS: wherein Access Networks information can bemulticast to the targeted UEs (e.g., subscribed to the service) only. Asdescribed above, this may be a most desirable approach because, amongother things, it will create a workable business case for operators.

Query-based Approach

In this case, the UE can be configured so as to be capable of accessinga “Database of Access Networks (DAN)” (preferably, this is accessiblethrough any available Access Network), to fetch information relating toother Access Networks available in the neighborhood of the UE. As perembodiments described above, this approach requires an existing or newfunctional entity (such as, e.g., a NIR) capable of storing informationof access networks, and capable of delivering this information to the UEover any available Access Network interface in response to UE queries.

Both of the above approaches for Access Systems Discovery haveassociated design considerations. In some preferred embodiments, ahybrid approach that combines aspects of broadcast or multicast approach(discussed above) and Query-based approach (discussed above) isprovided.

In some preferred embodiments, to accomplish a hybrid approach,provisions in UE and the network should be made so that UE becomescapable of:

1. Receiving Primary Information about neighboring/supported networks(e.g., through receiving multicast as defined in 3GPP TechnicalSpecifications on MBMS (e.g., 22.146, 23.246, etc.) or listening to CellBroadcasts as defined in 3GPP Technical Specifications on CBS (e.g.,23.041, etc.).

2. Sending a query to the DAN to obtain Secondary or AdditionalInformation (if needed) about the same networks using some standardprotocols (e.g., as defined by IEEE 802.21).

3. UE should be made capable of accessing DAN from any available accessnetwork using existing interfaces (such as, e.g., S1-S5-Gi, or S2-Gi, orvia BM-SC if DAN is outside 3GPP network).

In preferred embodiments, from available information, both Primary andSecondary information, UE will be able to select the most appropriatecandidate network to handover to for session continuity.

For reference, FIG. 9 is a diagram showing a Long Term Evolution of 3GPPRadio Technology modified according to some embodiments herein,including some functional elements/interfaces related to such a hybridsystem (e.g., DAN). Here, among other things, GERAN stands for GSM EDGERadio Access Network; UTRAN stands for UMTS Terrestrial Radio AccessNetwork; MME stands for mobility management entity; UPE stands for userplane entity; Inter AS Anchor stands for inter-access-system Anchor,etc., as set forth in 3GPP documentation. Reference is made to the 3GPPWeb Site at <<http://www.3gpp.org/Highlights/LTE/LTE.htm>> whichprovides some general background. Among other things, the numerals S1 toS7 are described as:

S1: Core network to radio access network for transport of user plane andcontrol plane traffic.

S2: Non-3GPP-access-network (e.g., Wireless LAN) to core network foruser plane control and mobility support.

S3: GPRS-core to evolved-core network for user and bearer informationexchange during idle and/or active states.

S4: GPRS-core to evolved-core network for mobility support

S5: Mobility Management Entity/User Plane Entity to Inter-access-systemanchor for user plane control and mobility support.

S6: Home Subscriber Server to evolved core network for transfer ofsubscriber data (authentication and authorization).

S7: PCRF to Policy and Charging Enforcement Point for transfer ofquality of service and charging rules.

Broad Scope of the Invention:

While illustrative embodiments of the invention have been describedherein, the present invention is not limited to the various preferredembodiments described herein, but includes any and all embodimentshaving equivalent elements, modifications, omissions, combinations(e.g., of aspects across various embodiments), adaptations and/oralterations as would be appreciated by those in the art based on thepresent disclosure. The limitations in the claims (e.g., including thatto be later added) are to be interpreted broadly based on the languageemployed in the claims and not limited to examples described in thepresent specification or during the prosecution of the application,which examples are to be construed as non-exclusive. For example, in thepresent disclosure, the term “preferably” is non-exclusive and means“preferably, but not limited to.” In this disclosure and during theprosecution of this application, means-plus-function orstep-plus-function limitations will only be employed where for aspecific claim limitation all of the following conditions are present inthat limitation: a) “means for” or “step for” is expressly recited; b) acorresponding function is expressly recited; and c) structure, materialor acts that support that structure are not recited. In this disclosureand during the prosecution of this application, the terminology “presentinvention” or “invention” may be used as a reference to one or moreaspect within the present disclosure. The language present invention orinvention should not be improperly interpreted as an identification ofcriticality, should not be improperly interpreted as applying across allaspects or embodiments (i.e., it should be understood that the presentinvention has a number of aspects and embodiments), and should not beimproperly interpreted as limiting the scope of the application orclaims. In this disclosure and during the prosecution of thisapplication, the terminology “embodiment” can be used to describe anyaspect, feature, process or step, any combination thereof, and/or anyportion thereof, etc. In some examples, various embodiments may includeoverlapping features. In this disclosure, the following abbreviatedterminology may be employed: “e.g.” which means “for example.”

