System and Method for Advertising the Same Service Set Identifier for Different Basic Service Sets

ABSTRACT

According to one embodiment of the invention, a method comprises advertising services by a first wireless device. The services are provided by different basic service sets, each basic service set having the same service set identifier (SSID). Thereafter, one of the basic service sets is selected.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of and claims the benefit of priorityon U.S. patent application Ser. No. 11/305,910 filed Dec. 19, 2005, theentire contents of which are incorporated herein by reference.

FIELD

Embodiments of the invention relate to the field of communications, andin particular, to a system and method for configuring a single accesspoint (AP) to advertise the same Service Set identifier (SSID) fordifferent Basic Service Set identifiers (BSSIDs).

GENERAL BACKGROUND

Over the last decade or so, many companies have installed networks withone or more local area networks in order to allow their employees accessto various network resources. To improve efficiency, enhancements havebeen added to local area networks such as wireless access. Based on thisenhancement, wireless local area networks (WLANs) have been and continueto be utilized by more and more companies.

Typically, a WLAN supports communications between number of wirelessdevices, such as wireless stations (STAs) and Access Points (APs),without any required line of sight for such communications. In general,each AP is wired to an Ethernet network and operates as a relay stationby supporting communications between resources of the wired network andthe wireless devices.

Currently, a WLAN features a set of wireless devices is referred to as a“Basic Service Set” (BSS). Multiples sets of wireless devices (BSSs) indirect communication with each other may be logically grouped togetherto form an “Extended Service Set” (ESS). The ESS is identified by one ormore bytes forming an alphanumeric name that is commonly referred to asa “Service Set Identifier” (SSID). The purpose of the SSID is to helpSTAs find and connect to proper APs on a desired ESS.

Each AP may actively advertise the presence of a wireless networkseveral times per second by broadcasting beacon frames that include theSSID for the ESS that the AP belongs to. STAs can discover APs bylistening for these beacons. Alternatively, an AP may passivelyadvertise the presence of a wireless network by waiting for one or moreframes from a STA that is actively searching for access to a wirelessnetwork.

Currently, APs may be configured to simultaneously advertise access tomultiple WLAN networks (BSSs) for a number of reasons such as security,quality of service (QoS) or ease of migration. There are a number ofconventional configuration schemes that support simultaneousadvertisement of services supported by different WLAN networks.

For instance, a first conventional configuration scheme involves thephysical assignment of an AP for each BSS having different capabilities.Of course, this technique is costly to implement. In order to avoid suchcosts, conventional APs can be configured to advertise servicesassociated with multiple BSSs, but only if every BSS is associated witha different ESS. In other words, the AP can advertise different SSIDsfor each network type on a different BSSID. While this technique reducesthe overall implementation costs from the first conventionalconfiguration scheme, the presence of multiple SSIDs to users seekingaccess to the wireless network may cause confusion as to which networkshe or he should connect to.

Yet another conventional configuration scheme involves each APadvertising a single, unique SSID for each active BSS (i.e.,transmitting a beacon including a single SSID). However, the AP isadapted to respond to Probe Requests for hidden SSIDs (i.e., ProbeRequests for SSIDs that differ from the SSID exclusively broadcast inthe beacons). This configuration deviates from current WLANcommunications standards and assumes specific client behavior that maynot be found in all network configurations.

None of the conventional configuration schemes is designed where an APis configured as a virtual AP supporting multiple BSSs, each BSS havinga different BSS identifier (BSSID) and each BSS advertising servicesthat include the same SSID in order to reduce network complexity.

BRIEF DESCRIPTION OF THE DRAWINGS

The invention may best be understood by referring to the followingdescription and accompanying drawings that are used to illustrateembodiments of the invention.

FIG. 1 is an exemplary embodiment of an Extended Service Set (ESS) inaccordance with an embodiment of the invention.

FIG. 2 is an exemplary embodiment of the advertising of BSS servicesfrom one wireless device (AP) to another wireless device (STA).

