Controlling channel usage in a wireless network

ABSTRACT

Methods, apparatuses, and embodiments related to a technique for controlling channel usage in a wireless network in a multi-band wireless networking system. In a wireless network with multiple wireless networking devices and one or more client devices, communications between the wireless networking devices occurs via a backhaul channel, and communication between the client(s) and the wireless networking devices occurs via a fronthaul channel. Based on interference characteristics of the wireless channels, a device determines a channel usage plan, and communicates the plan via the backhaul channel to the wireless networking devices of the wireless network.

CROSS-REFERENCE TO RELATED APPLICATIONS

This is a non-provisional application filed under 37 C.F.R. § 1.53(b),claiming priority under U.S.C. Section 119(e) to U.S. Provisional PatentApplication Ser. No. 62/406,325 filed Oct. 10, 2016, the entiredisclosure of which is hereby expressly incorporated by reference in itsentirety.

BACKGROUND

With the evolving technologies of wireless networks, embedded systems,the Internet, etc., there is an ever increasing demand for increasednetwork coverage, increased network bandwidth, higher network speed,etc. from all kinds of electronic devices employed in various settings,from computing and managing data to online shopping and socialnetworking. This is particularly relevant with electronic and digitalcontent having become extensively used in shared, networked environmentsas compared to traditional stand-alone personal computers and mobiledevices. As a result, data traffic, and especially wireless data traffic(e.g., 2.4 GHz, 3.6 GHz, 5 GHz, 60 GHz, etc.), has experienced anenormous growth, with a corresponding increase in wireless trafficcollisions, such as when multiple devices broadcast on the same wirelesschannel.

To achieve coverage in areas too large to cover with a Wi-Fi accesspoint, a device such as a Wi-Fi repeater, extender, booster, etc. can beused to extend the area of coverage. A device such as a repeater enablesthe area of coverage to be extended. For example, the repeater can belocated a distance from the access point, but still close enough toadequately receive Wi-Fi communications from the access point. Therepeater can receive communications from the access point and relaythose communications to a nearby client in an area not adequatelycovered by the access point, enabling clients in areas with inadequatecoverage from the access point to receive communications from therepeater.

SUMMARY

Introduced here is a technique for controlling channel usage for awireless network in a multi-band (e.g., Tri-band) wireless networkingsystem. In some embodiments, the multi-band wireless networking systemincludes multiple wireless networking devices. In some embodiments, atleast one of the wireless networking devices is connected to a wirednetwork, such as a wired network with access to the Internet, and servesas a router. The remaining wireless networking device(s) serve assatellite(s) that are wirelessly connected to the router via a primarywireless channel or band (referred to herein as a “backhaul channel”),the backhaul channel being used primarily for communications between thewireless networking devices. Both the router and the satellites providewireless network connections (e.g., WiFi connections) to client devices,such as desktop computers, laptop computers, tablet computers, mobilephones, wearable smart devices, game consoles, smart home devices, etc.The router can be any device that is capable of forwarding data betweencommunication networks, such as a layer 2 bridge device or a layer 3gateway device, among others.

In some embodiments, at boot up a router configures the wireless networkand begins communicating with a satellite via a first channel, which isa backhaul channel. The satellite begins communicating with a client viaa second channel, which is a fronthaul channel. The backhaul channel ofthis example is capable of higher bandwidth communication than thefronthaul channel. As the various devices are communicating, thewireless communication channels experience interference. The router andthe satellite each scan the various wireless communication channels andcharacterize the observed interference characteristics. The routerdetermines from the interference characteristics of the first channelthat a wireless networking device of another network is broadcasting onthe first channel, while the satellite observes a clear channel on thefirst channel. The difference in observations is due in part to thedifferent location of the router and the satellite, with each deviceexperiencing different interference characteristics as a result. Thesatellite determines from the interference characteristics of the secondchannel that a baby monitor is broadcasting on the second channel, whilethe router observes a clear channel on the second channel. Both therouter and the satellite observe clear channels on third and fourthchannels.

The router and the satellite exchange information regarding the observedinterference via the backhaul channel, whereby the router learns thatthe satellite observed interference on the second channel, the satellitelearns that the router observed interference on the first channel, andboth the router and the satellite learn that the other device found aclear channel on the third and fourth channels. The router and thesatellite communicate via the backhaul channel to determine a channelusage plan, and the router changes from the first channel to the thirdchannel to take advantage of the clear third channel, and the satellitechanges from the second channel to the fourth channel to take advantageof the clear fourth channel. As a result of moving to clear channels,and by coordinating usage of those channels, the communication bandwidthof the router and the satellite increases significantly.

Other aspects of the disclosed embodiments will be apparent from theaccompanying figures and detailed description.

This Summary is provided to introduce a selection of concepts in asimplified form that are further explained in the Detailed Description.This Summary is not intended to identify key features or essentialfeatures of the claimed subject matter, nor is it intended to be used tolimit the scope of the claimed subject matter.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 shows 5 GHz channel allocation in North America, consistent withvarious embodiments.

FIG. 2 shows 5 GHz channel allocation in Europe, consistent with variousembodiments.

FIG. 3 illustrates an example of a state machine for hidden Markovmodel, consistent with various embodiments.

FIG. 4 illustrates an example of a pattern of client device location,consistent with various embodiments.

FIG. 5 shows inferences within units of the system on 2 GHz and 5 GHz,consistent with various embodiments.

FIG. 6 shows transmit and receive overlapping between the units,consistent with various embodiments.

FIG. 7 shows a client device on the coverage edge of the system units,consistent with various embodiments.

FIG. 8 shows different types of network topologies, consistent withvarious embodiments.

FIG. 9 shows the communications between GATT (Generic Attributes)servers and clients, consistent with various embodiments.

FIG. 10 shows an example of a detected intruder device, consistent withvarious embodiments.

FIG. 11 shows an example of HMM for modeling device movement, consistentwith various embodiments.

FIG. 12 shows an HMM model for coordination and time measurements,consistent with various embodiments.

FIG. 13 shows intruder devices that are between the units of the system,consistent with various embodiments.

FIG. 14 shows architecture of Deep Packet Inspection (DPI) technology,consistent with various embodiments.

FIG. 15 shows devices that have different needs for power and datathroughput, consistent with various embodiments.

FIG. 16 shows that monitor mode can be triggered in middle mode,consistent with various embodiments.

FIG. 17 shows time of arrival and amplitude measurements for tracking,consistent with various embodiments.

FIG. 18 shows a triangulation concept using WiFi or BLE (Bluetooth lowenergy), consistent with various embodiments.

FIG. 19 shows client within ranges of multiple Bluetooth while units ofthe system only communicate over WiFi, consistent with variousembodiments.

FIG. 20 shows a Bluetooth localization using time of arrival, consistentwith various embodiments.