1. A system for maintaining a network information database, comprising:a) a network information repository configured to separately storeprimary information related to names and/or addresses of networks and/ornetwork components and secondary information including networkcapabilities; b) said network information repository being configured totransmit said primary information to a cellular network for broadcastingor multicasting to mobile stations; and c) said network informationrepository being configured to transmit said secondary information tosaid mobile stations upon requests from said mobile stations.
 2. Thesystem of claim 1, further including: a) at least one of said mobilestations being configured to obtain said primary information from acellular network broadcast or multicast and to obtain said secondaryinformation from said network information repository; and b) said mobilestation being configured to identify primary and/or secondaryinformation inconsistencies and to notify the network informationrepository thereof, whereby the network information repository canupdate primary and/or secondary information databases and convey updatesto the cellular network.
 3. A method for minimizing superfluoussignaling traffic and for minimizing data processing pressures on anetwork including a network information repository (NIR), comprising:having mobile stations that enter a network domain compare and detectinconsistencies in network information received through differentsources and report those inconsistencies to the NIR; having the NIRtransmit said network information to a cellular network; and having thecellular network broadcast or multicast the updated information.
 4. Themethod of claim 3, further including having the NIR receive only updatedinformation about network elements of a domain through mobile stationsthat first discover whether network elements are attached or detached.5. The method of claim 3, further including having said NIR configuredto store information about network elements mapped with geographicallocation coordinates.
 6. (canceled)
 7. The method of claim 3, furtherincluding having said NIR maintain primary information and secondaryinformation, wherein primary Information includes names and/or addressesof networks and/or network components, and wherein secondary informationinclude network capabilities.
 8. The method of claim 7, wherein saidprimary information includes at least one of a network SSID, an IPaddress of a DHCP server, an IP address of an Access Point or an IPaddress of an Authentication Server, and wherein said secondaryinformation includes at least one of the type of security protocolssupported, the type of Internet protocols supported, support for QoS,support for interworking with other networks, existence of roamingrelationship, names of roaming partners, pricing information, and/orservices supported by the network.
 9. (canceled)
 10. (canceled) 11.(canceled)
 12. (canceled)
 13. (canceled)
 14. (canceled)
 15. The methodof claim 3, further including having the NIR define a geographical areafor the cellular network to which the information is to be broadcastedor multicasted to.
 16. The method of claim 3, further including havingthe NIR communicate with a plurality of cellular systems belonging todifferent network operators.
 17. The method of claim 3, furtherincluding having the NIR deliver secondary information to mobilestations that send inquiries to the NIR.
 18. The method of claim 3,further including having the mobile stations acquire primary informationthrough cell broadcast or multicast and secondary Information throughdirect inquiry to the NIR about neighboring networks and theirparameters ahead of time.
 19. The method of claim 3, further includinghaving the NIR communicate a preferred time and a preferred timing atwhich message broadcast or multicast is desired.
 20. The method of claim3, further including having the NIR categorize the messages based ontime priority.
 21. The method of claim 3, wherein the mobile stationsare configured to listen to broadcasts or multicasts to obtain primaryinformation about network elements, and are configured to obtainsecondary information about network elements by sending queries to theNIR.
 22. The method of claim 3, wherein the mobile stations areconfigured to listen to and to compare the broadcasts or multicastsreceived from cellular networks and beckons from non-cellular networksand to discern inconsistencies between the messages received.
 23. Themethod of claim 3, wherein the mobile stations are configured to pullsecondary information from the NIR and to compare the pulled secondaryinformation with that which it obtains after actually connecting to acandidate network and discerning inconsistencies between the messagesreceived from the NIR and the actual candidate network.
 24. (canceled)25. The method of claim 3, wherein said mobile station is configured tooperate in an active mode wherein both primary inconsistencies andsecondary inconsistencies are conveyed to an NIR, or in a passive modewherein only primary inconsistencies are conveyed to the NIR.
 26. Themethod of claim 3, wherein the mobile station is configured to decidewhether the primary information is enough for the mobile station'ssession continuity or whether it needs secondary information.
 27. Themethod of claim 3, wherein regardless of where a mobile station islocated and which local network it is connected to, the mobile stationuses the same protocols to communicate with the NIR to retrieve thedesired information.
 28. The method of claim 3, wherein the mobilestation is equipped with multiple interfaces, including WLAN andcellular interfaces.
 29. (canceled)
 30. (canceled)
 31. (canceled)