FIG. 3 is an exemplary embodiment of the advertising of BSS servicesincluding its encryption attribute from one wireless device (AP) toanother wireless device (STA).

FIG. 4 is an exemplary embodiment of the operations for advertising andselecting services of a BSS.

FIG. 5 is an exemplary embodiment of operations of intelligent VoIPsupport through the advertising of different DTIMs.

FIG. 6 is an exemplary embodiment of operations of BSS association basedon computations by the second wireless device.

FIG. 7 is an exemplary embodiment of the operations for advertising andselecting services based on an attribute for a BSS excluding the SSID.

DETAILED DESCRIPTION

Embodiments of the invention relate to a system and method forconfiguring multiple Basic Service Sets (BSSs) each with different BasicService Set identifiers (BSSIDs) to advertise services including thesame Service Set identifier (SSID) as an attribute. In general, in lieuof selecting the BSSID based on a uniquely assigned SSID as previouslyperformed, the BSSID selection by a wireless device may be automatic(without need of user intervention) and based, at least in part, on atleast one attribute of that BSS other than the SSID. For instance, theattribute may be the encryption profile of the BSS where different BSSsfeature different encryption profiles (e.g., a Guest network “BSS1”supporting unencrypted communications and an Employee network “BSS2”supporting some sort of encryption protocol). Another attribute may bethe particular type of Delivery Traffic Indication Message (DTIM), wherevoice-based networks will associate with a BSS advertising a higher DTIMin order to conserve phone battery life.

Herein, according to one embodiment, the invention may be applicable toa wireless network. According to one embodiment of the invention, thewireless network features an Extended Service Set (ESS) identified by a“Service Set Identifier” (SSID) being one or more bytes forming analphanumeric name. The ESS is a logical grouping of multiple wirelessnetworks (e.g., wireless local area networks) referred to as “BasicService Sets” (BSSs), which are sets of wireless devices in directcommunication with each other.

Herein, a wireless network may be configured in accordance with anycurrent or future wireless communication protocols. Examples of varioustypes of wireless communication protocols include, but are not limitedor restricted to the following: Institute of Electrical and ElectronicsEngineers (IEEE) 802.11 standards, High Performance Radio Local AreaNetworks (HiperLAN) standards, WiMax (IEEE 802.16) and the like. Forinstance, the IEEE 802.11 standard may an IEEE 802.11b standard entitled“Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY)specifications: Higher-Speed Physical Layer Extension in the 2.4 GHzBand” (IEEE 802.11b, 1999); an IEEE 802.11a standard entitled “WirelessLAN Medium Access Control (MAC) and Physical Layer (PHY) specifications:High-Speed Physical Layer in the 5 GHz Band” (IEEE 802.11a, 1999); arevised IEEE 802.11 standard “Wireless LAN Medium Access Control (MAC)and Physical Layer (PHY) specifications” (IEEE 802.11, 1999); an IEEE802.11g standard entitled “Wireless LAN Medium Access Control (MAC) andPhysical Layer (PHY) specifications: Further Higher Data Rate Extensionin the 2.4 GHz Band” (IEEE 802.11g, 2003) or the like.

Certain details are set forth below in order to provide a thoroughunderstanding of various embodiments of the invention, albeit theinvention may be practiced through many embodiments other that thoseillustrated. Well-known logic and operations are not set forth in detailin order to avoid unnecessarily obscuring this description.

In the following description, certain terminology is used to describefeatures of the invention. For example, a “wireless device” generallyincludes hardware and/or at least one software module adapted to supportwireless communications with another wireless device over the wirelessnetwork. Examples of a wireless device may include, but are not limitedor restricted to an Access Point (AP), a wireless station (STA) or thelike.

The software module is executable code such as an application, anapplet, a routine or even one or more executable instructions stored ina storage medium. The storage medium may include, but is not limited orrestricted to a programmable electronic circuit, a semiconductor memorydevice, a volatile memory (e.g., random access memory, etc.), anon-volatile memory (e.g., read-only memory, flash memory, a hard drive,etc.), a portable memory device (e.g., floppy diskette, a compact disk“CD”, digital versatile disc “DVD”, a tape, a Universal Serial Bus “USB”flash drive), or the like.