FIG. 21 shows that location of one unit of the system can be detectedfrom known locations of other units of the system, consistent withvarious embodiments.

FIG. 22 shows a device is used for locating itself, consistent withvarious embodiments.

FIG. 23 shows that locations can be tracked based on initial GPSlocations, consistent with various embodiments.

FIG. 24 illustrates a method for changing topology of a Wi-Fi network,consistent with various embodiments.

FIG. 25 illustrates a method for controlling channel usage of a Wi-Finetwork, consistent with various embodiments.

FIG. 26 shows a block diagram illustrating an example of a processingsystem in which at least some operations described herein can beimplemented, consistent with various embodiments.

FIG. 27 is a system block diagram illustrating an access point in whichat least some operations described herein can be implemented, consistentwith various embodiments.

DETAILED DESCRIPTION

The embodiments set forth below represent the necessary information toenable those skilled in the art to practice the embodiments, andillustrate the best mode of practicing the embodiments. Upon reading thefollowing description in light of the accompanying figures, thoseskilled in the art will understand the concepts of the disclosure andwill recognize applications of these concepts that are not particularlyaddressed here. It should be understood that these concepts andapplications fall within the scope of the disclosure and theaccompanying claims.

The purpose of terminology used herein is only for describingembodiments and is not intended to limit the scope of the disclosure.Where context permits, words using the singular or plural form may alsoinclude the plural or singular form, respectively.

As used herein, unless specifically stated otherwise, terms such as“processing,” “computing,” “calculating,” “determining,” “displaying,”“generating,” or the like, refer to actions and processes of a computeror similar electronic computing device that manipulates and transformsdata represented as physical (electronic) quantities within thecomputer's memory or registers into other data similarly represented asphysical quantities within the computer's memory, registers, or othersuch storage medium, transmission, or display devices.

As used herein, terms such as “connected,” “coupled,” or the like, referto any connection or coupling, either direct or indirect, between two ormore elements. The coupling or connection between the elements can bephysical, logical, or a combination thereof. References in thisdescription to “an embodiment,” “one embodiment,” or the like, mean thatthe particular feature, function, structure or characteristic beingdescribed is included in at least one embodiment of the presentdisclosure. Occurrences of such phrases in this specification do notnecessarily all refer to the same embodiment. On the other hand, theembodiments referred to also are not necessarily mutually exclusive.

As used herein, terms such as “cause” and variations thereof refer toeither direct causation or indirect causation. For example, a computersystem can “cause” an action by sending a message to a second computersystem that commands, requests, or prompts the second computer system toperform the action. Any number of intermediary devices may examineand/or relay the message during this process. In this regard, a devicecan “cause” an action even though it may not be known to the devicewhether the action will ultimately be executed.

Note that in this description, any references to sending or transmittinga message, signal, etc. to another device (recipient device) means thatthe message is sent with the intention that its information contentultimately be delivered to the recipient device; hence, such referencesdo not mean that the message must be sent directly to the recipientdevice. That is, unless stated otherwise, there can be one or moreintermediary entities that receive and forward the message/signal,either “as is” or in modified form, prior to its delivery to therecipient device. This clarification also applies to any referencesherein to receiving a message/signal from another device; i.e., directpoint-to-point communication is not required unless stated otherwiseherein.

As used herein, unless specifically stated otherwise, the term “or” canencompass all possible combinations, except where infeasible. Forexample, if it is stated that data can include A or B, then, unlessspecifically stated otherwise or infeasible, the data can include A, orB, or A and B. As a second example, if it is stated that data caninclude A, B, or C, then, unless specifically stated otherwise orinfeasible, the data can include A, or B, or C, or A and B, or A and C,or B and C, or A and B and C.

Multi-Band Wireless Networking System

The multi-band wireless networking system (also referred to herein assimply “system”). Each of the wireless networking devices (also referredto herein as simply “device” or “unit”) of the system has multiple(e.g., three) wireless radio components for wireless communications overmultiple (e.g., three) wireless bands. The system can dynamically andautomatically select a channel at which the system is wirelesslyconnected to the client devices (also referred to herein as simply“clients”). A wireless networking device is a device that facilitatescommunication between clients, and between clients and a wired network,such as the Internet. In some embodiments, while one wireless networkingdevice acts as an access point, which is a device that enables a clientto connect to a wired network, each wireless networking device iscapable of being configured to be an access point. In some embodiments,each client device can be wirelessly connected to the system at adifferent wireless channel. In some embodiments, the wireless networkingsystem implements and wirelessly communicates via the Institute ofElectrical and Electronic Engineers (IEEE) 802.11 WLAN standard (e.g.,Wi-Fi).

In some embodiments, at least one of the wireless networking devices isconnected to the Internet and serves as a router (also referred to as“base” or an “Access Point”). The remaining wireless networkingdevice(s) serve as satellite(s) that are wirelessly connected to therouter via a dedicated or primary wireless channel or band. One exampleof the multi-band wireless networking system is the NETGEAR® Orbi®system.

Channel Planning

In some embodiments, the system can conduct an initial channel selectionwhen the system turns on. Then the system conducts a channel changebased on a schedule. If there is a need for immediate channel change(e.g., sudden interference on a specific channel), the system canconduct a real-time channel change as well.

In some embodiments, at boot up a router configures the wireless networkand begins communicating with a satellite via a first channel, which isa backhaul channel. The satellite begins communicating with a client viaa second channel, which is a fronthaul channel. The backhaul channel ofthis example is capable of higher bandwidth communication than thefronthaul channel. A backhaul channel can comprise one or more channelsof a wireless band, such as a 5 GHz high band channel, 60 Ghz channel,or a millimeter wave channel, and a fronthaul channel can comprise oneor more channels of another band or bands, such as 5 Ghz low band or 2.4Ghz band. As the various devices are communicating, the wirelesscommunication channels experience interference. The router and thesatellite each scan the various wireless communication channels andcharacterize the observed interference characteristics. The routerdetermines from the interference characteristics of the first channelthat a wireless networking device of another network is broadcasting onthe first channel, while the satellite observes a clear channel on thefirst channel. The difference in observations is due in part to thedifferent location of the router and the satellite, with each deviceexperiencing different interference characteristics as a result. Thesatellite determines from the interference characteristics of the secondchannel that a baby monitor is broadcasting on the second channel, whilethe router observes a clear channel on the second channel. Both therouter and the satellite observe clear channels on third and fourthchannels.

The router and the satellite exchange information regarding the observedinterference via the backhaul channel, whereby the router learns thatthe satellite observed interference on the second channel, the satellitelearns that the router observed interference on the first channel, andboth the router and the satellite learn that the other device found aclear channel on the third and fourth channels. The router and thesatellite communicate via the backhaul channel to determine a channelusage plan, and the router changes from the first channel to the thirdchannel to take advantage of the clear third channel, and the satellitechanges from the second channel to the fourth channel to take advantageof the clear fourth channel. As a result of moving to clear channels,and by coordinating usage of those channels, the communication bandwidthof the router and the satellite increases significantly.