A “profile” is a set of parameters defining the way a wireless deviceoperates. “Information” is defined as data, address, control, managementor any combination thereof. The information may be transmitted as amessage, namely a collection of bits in a predetermined format such as aheader and payload data format.

I. General Network Architecture

Referring to FIG. 1, an exemplary embodiment of an Extended Service Set(ESS) 100 in accordance with an embodiment of the invention is shown. Inaccordance with this embodiment of the invention, ESS 100 includes aplurality of interconnected Basic Service Sets (BSSs) 110 ₁-110 _(N)(N≧1), namely a first BSS (BSS1) 110 ₁, a second BSS (BSS2) 110 ₂ and athird BSS (BSS3) 110 ₃. Each BSS 110 ₁, . . . , or 110 _(N) includes atleast one access point (AP) adapted for communication with one or morewireless stations (STAs).

As shown in detail, a first access point (AP) 120 ₁ and a second accesspoint (AP) 120 ₂ are in communication with each other over aninterconnect 130. According to one embodiment of the invention,interconnect 130 comprises a wired and/or wireless information-carryingmedium that provides a communication path between APs 120 ₁-120 ₂ and anetwork (Ethernet) switch 150 and other resources. Furthermore, AP 120 ₁is in communications with STA 140 ₁-140 ₃ while AP 120 ₂ is incommunications with STAs 140 ₄.

For the illustrative embodiment of ESS 100 of FIG. 1, BSS1 110 ₁includes AP 120 ₁ and STAs 140 ₁ and 140 ₂ while BSS2 110 ₂ includes AP120 ₁ and STA 140 ₃. BSS3 110 ₃ includes AP 120 ₂ and STA 140 ₄.According to one embodiment of the invention, a STA constitutes anywireless device that processes information (e.g., portable computer,personal digital assistant “PDA”, networked communication equipment suchas a Voice-over-IP (VoIP) telephone, Wireless LAN Tag, etc.).

More specifically, as shown in FIG. 2, APs 120 ₁ includes wirelesstransceiver logic 200 that is adapted to receive messages and transmitmessages that are formatted to advertise services associated withdifferent BSSs. Each message may include a BSSID corresponding to theparticular BSS along with the same SSID. Although not shown, wirelesstransceiver logic 200 may include, but is not limited or restricted toan antenna, a tuner, a processor such as a microprocessor, digitalsignal processor, microcontroller, or any component adapted to recoverinformation from incoming messages and to formulate outgoing messages, amemory to temporarily store the information, or the like.

As an illustrative example, when a new STA (e.g., STA 140 ₅) requestsaccess to one of BSSs 110 ₁-110 _(N) forming ESS 100 by transmitting aRequest 205, AP 120 ₁ returns “N” Probe Responses 210 ₁-210 _(N)depending on the number of BSSs 110 ₁-110 _(N) associated with ESS 100of FIG. 1. Presuming N=2 for illustration purposes, AP 120 ₁ generates afirst Response 210 ₁ and a second Response 210 ₂. First Response 210 ₁includes an SSID 220 of ESS 100 and at least one other attribute 230 ofBSS1 110 ₁. Second Response 210 ₂ includes the same SSID 220, but alsoincludes an attribute 240 of BSS2 110 ₂.

For instance, as shown in FIG. 3, the advertisement may involve theexchange of Probe Request and Probe Response messages. Within firstProbe Response message 210 ₁, attribute 230 of BSS1 110 ₁ may be a firstencryption profile 300 identifying that BSS1 110 ₁ supports WiredEquivalent Privacy (WEP) encryption. In contrast, attribute 240 of BSS2110 ₂ within second Probe Response message 210 ₂ may be a secondencryption profile 310 identifying a different type of encryption schemethat is supports, such as WPA or WPA2.

II. Single SSID, Multiple BSSID Advertisements

Herein, the term “first wireless device” is considered to be a devicewith wireless communication capabilities optionally operating in concertwith network switch 150 of FIG. 1. For instance, an Access Point (AP)may constitute the first wireless device and optionally operates withnetwork switch 150 to respond to messages from other wireless devices.

Referring to FIG. 4, an exemplary embodiment of the operations foradvertising and selecting services of a BSS is shown. For thisembodiment of the invention, as optionally illustrated in block 410, afirst wireless device detects a second wireless device such as an APdetecting a new STA within its coverage area for example. Such detectionmay be through receipt of a Probe Request frame from the second wirelessdevice such as wireless stations (STAs) for example.

The first wireless device advertises services provided by different BSSsbut having the same SSID (block 420). For instance, using anillustrative example, the AP transmits multiple messages, each includingthe same SSID but different BSSIDs. Upon receipt and processing of thesemessages, the second wireless device selects one of the BSSIDs toestablish communications and become a member of the associated BSS(block 430).

Referring to FIG. 5, an exemplary embodiment of operations ofintelligent VoIP support through the advertising of different DTIMs isshown. These operations correspond to the advertisement of BSS servicesand selection as illustrated in blocks 420 and/or 430 of FIG. 4.

As shown in block 510, the first wireless device is configured toadvertise two BSSIDs each with different DTIMs through beacons forexample. At some point thereafter, as shown in block 520, the firstwireless device detects the second wireless device (e.g., STA with VoIPcapabilities referred to as “VoIP STA”). Such detection may be throughreceipt of a Probe Request frame from VoIP STA for example. This ProbeRequest would include a DTIM profile, which indicates whether the secondwireless device is a voice-based device such as a VoIP capable device(e.g., VoIP telephone).

Upon the second wireless device being identified as a VoIP capabledevice through analysis the DTIM profile by the first wireless device,the first wireless device hides the BSSID with the lower DTIM byresponding only with a Probe Response message including the BSSIDassociated with the higher DTIM value (blocks 530, 540 and 550). Ofcourse, if the wireless network features three or more BSSs each withdifferent DTIMs, it is contemplated that the BSSID associated with thehighest DTIM may be transmitted or the BSSID associated with anintermediary DTIM value may be transmitted if other attributes determinethat the second wireless device should become a member to that BSS.

If the second wireless device is identified as a data device, the firstwireless device hides the BSSID with the higher DTIM by responding onlywith a Probe Response message including the BSSID associated with thelower DTIM value (blocks 530, 540 and 560). Similarly, if the wirelessnetwork features three or more BSSs each with different DTIMs, it iscontemplated that the BSSID associated with the lowest DTIM may betransmitted or the BSSID associated with an intermediary DTIM value maybe transmitted if other attributes determine that the second wirelessdevice should become a member to that BSS.

As an alternative embodiment, although not shown, it is contemplatedthat the first wireless device may be configured to transmit multipleProbe Requests with a first Probe Response including the BSSIDassociated with a DTIM having a predetermined value and a second ProbeResponse including a BSSID associated with a DTIM having a value higherthan the predetermined value. Hence, the second wireless device isresponsible for selecting which BSSID to associate with and the DTIMprofile would not need to be provided in the Probe Request from thesecond wireless device.

Referring now to FIG. 6, an exemplary embodiment of operations of BSSassociation based on computations by the second wireless device isshown. As shown, the first wireless device is configured to advertise aplurality of BSSIDs each associated with the same SSID but havingdifferent encryption schemes for example. More specifically, as shown inblock 610, the first wireless device detects the second wireless device.Such detection may be through receipt of a Probe Request frame from thesecond wireless device for example.

In response, the first wireless device transmits a Probe Response foreach BSSS associated with the plurality of BSSIDs. For instance, wheretwo BSSs are supported as shown, the first wireless device produces afirst Probe Response including the ESSID and a first BSSID (BSSID1)associated with a first encryption scheme (block 620). The firstencryption scheme may be no encryption, Wired Equivalent Privacy (WEP),WPA, WPA2 or the like. In addition, the first wireless device produces asecond Probe Response including the same SSID and a second BSSID(BSSID2) associated with a second encryption scheme, where the secondencryption scheme differs from the first encryption scheme (block 630).The first and second Probe Responses are transmitted from the firstwireless device (block 640).