In some embodiments, the wireless networking devices of the systeminclude radio components for three wireless bands, such as 2.4 GHz band,5 GHz low band, and 5 GHz high band. One of the bands can be dedicatedto or used primarily for wireless communications among the wirelessnetworking devices of the system. The wireless communications among thewireless networking devices of the system is called backhaulcommunications. The other two bands can be used for wirelesscommunications between the wireless networking devices of the system andclient devices. The wireless communications between the wirelessnetworking devices of the system and client devices are called fronthaulcommunications.

In some embodiments, the system uses the 5 GHz high band for backhaulcommunications by default, and uses the 2.4 GHz band and 5 GHz low bandfor fronthaul communications. For example, when the 2.4 GHz band is usedfor fronthaul communications, each unit of the system can operate on adifferent channel in the 2.4 GHz band. (A band can include multiplechannels.) The decision for a best channel for each unit can be madebased on various factors, such as network topology, number ofinterfering access points (also referred to herein as “APs”) on eachchannel for each unit, noise on each channel for each unit, interferenceduration as percentage of time for each unit, type of network trafficsupported for each unit, interference characteristics of one or morechannels, a categorization of the interference characteristics of one ormore channels, etc.

If the backhaul channel (e.g., one or more channels in the 5 GHz highband) goes down, the 2.4 GHz band can be used for backhaulcommunications among units of the system. For example, if a unitoperating in satellite mode detects that the backhaul channel in the 5GHz high band is no longer available (e.g., due to strong interference),the unit's 2.4 GHz radio component can switch to a scan mode to look foran uplink connection at one of the 2.4 GHz channel with another unitoperating in router mode.

If there are multiple clean channels available for a unit, the unit canpick a clean channel that interferes less with other units that are in avicinity. A client channel can be defined based on a function ofinterference, number of APs, and/or other parameters. If the function ofthe interference for a channel is less than a threshold, the channel isa clean channel. There are various ways to detect units in a vicinity.For example, networking topology among the units can be used to detectunits in a vicinity. Beacon power from other units can be used to detectunits in a vicinity. In some embodiments, a unit can use a combinationof networking topology and beacon power to detect other units of thesystem in a vicinity.

The units can communicate the fronthaul channel selections with otherunits through the backhaul channel. In some embodiments, units havinghigher-priority network traffic can have a higher priority in pickingthe fronthaul channel over other units.

The system can make decisions regarding fronthaul channel selections ineither a centralized way or a distributed way. In a distributed way,each unit can make decision on channel selection for itself. Forexample, in some embodiments, a base unit can pick a fronthaul channelfirst. Then each satellite unit can pick a fronthaul channel after thebase unit establishes a backhaul link with the base unit. The system canoptimize the channel selection based on some regular, random,semi-random, etc. schedule. In some embodiments, units handlinghigher-priority network traffic can have a higher priority in pickingthe fronthaul channel over other units during system boot-up or duringscheduled channel optimization.

In a centralized way in some embodiments, the base unit makes decisionsof channel selections for all units of the system. Each satellite unitcan establish a dedicated backhaul link with the base unit and scan thechannels in the fronthaul band(s). Each satellite unit sends detailedinformation regarding candidates of fronthaul channels to the base unit.The detailed information can include, e.g., scan results on all channelsin the fronthaul band(s), and interference on all channels in thefronthaul band(s). The base unit can make the centralized decision onchannel selection periodically over time.

The units of the system can also use 5 GHz channels for fronthaulcommunications. FIGS. 1 and 2 show 5 GHz channel allocation in NorthAmerica and Europe. Some of the 5 GHz channels require a mechanism ofdynamic frequency selection (DFS) to allow devices to share the channels(called DFS channels). For example, devices are required to have DFScapabilities for channels allocated to radar systems so that thosedevices do not cause interference to radars.

If a unit of the system does not have DFS capability to avoid radarinterference, the unit may be limited to pick non-DFS 5 GHz channels,such as channels #36, 40, 44, 48, as primary 80 MHz channel on UNII-1.The unit can keep 80 MHz bandwidth and change the primary channel, ifthe system has more control frames than data frames and mostly one AP isactive. Alternatively, the unit can reduce the bandwidth to accommodatechannel planning in some use cases such as business use or busy homeuse. For example, depending on a total number of units of the system,the unit can reduce bandwidth to 40 MHz or 20 MHz.

If a unit of the system does have DFS capability, the unit can pick aDFS channel that is clear for usage for fronthaul communications. Theunits of the system can use different 80 MHz channels for fronthaulcommunications, since there are multiple 80 MHz channels available asillustrated in FIG. 1.

Similar to the 2.4 GHz case, the system can conduct the 5 GHz channelselection either in a centralized way or a distributed way. The channelselection can use different channel/bandwidth combinations. For example,a unit can choose among two 80 MHz channels, or four 40 MHz channels, oreight 20 MHz channels, or a combination of one 80 MHz channel and two 40MHz channels, or a combination of one 80 MHz channel, one 40 MHz channeland two 20 MHz channels, etc. The bandwidth selection can be conducteddepending on use case and amount of load. For example, if one unit (AP)has many clients and lots of traffic, the unit can receive morechannels.

If the system uses the 5 GHz high band for backhaul communications,there is only one 80 MHz channel available in North American asillustrated in FIG. 1. The system can decide to reduce the bandwidth,thus increasing the number of available channels. For example, if partof the 80 MHz backhaul channel is very busy, the system can reduce thebandwidth to 40 MHz or 20 MHz. The system can make the decision forbackhaul in a centralized manner. In other words, all units can conductchannel scanning and send detailed information regarding the channels tothe base unit. The base unit makes the decision for backhaul andbroadcast backhaul channel information to the satellite units.

If DFS channels are available for backhaul communications, the systemcan use those DFS channels. For example, there can be two 80 MHz DFSchannels in North America as illustrated in FIG. 1. For Europe, all 5GHz channels are DFS channels. The system can pick best DFS channelbased on DFS channel availability and channel utilization parameters aswell as power levels.

FIG. 25 illustrates a method for controlling channel usage of a Wi-Finetwork. At block 2505, a wireless networking device identifies a firstwireless communication channel to use for backhaul communications, thefirst channel being a backhaul channel. Further, more than one channelcan be used for backhaul communications. For example, a first backhaulchannel can be used for communications between a router and a firstsatellite, a second backhaul channel can be used for communicationsbetween the router and a second satellite, and a third backhaul channelcan be used for communications between the first and second satellites.

The wireless networking device can be a router or a satellite, and thewireless network includes a router and can include one or moresatellites. The wireless networking device can select the initialbackhaul channel(s) based on any of various criteria. The channel(s) canbe selected based on inherent communication capabilities of thechannel(s). For example, in the example of FIG. 1, channel(s) with thehighest bandwidth, such as the 80 Mhz channel between 5735 Mhz and 5818Mhz, can be selected to use for backhaul communications. The channel(s)can be selected based on actual communication capabilities. For example,once again referring to the example of FIG. 1, it may be that the 80 Mhzchannel between 5170 Mhz and 5250 Mhz has the highest actual bandwidth,because of, e.g., interference on the other channels, and so thatchannel is selected to use for backhaul communications. The channel(s)can be selected based on RSSI (Received Signal Strength Indicator). Forexample, if a particular channel has the highest average RSSI, has thehighest minimum RSSI, etc., at the units of the network, that particularchannel can be selected to use for backhaul communications.

At block 2510, a wireless networking device identifies a second wirelesscommunication channel to use for fronthaul communications. Further, morethan one channel can be used for fronthaul communications. The wirelessnetworking device of block 2510 can be the same wireless networkingdevice of block 2505, or can be a different wireless networking device.The wireless networking device can select the initial channel(s) to usefor fronthaul based on any of various criteria. The channel(s) can beselected based on inherent communication capabilities of the channel(s).For example, in the example of FIG. 1, channel(s) with bandwidth lowerthan the backhaul channel can be selected to use for fronthaulcommunications. The channel(s) can be selected based on actualcommunication capabilities. For example, once again referring to theexample of FIG. 1, it may be that the 80 Mhz channel between 5170 Mhzand 5250 Mhz has the highest actual bandwidth and is selected forbackhaul communications. In such a case, another channel or channels canbe selected to use for fronthaul communications. The channel(s) can beselected based on RSSI. For example, if a particular channel has thehighest average RSSI, has the highest minimum RSSI, etc., at the unitsof the network, that particular channel can be selected to use forbackhaul communications, and a remaining channel(s) can be selected touse for fronthaul communications.

At block 2515, a wireless networking device determines interferencecharacteristics of one or more channels of a plurality of channels of awireless network. The wireless networking device can be a router or asatellite, and can be the same or a different wireless networking deviceof any or all of blocks 2505 and 2510. The wireless networking devicescans one or more of the channels of the wireless network, anddetermines the interference characteristic of each of the channels. Thecharacteristics can be any of various characteristics. Thecharacteristics can include or indicate, for example, RSSI ofcommunications received on the channel, whether transmissions on thechannel saturate the receiver (such as from two wireless networkingdevices being placed too close to each other), whether a wireless deviceof another network is transmitting on the channel, whether a device,such as a baby monitor, a cordless phone, a Bluetooth device, a caralarm, a microwave oven, a video device, a ZigBee device, etc. istransmitting or emitting a signal on the channel, etc. The interferencecharacteristics can include information regarding the duration, powerlevel, repeat frequency, repeat pattern, etc., of the interferingsignal, and the like. The characteristics can further include whether aradar is transmitting on the channel, such as a radar used by anairport.

At block 2520, a wireless networking device receives data via thebackhaul channel from a second wireless networking device regardinginterference characteristics determined by the second wirelessnetworking device. The wireless networking device that receives the datacan be the same wireless networking device that, at block 2515,determines the interference characteristics. In a wireless network withwireless network devices that include a router and one or moresatellites, the wireless network devices are each located at differentlocations. As a result, the characteristics of the wireless channels asobserved by the wireless network devices can differ due to differencesin the local wireless environment. In an example, a user lives in anapartment building and he places a router against a wall in one room andplaces a satellite in another room. A wireless networking device ofanother apartment dweller is located only about one foot from the routeron the other side of the wall. The interference that the apartmentdweller's device causes for the router is substantially higher than theinterference that it causes for the satellite, due to being located muchcloser to the router than to the satellite. In another example, abusiness places a router at one end of their floor space and places asatellite 100 meters away at the opposite end of their floor space. Therouter on a particular channel observes no interference, while thesatellite on the same channel observes significant interference from awireless device due to the device being located only 10 meters from thesatellite, but being located 110 meters from the router. The types ofcharacteristics determined by the second wireless networking device areof a similar type as are determined by the wireless networking device ofblock 2515.

At block 2525 a device categorizes the interference characteristics. Thedevice can be any of the wireless networking devices of blocks2505-2520, or can be another device, such as another wireless networkingdevice or a computing device. It may be instructive to provide a fewexamples of various ways that the tasks of blocks 2505-2525 can bedistributed. In a first example, the wireless networking device ofblocks 2505-2520 are all a same wireless networking device, namely, arouter, the second wireless device of block 2520 is a satellite (whichalso performs block 2515 prior to sending the data to the router atblock 2520), and the device of block 2525 is the router. In a secondexample, the wireless networking device of blocks 2505-2520 is a router,the second wireless device of block 2520 is a satellite (which alsoperforms block 2515 prior to sending the data to the router at block2520), and the device of block 2525 is a cloud based computing system,which receives data, via the Internet from the router, that indicatesthe interference characteristics determined at block 2515 by the routerand by the satellite. In a third example, the wireless networking deviceof block 2505 is a satellite, the wireless networking device of block2510 is a router, the wireless networking device of block 2515 is thesatellite, the wireless networking device of 2520 is the satellite, thesecond wireless device of block 2520 is the router (which also performsblock 2515 prior to sending the data to the satellite at block 2520),and the device of block 2525 is a computing system that wirelesslyreceives from the satellite data that indicates the interferencescharacteristics determined at block 2515 by the router and by thesatellite. The above examples are not exhaustive as to how the tasks ofblocks 2505-2525 can be distributed, and various other distributions arepossible.

The categories into which the device categorizes the interferencecharacteristics can be any of various categories and can be based on anyof various information. The categories can be, for example, a categoryfor each of various ranges of RSSI levels that are detected, a categorythat identifies channels where RSSI above a certain threshold aredetected, a category that identifies channels where receiver saturationis experienced, a category for each of various ranges of receiversaturation levels that are detected, a category that identifies otherwireless networks that are detected, a category for each wirelessnetwork device of another network or each type of wireless networkdevice of another network that are detected, a category for each ofvarious types of devices that emit interfering signals that aredetected, a category for each of various ranges of duration ofinterference, a category for each of various ranges of power levels ofinterference, a category for each of various ranges of repeat frequencyof interference, a category for each of various types of repeat patternsof interference, a category identifying whether airport radar wasdetected, a category for each type of airport radar detected, and thelike.