Upon receipt by the second wireless device, a determination is madewhether the second wireless device supports the first encryption schemeor the second encryption scheme (block 650). If the second wirelessdevice supports the first encryption scheme, it associates with thefirst BSSID (block 660). However, if the second wireless device supportsthe second encryption scheme, it associates with the second BSSID(blocks 670 and 680). In the unlikely event that the second wirelessdevice supports both encryption schemes, it may be adapted to select theBSSID having the most secure encryption scheme. Normally, however thesecond wireless device will be adapted with one encryption profile.

Referring now to FIG. 7, an exemplary embodiment of the operations foradvertising and selecting services based on an attribute for a BSSexcluding the SSID is shown. For this embodiment of the invention, afirst wireless device detects a second wireless device such as an APdetecting a new STA within its coverage area for example (block 700).Such detection may be through receipt of a Probe Request message fromthe second wireless device.

In response, the first wireless device advertises services provided bydifferent BSSs but having the same SSID (block 710). Such advertisementinvolves the formulation of a plurality of Probe Response message foreach BSS supported by the first wireless device. Each Probe Responsemessage includes the same SSID, a different BSSID and a differentattribute uniquely associated with the BSS corresponding to the BSSID.

For instance, as described in FIG. 5, the unique attribute may be aparticular DTIM value (DTIM1<DTIM2, etc.) so that voice-based wirelessdevices placing priority on battery conservation associated with the BSShaving the higher DTIM value (DTIM2). For other devices where batteryconservation is less of a priority, these devices may associated withthe BSS having the lower DTIM value (DTIM1). migration from weaker tostronger encryption schemes.

As another illustrative example, as described in FIG. 6, the uniqueattribute may be a particular encryption scheme (none, WEP, WPA, WPA2,etc) to enable easy migration from weaker to stronger encryptionschemes.

Thereafter, as shown in block 720 of FIG. 7, the second wireless deviceselects the proper BSS upon analysis of the attribute.

While the invention has been described in terms of several embodiments,the invention should not limited to only those embodiments described,but can be practiced with modification and alteration within the spiritand scope of the appended claims. The description is thus to be regardedas illustrative instead of limiting.