The categories can be based on, for example, RSSI of communicationsreceived on the channel, data regarding receiver saturation, data thatindicates that a wireless device of another network is transmitting onthe channel, data that indicates the type of device that is transmittingor emitting a signal on the channel, such as a baby monitor, a cordlessphone, a Bluetooth device, a car alarm, a microwave oven, a videodevice, a ZigBee device, etc., among others. The categories can be basedon, for example, the duration, power level, repeat frequency, repeatpattern, etc., of the interfering signal, and the like. The categoriescan further be based on whether a radar is transmitting on the channel,such as a radar used by an airport.

At block 2530, a device determines to use a third channel for backhaulcommunications based on the interference characteristics. The device canbe any of the wireless networking devices of blocks 2505-2520, or can bethe device of block 2525, or can be another device, such as anotherwireless networking device or another computing device. In a firstexample, the wireless networking device of blocks 2505-2520 are all asame wireless networking device, namely, a router, the second wirelessdevice of block 2520 is a satellite (which also performs block 2515prior to sending the data to the router at block 2520), and the deviceof blocks 2525 and 2530 is the router. In this example, the router,based on the interference characteristics determined at block 2515 bythe router, or based on the data regarding interference characteristicsreceived at block 2520 from the satellite, or based on thecategorization of the interference characteristics determined at block2525 by the router, determines a usage plan for the channels of thewireless network. The router, based on the interference characteristicsdetermined at block 2515 by the router, or based on the data regardinginterference characteristics received at block 2520 from the satellite,or based on the categorization of the interference characteristicsdetermined at block 2525 by the router, determines that a third channellikely has the highest available bandwidth between the router and thesatellite out of any backhaul channel, and determines that a fourthchannel likely has the highest available bandwidth between the satelliteand a client device out of any fronthaul channel.

The router determines to use the third channel for backhaulcommunications (block 2530) and sends a message via the current backhaulchannel (i.e., the first channel) to the satellite to cause thesatellite to switch to the third channel (block 2535), and the routerand, in response, the satellite both switch to the third channel forbackhaul communications. The router determines to use the fourth channelfor fronthaul communications (block 2540) between the satellite and theclient device. The router sends a message via the new backhaul channel(i.e., the third channel) to the satellite, which in turn forwards themessage via the current fronthaul channel (i.e., the second channel) tothe client device to cause the client device to switch to the fourthchannel (block 2545) for fronthaul communications between the satelliteand the client device. The satellite and, in response, the client deviceswitch to the fourth channel for fronthaul communications.

In a second example, the wireless networking device of blocks 2505-2520is a router, the second wireless device of block 2520 is a satellite(which also performs block 2515 prior to sending the data to the routerat block 2520), and the device of blocks 2525 and 2530 is a cloud basedcomputing system, which receives data, via the Internet from the router,that indicates the interference characteristics determined at block 2515by the router and by the satellite. In this example, the cloud computer,based on the interference characteristics determined at block 2515 bythe router, or based on the data regarding interference characteristicsreceived at block 2520 from the satellite, or based on thecategorization of the interference characteristics determined at block2525 by the cloud computer, determines a usage plan for the channels ofthe wireless network. The cloud computer, based on the interferencecharacteristics determined at block 2515 by the router, or based on thedata regarding interference characteristics received at block 2520 fromthe satellite, or based on the categorization of the interferencecharacteristics determined at block 2525 by the cloud computer,determines that a third channel likely has the lowest interference leveland corresponding highest communication bandwidth between the router andthe satellite out of any backhaul channel, and determines that a fourthchannel likely has the lowest interference level and correspondinghighest communication bandwidth out of any fronthaul channel.

The router determines to use the third channel for backhaulcommunications (block 2530) and sends a message via the current backhaulchannel (i.e., the first channel) to the satellite to cause thesatellite to switch to the third channel (block 2535), and the routerand the satellite both switch to the third channel for backhaulcommunications. The router determines to use the fourth channel forfronthaul communications (block 2540) between the satellite and theclient device. The router sends a message via the new backhaul channel(i.e., the third channel) to the satellite, which in turn forwards themessage via the current fronthaul channel (i.e., the second channel) tothe client device to cause the client device to switch to the fourthchannel (block 2545) for fronthaul communications between the satelliteand the client device. The satellite and, in response, the client deviceswitch to the fourth channel for fronthaul communications.

In a third example, the wireless networking device of block 2505 is asatellite, the wireless networking device of block 2510 is a router, thewireless networking device of block 2515 is the satellite, the wirelessnetworking device of 2520 is the satellite, the second wireless deviceof block 2520 is the router (which also performs block 2515 prior tosending the data to the satellite at block 2520), and the device ofblocks 2525 and 2530 is a computing system that wirelessly receives fromthe satellite data that indicates the interferences characteristicsdetermined at block 2515 by the router and by the satellite. Thecomputing system is part of the same wireless network as the router andthe satellite. In this example, the computing system, based on theinterference characteristics determined at block 2515 by the satellite,or based on the data regarding interference characteristics received atblock 2520 from the router, or based on the categorization of theinterference characteristics determined at block 2525 by the computingsystem, determines a usage plan for the channels of the wirelessnetwork. The computing system, based on the interference characteristicsdetermined at block 2515 by the satellite, or based on the dataregarding interference characteristics received at block 2520 from therouter, or based on the categorization of the interferencecharacteristics determined at block 2525 by the computing system,determines, based on a low interference level detected at a third andfourth channel, that the third channel likely has the most reliablecommunication capabilities between the router and the satellite out ofany backhaul channel, and determines that the fourth channel likely hasthe most reliable communication capabilities out of any fronthaulchannel.

The router determines to use the third channel for backhaulcommunications (block 2530) and sends a message via the current backhaulchannel (i.e., the first channel) to the satellite to cause thesatellite to switch to the third channel (block 2535), and the routerand the satellite both switch to the third channel for backhaulcommunications. The router determines to use the fourth channel forfronthaul communications (block 2540) between the satellite and theclient device. The router sends a message via the new backhaul channel(i.e., the third channel) to the satellite, which in turn forwards themessage via the current fronthaul channel (i.e., the second channel) tothe client device to cause the client device to switch to the fourthchannel (block 2545) for fronthaul communications between the satelliteand the client device. The satellite and, in response, the client deviceswitch to the fourth channel for fronthaul communications.

In a fourth example, the wireless networking device of blocks 2505-2520are all a same wireless networking device, namely, a router, the secondwireless device of block 2520 is a satellite (which also performs block2515 prior to sending the data to the router at block 2520), and thedevice of blocks 2525 and 2530 is the router. In this example, therouter, based on the interference characteristics determined at block2515 by the router, or based on the data regarding interferencecharacteristics received at block 2520 from the satellite, or based onthe categorization of the interference characteristics determined atblock 2525 by the router, determines a usage plan for the channels ofthe wireless network. The router, based on the interferencecharacteristics determined at block 2515 by the router, or based on thedata regarding interference characteristics received at block 2520 fromthe satellite, or based on the categorization of the interferencecharacteristics determined at block 2525 by the router, determines thata source of interference on one or more channels is a radar system beingused by a local airport for a radar system. As a result of there being alocal airport, the router determines that certain of the channels arebarred and cannot be used, as the government bars transmission oncertain channels when the transmission may interfere with airport radar.The router determines that a third channel likely has the highestavailable bandwidth between the router and the satellite out of anynon-barred backhaul channel, and determines that a fourth channel likelyhas the highest available bandwidth between the satellite and a clientdevice out of any non-barred fronthaul channel.

The router determines to use the third channel for backhaulcommunications (block 2530) and sends a message via the current backhaulchannel (i.e., the first channel) to the satellite to cause thesatellite to switch to the third channel (block 2535), and the routerand, in response, the satellite both switch to the third channel forbackhaul communications. The router determines to use the fourth channelfor fronthaul communications (block 2540) between the satellite and theclient device. The router sends a message via the new backhaul channel(i.e., the third channel) to the satellite, which in turn forwards themessage via the current fronthaul channel (i.e., the second channel) tothe client device to cause the client device to switch to the fourthchannel (block 2545) for fronthaul communications between the satelliteand the client device. The satellite and, in response, the client deviceswitch to the fourth channel for fronthaul communications.

The determination of blocks 2530 or 2540 can be based on theinterference characteristics in any of various ways. For example, someinterfering devices broadcast interference signals that follow a certainpattern. A device, such as a baby monitor, may have a pattern ofbroadcasting for a significant period of time, followed by a period ofnot broadcasting for a significant period of time. Based on thispattern, a determination could be made at block 2530 or 2540 to startusing the channel as soon as the interference characteristics indicatethat the device is no longer broadcasting, and to stop using the channelas soon as the interference characteristics indicate that the devicebegins broadcasting again. As another example, the interferencecharacteristics can be gathered over a period of time for a particularchannel, and the interference patterns can be analyzed to determinehistorical usage patterns. In one case, the interference characteristicsof the particular channel are analyzed, and a determination is made thatthe particular channel experiences significant interference from 7 am to7 pm on Monday through Friday, and experiences low interference at othertimes. Based on the historical usage pattern, a determination can bemade to not use the particular channel between 7 am and 7 pm on Mondaythrough Friday, and to use the particular channel during the remainingdays and times.

In yet another example, the interference characteristics indicate that amicrowave over emits electromagnetic radiation on a particular channel,and that when the microwave begins to emit the radiation, it typicallyemits for a duration of between 1 minutes and 5 minutes. Based on thehistorical duration pattern of the microwave radiation emissions, adetermination can be made at block 2530 or 2540, once the interferencecharacteristics indicate that the microwave is emitting radiation on theparticular channel, to not use the particular channel, and to check thechannel once a second to determine if the microwave has ceased emittingradiation, at which point a determination can be made to once again usethe particular channel.

In another example, the interference characteristics indicate a beaconfrom another wireless networking device. Based on the beacon, thewireless networking device that transmitted the beacon can be identifiedand categorized as a particular type of device. Based on thecategorization of the type of device, a determination can be made atblock 2530 or 2540 to use or not use a particular channel. For example,when the particular type of device is a device that has previously beendetermined to work well with other wireless networking devices and toshare channel bandwidth well, a determination can be made to use thesame channel that the wireless networking device that transmitted thebeacon is using. Conversely, when the particular type of device is adevice that has previously been determined to not work well with otherwireless networking devices and to not share channel bandwidth well, adetermination can be made at block 2530 or 2540 to avoid the particularchannel that the wireless networking device that transmitted the beaconis using.

In a further example, the interference characteristics indicate acertain power level of the interference on a particular channel. Basedon the indicated interference power level, a determination can be madeat block 2530 or 2540 to use or to not use a particular channel.

The above examples are not exhaustive as to how the tasks of blocks2505-2545 can be distributed, and various other distributions arepossible.

Wireless Optimization Using Artificial Intelligence and Machine Learning

The system can use artificial intelligence (AI) and machine learning(ML) technologies to model the interference on each channel. Forexample, units of the system can measure channel interference regularlyover the time of day on all radios. The interference information iscommunicated to the base unit or a cloud server for pattern analysis.The measure interference includes interference from units within thesystem as well as interference from nearby devices. The base unit or thecloud server can recognize the pattern of the interference. For example,the base unit or the cloud server can use a hidden Markov model (HMM) tomodel patterns of channel interference, channel capacity and channeloutage. FIG. 3 illustrates an example of a state machine for HMM.

The system can also use AI and ML technologies to model network traffic.The units of the system can measure the traffic that is being supportedduring the day and reports the measurement to the base unit or the cloudserver. The base unit or the cloud server can model the traffic usageusing HMM or other statistical modeling tools. The statistical model istrained to predict the traffic that is being used on each unit of thesystem and the traffic can be used to decide which unit gets priorityfor network communication. For example, statistical modeling tools canbe used to predict link overloading or excessive link delays, andnetwork topologies can be changed to avoid the predicted linkoverloading or excessive delays, thereby resulting in improved networkreliability.

The system can use different utility functions on top of channel modelsfor modeling different types of traffic and then optimize the channelaccordingly. For example, a voice application may not need lots ofbandwidth but may require a more reliable communication channel. Asuitable channel can be selected for a unit that serves a voiceapplication.

The system can also use AI and ML technologies to model client locationpattern for roaming purposes. Roaming is when a client moves fromcommunicating within the system via a first wireless networking deviceto communicating via a second wireless networking device because, e.g.,the signal strength from the first wireless networking device is tooweak. For example, the system can learn from the pattern that whenclient device's RSSI (Received Signal Strength Indicator) drops on someunit, it is likely that the client device is moving to another locationand that the client device should be roamed from one unit to anotherunit or not. Such learning can be used to avoid extra informationconnection and avoid unnecessary state transitions between units.

FIG. 4 illustrates an example of a pattern of client device location.The system recognizes a pattern that the client device STA moves from alocation 410 to a location 420 in a predictable manner. Even thoughduring the movement STA will travel through an area covered by unit 3,the system predicts that STA will move to location 420 covered by unit2. Therefore, in some embodiments, the system will not roam the clientdevice STA from unit 1 to unit 3 as the client device STA moves fromlocation 410 to location 420. Instead, the system will directly roam theclient device STA from unit 1 to unit 2.

The system can also use AI and ML technologies to learn client roamingbehavior, since different clients behave differently in terms ofroaming. Some legacy clients, such as those that do not support IEEE802.11v/11k/11r (referred to herein as 11v, or 11k, or 11r), may beroamed using disconnection and then letting the client associate on asuitable band of a suitable unit. In some embodiments, the followingrouting can be done only once every T1 time period. A de-authenticationpacket can sent to client once RSSI and other conditions are met. Theclient can be allowed to roam back on the desired unit and band. If theclient does not roam to the desired unit and band in time T2, the systemcan allow the client to roam to any unit (AP) of the system.