1. A method comprising: advertising services by a first wireless device,the services provided by different basic service sets each having thesame service set identifier (SSID); and selecting one of the basicservice sets.
 2. The method of claim 1, wherein the advertising of theservices includes transmitting a plurality of messages eachcorresponding to one of the basic service sets, each message includingthe SSID.
 3. The method of claim 1, wherein the advertising of theservices comprising: producing a plurality of messages with (i) a firstmessage including the SSID, a unique identifier identifying a firstbasic service set of the basic service sets and an attribute associatedwith the first basic service set and (ii) a second message including theSSID, a unique identifier identifying a second basic service set of thebasic service sets and an attribute associated with the second basicservice set; and transmitting the plurality of messages.
 4. The methodof claim 3, wherein the attribute associated with the first basicservice set includes information that identifies a first encryptionscheme and the attribute associated with the second basic service setincludes information that identifies a second encryption schemediffering from the first encryption scheme.
 5. The method of claim 1,wherein prior to advertising services, the method further comprising:detecting the second wireless device by the first wireless device. 6.The method of claim 1, wherein the advertising of the services comprisesproducing a first message including the SSID, a unique identifieridentifying a first basic service set of the basic service sets and anattribute associated with the first basic service set.
 7. The method ofclaim 6, wherein the attribute associated with the first basic serviceset is a Delivery Traffic Indication Message (DTIM) value.
 8. The methodof claim 7, wherein prior to advertising services, the method furthercomprising: analyzing a DTIM profile of the second wireless device;determining if the second wireless device is voice-over-IP capable; andtransmitting the first message including the DTIM value having either afirst value if the second wireless device is voice-over-IP capable or asecond value if the second wireless device is voice-over-IP capable withthe first value being greater than the second value.
 9. The method ofclaim 1, wherein the advertising of the services comprising: producing aplurality of messages with (i) a first message including the SSID, aunique identifier identifying a first basic service set of the basicservice sets and a first DTIM value, and (ii) a second message includingthe SSID, a unique identifier identifying a second basic service set ofthe basic service sets and a second DTIM value being lesser in valuethan the first DTIM value; and transmitting the plurality of messages.10. The method of claim 9, wherein the selecting of the one of the basicservice sets includes selecting the first basic service set if thesecond wireless device is battery powered.
 11. The method of claim 9,wherein the selecting of the one of the basic service sets includesselecting the second basic service set if the second wireless device isnot battery powered.
 12. A first wireless device adapted for a networkand including logic to execute software stored in a storage medium,comprising: a first software module that is configured to determine apresence of a second wireless device; and a second software module that,when executed, advertises services provided by a plurality of basicservice sets of the network, each basic service set having the sameservice set identifier (SSID).
 13. The first wireless device of claim12, wherein the first software module to advertise services bytransmitting a plurality of messages each corresponding to one of theplurality of basic service sets, each message including the SSID. 14.The first wireless device of claim 12, wherein the first software moduleto produce a plurality of messages with (i) a first message includingthe SSID, a unique identifier identifying a first basic service set ofthe plurality of basic service sets and an attribute associated with thefirst basic service set and (ii) a second message including the SSID, aunique identifier identifying a second basic service set of theplurality of basic service sets and an attribute associated with thesecond basic service set.
 15. A wireless device of a network comprising:a memory; and a processor coupled to the memory, the processor toadvertise services provided by different basic service sets forming thenetwork, each basic service set having the same service set identifier(SSID).
 16. The wireless device of claim 15, wherein the processoradvertises the services by transmitting a plurality of messages eachcorresponding to one of the basic service sets, the plurality ofmessages comprises (i) a first message including the SSID, a uniqueidentifier identifying a first basic service set of the basic servicesets and an attribute uniquely identifying the first basic service set,and (ii) a second message including the SSID, a unique identifieridentifying a second basic service set of the basic service sets and anattribute uniquely identifying the second basic service set.
 17. Thewireless device of claim 16, wherein the attribute identifying the firstbasic service set includes information that identifies a firstencryption scheme and the attribute identifying the second basic serviceset includes information that identifies a second encryption schemediffering from the first encryption scheme.
 18. The wireless device ofclaim 15, wherein the processor advertises the services by transmittingat least one message corresponding to one of the basic service sets, theat least one message comprises the SSID, an identifier uniquelyidentifying a first basic service set of the basic service sets and aDelivery Traffic Indication Message (DTIM) value.
 19. The wirelessdevice of claim 18, wherein the processor advertises the services by:analyzing a DTIM profile received from a second wireless device;determining if the second wireless device is voice-over-IP capable; andtransmitting the at least one message including the DTIM value havingeither (i) a first value if the second wireless device is voice-over-IPcapable or (ii) a second value if the second wireless device isvoice-over-IP capable with the first value being greater than the secondvalue.
 20. The wireless device of claim 19, wherein the processoradvertises the services in response to receiving PROBE REQUEST messagesfrom the second wireless device.
 21. A wireless device comprising: amemory; and a processor coupled to the memory, the processor to (1)receive a plurality of messages including (a) a first message thatcomprises (i) a service set identifier (SSID) advertised by a firstbasic service set of a plurality basic service sets, and (ii) a firstencryption profile associated with the first basic service set, and (b)a second message that comprises (i) the SSID also advertised by thesecond basic service set of the plurality of basic service sets and (ii)a second encryption profile associated with the second basic serviceset, the second encryption profile differing from the first encryptionprofile, and (2) determine whether the wireless device is to associatewith the first basic service set or the second basic service set basedon an analysis of the encryption profile, wherein the processor toselect the first basic service set associated with the first encryptionprofile if the wireless device supports an encryption schemecorresponding to the first encryption profile.