The timing of roaming of legacy client can be important, so that theclient does not blacklist the access point (unit of the system). Forexample, the client may blacklist a particular unit if the unit isde-authenticated too often, or in too short of a time period (e.g., inless than T1). The system can be trained by conducting testing onclients and recognizing how often a client is disconnected or how longthe client takes to re-connect. The training can be used as initialsetting. Data that is collected in the field can be used to changetimings such as T1 and T2.

The system can be trained to learn different types of client behaviors.For example, clients may respond to some type of 11k report and may notrespond to some other 11k report. A client may respond to 11k once everyT seconds. A client may roam in response to a BSS Transition Management(BTM) once every T seconds. A client may roam in response to BTM whenRSSI of serving AP (satellite unit) or host AP (base unit) is in certainrange. The system can also learn when to request BTM and how often torequest BTM.

The system can also use AI and ML technologies to optimize networktopology of the units based on usage pattern. The system can monitor thenetwork traffic and determine the network topology. For example, basedon the usage pattern, the system can determine a backhaul channel, thesatellite units directly connected to the base unit through backhaulchannel, fronthaul channel, number of clients, etc. The system can makedecisions dynamically based on the usage pattern. For example, APs(satellite units) with more traffic can get connection directly withmain AP (base unit) on cleanest channel. APs (units) with higher amountsof traffic can get better client facing channels. APs (units) withhigher amounts of traffic may push some clients to other APs (units).

Interference Management

A conventional router is a single device. In contrast, the disclosedmulti-band wireless networking system includes multiple units (APs) tocover a broader area. Each unit of the multi-band wireless networkingsystem is capable of transmitting wireless radio signals over multiplebands. Thus, the units within the system may overlap and interfere witheach other. Furthermore, other devices that not part of the system canalso interfere with the units of the system. For example, FIG. 5 showsinferences within units of the system on 2 GHz and 5 GHz. FIG. 6 showstransmit and receive overlapping between the units.

In order to manage RF (radio frequency) interference on the transmitside, the system uses an algorithm to manage power levels of the unitsof the system. In some embodiments, the management of power levels canbe built in the system management software of the units. The power levelmanagement can take into account the power levels (e.g., RSSI) betweendifferent units of the system and the power levels (e.g., RSSI) ofassociated clients.

In some embodiments, a unit can increase the power level for a limitedduration to check if any new clients can connect to the unit. The unitcan then drop to a power level that minimizes the interference. Thepower management of system can use the backhaul channel to control thepower level of the units. The system also takes into account informationsuch as client locations for power management purposes.

In order to manage RF interference on receive side, the system canadjust the physical layer receive range by adjusting physical radiogain. The system can set up digital thresholds, such as preambledetection threshold and timing and carrier recover thresholds. Thesystem can also include controllable attenuation features to attenuatethe radio power.

In some embodiments, the energy detection threshold for each radiocomponent of each unit can be managed separately. The system can alsomanage back-off count down numbers. For example, the system can modify802.11 NAV parameters to manage the back-off count down numbers. Thesystem can also optimize or adjust beamforming and MU-MIMO (multi-usermultiple-input and multiple-output) parameters. The system can alsomodify RTS/CTS (Request to Send/Clear to Send) parameters of IEEE 802.11wireless networking protocols to reduce frame collisions.

For fronthaul management, the system tries to minimize the overlapbetween different units of the system in a way that clients on thecoverage edge do not get disconnected. For example, FIG. 7 shows aclient device 710 on the coverage edge of the system units. The systemtries to minimize the overlap but the wireless coverage is still enoughto connect the client device 710.

In order to connect to a client at the edge of a coverage area, units ofthe system can drop their transmit power based on the client RSSI andother client information. A unit can drop the power till the client hasa desirable transmit rate, relative to the transmit rate of the clienthad before the power was dropped. A unit can also increase transmitpower once every X ms (milliseconds) for a period of Y ms. The unit cancheck whether any client tries to associate wireless with the unit, andcan verify whether the association was successful.

The units of the system can adjust the receive range as well. In orderto connect the client on edge, the units of the system can drop thereceive range based on client RSSI and other client information. A unitcan drops receive range till all clients have a desirable receive rate,compared to what the clients had before the receive range was dropped. Aunit can also increase receive power once every X ms (milliseconds) fora period of Y ms. The unit checks whether any clients try to associatewireless with the unit and whether the association is successful. Insome embodiments, the increasing of transmit range and the increasing ofreceive range can be conducted at the same time.

In some embodiments, the system can learn the locations of the clientsand adjust transmit or receive power levels depending on each client'slocation and receive sensitivity.

Dedicated Control Channel

In some embodiments, the system can use a dedicated or substantiallydedicated channel (e.g., outside of 2.4 GHz or 5 GHz bands) for controlinformation. For example, the units of the system might use 433 MHz or900 MHz. The system can conduct frequency hopping between differentchannels. The units can include wireless radio component to communicatevia the dedicated channel for control information. The dedicated channelwill make the network among the units of the system more robust, such aswhen WiFi channels on 2.4 GHz or 5 GHz have intermittent issues.

The dedicated control channel is used to transfer critical messages,such as bridge update (e.g., where client is associated), roamingcoordination, timing synchronization, range measurement, etc. Thededicated channel can also be used for synchronization between units forlocalization purpose.

The dedicated control channel can also be used for provisioning. Forexample, the system can use the control channel to add a new unit to thenetwork of the system without having to go through a standard processfor WiFi, which takes a longer time and is prone to interference andpacket loss. An interface can be defined on control channel whichenables the current unit (AP) on the system network to provision a newunit (AP) when the system administrator approve the addition of the newunit (AP).

If a satellite unit drops offline from the 2.4 GHz or 5 GHz WiFinetwork, units of the system can still signal each other indicating thatthe satellite unit is dropped from the WiFi network. This is feasiblebecause the control channel can have a longer range that the 2.4 GHz or5 GHz WiFi network. The units of the system can also signal each otherregarding a change of the backhaul channel through the dedicated controlchannel.

Protocol Tunneling

There are various types of protocols that can be bridged (tunneling)over the backhaul channel of the system. For example, Internet of Things(IoT) protocols are low data-rate protocols that can be bridged over thebackhaul channel. The advantage is that some of the IoT protocols havevery limited range. By carrying over the backhaul channel, devices usingIoT protocols can communicate over a range longer than the original IoTprotocols cannot handle. Likewise, Bluetooth range can be extended forvarious applications such as IoT applications or audio applications.

The system can use different channels on different units for tunnelingdifferent IoT protocols. In some embodiments, units of the system canhave both WiFi and BLE (Bluetooth low energy) capability. Depending onthe type of interfaces for the sensory devices, the units can use WiFito connect to the devices, or use BLE to connect to the devices andtunnel the BLE communication over the backhaul channel. In someembodiments, one IoT protocol can be tunneling communications of anotherIoT protocol. The tunneling can be used for synchronization, protocolcoexistence, power saving, etc.

Using the tunneling, the system can extend range for perimeter sensorssuch as window sensor, door sensor, thermal sensor, moving sensor, etc.A sensor can connect to a nearest unit of the system. The networktraffic from the sensor is tunneled to the base unit and other satelliteunits via the backhaul channel. The network traffic from the sensor canalso be relayed to a cloud.

An instruction or action for the sensor can be transmitted to the sensorthrough the tunneling using the backhaul channel. A sensor may triggeran action for a target device, e.g., triggering an alarm or turning on alight. The target device (e.g., alarm or light) may be connected toanother unit of the system. The sensor and the target device maycommunicate over a protocol such as Bluetooth, ZigBee, Zwave, etc. Theprotocol is tunneled through the WiFi backhaul channel.

In some embodiments, the system can control lights around a home usingBluetooth or other technologies. Bluetooth lighting control is becomingprominent but Bluetooth range. By tunneling the Bluetooth communicationsover the WiFi backhaul channel, the control range for the lights issignificantly extended.

In some embodiments, the system can control audio speakers over a widerange. Audio speaker using Bluetooth is popular but range is limited.The Bluetooth speaker can be paired with the units of the system. Theaudio synchronization over Bluetooth can be tunneled through the WiFibackhaul channel. The system can simultaneously control different typesof Bluetooth speakers.

Zwave is used on lot of sensors and actuators but the range is limited.The system can avoid Zwave mesh and use a long range backhaul to createa more robust Zwave network.

Topology Optimization

The units of the system (base unit(s) and satellite unit(s)) can form anetwork using different types of topology. For example, a Daisy chaincan be formed during initial boot up of a unit. The unit connects to thebase if the wireless connection to the base is better than apredetermined threshold. If connection to base is less than apredetermined threshold, the unit can look for base backhaul through awireless connection to another satellite unit. An optimal backhaul isselected using a link that maximizes a predetermined criterion. After aninitial backhaul selection is completed, a periodic optimization oftopology can be done. Further, future optimizations can be based onoptimizing different criteria.

In some embodiments, each AP (unit) in a system network will advertiseits uplink throughput (TPUT) to main AP/base unit (uplink_i). The AP(unit) also advertises other factors including its form factor info,current load on the AP, and other information. The system uses a lookuptable to map RSSI of beacon to effective TPUT. Accordingly, for eachbeacon, the system can conduct an effective TPUT mapping(TPUT_lookedup_i).

Each AP (unit) in a system network can advertise. In some embodiments,the following formula may be used to select an uplink node selectionwith the best TPUT_i:1/TPUT_i=1(1/(uplink_i*scaling_factor_1)+1/(TPUT_lookedup_i*scaling_factor1))*scalingfactor_3*function(hop_count)

The system can also consider vendor IE content, such as capability,dedicated band, hop count, steering capabilities, transmit power, devicetype, scaling factors, receive sensitivity, etc. In some embodiments,the vendor content is in layer 2. The system can also consider otherparameters that can be communicated in higher layers, such as traffictype, traffic priority, client type, client priority, etc.

In some embodiments, the system has scheduled topology optimizationafter the boot up phase. In other words, the topology can be optimizedon a regular basis. During an optimization phase (e.g., when thetopology is being optimized), information can be collected during thetime that units of the system are up and running. For example, RSSIinformation can be measured to characterize the RSSI from certain unitsof the system to other units of the system. Interference can be measuredon all units of the system. The system monitors traffic to supportedclients to see how much load needs to be supported for each unit.

The system can also perform event-driven topology optimization. Forexample, if backhaul link quality on any unit drops below somethreshold, the unit may look for a new backhaul configuration. Ifeffective TPUT to main AP (base unit) drops below some threshold, a unitof the system may look for an alternative channel to use for backhaul.The information collected over time will be used for event driventopology optimization.

The system can perform a topology optimization to turn off a unit or aradio on a unit. For example, if two units are physically close to eachother, those two units may hamper wireless coverage. For example,clients may be switched (e.g., via roaming) back and forth between thetwo units. To improve coverage in such a situation, the system can senda message to one of the units that causes the unit to turn off a radio.By causing the unit to power down the radio, the system reducesinterference and unnecessary client roaming. The unit is still connectedvia the backhaul channel and the radio that was turned off can be turnedon again at any time.

In some embodiments, some units of the system may utilize differentpower settings and receive ranges. The topology and client facing radioand backhaul coverage can interact. If a topology is selected such thata unit is located between two other units in a daisy chain, the backhaulchannel power may be adjusted or optimized so that the units that needto receive messages via the backhaul are able to, but broadcast power onthe backhaul channel may not be increased to enable backhaul receptionby other units that do not need to receive messages via the backhaul.Interference can be minimized by utilizing such a technique. Thebackhaul range may be increased periodically, such as by increasingbroadcast power, to see if additional units can connect to a unit of thesystem or if the unit can find an alternative superior topology.

In some embodiments, some units may use different channels for backhaul.In some cases, a client facing radio may be used as backhaul.Particularly, this may be done at an edge of a wireless network. Thiscan also be useful if a backhaul channel is busy, such as due toextensive traffic on part of the network. When a client facing radio isused for backhaul traffic, the backhaul channel can be reevaluatedperiodically to see if the unit can once again use the backhaul channelfor backhaul traffic.

Different topologies may be used based on traffic needs and differenttypes of units, such as desktop units, wall-plug units, mini units. etc.Different types of units can have different requirements for powerlevels. FIG. 8 shows different types of network topologies.

The system can use different algorithms (e.g., Dijkstra's algorithm) todetermine the best communication path between two units within thesystem. The system can change the weight values not only based on TPUTbut also based on interference and priorities: such asTPUT_lookedup_i*interference_weight*supported_traffic*Orbi_type*cpu. Thesystem can also use other algorithms, such as Bellman-Ford algorithm, A*algorithm, Floyd-Warshall algorithm, etc.

FIG. 24 illustrates a method for changing topology of a Wi-Fi network.At block 2405, a wireless networking device identifies a first wirelesscommunication channel to use for backhaul communications. The channel touse for backhaul can be selected based on any of various criteria. Thechannel can be selected based on inherent communication capabilities ofthe channel. For example, in the example of FIG. 1, the channel with thehighest bandwidth, such as the 80 Mhz channel between 5735 Mhz and 5818Mhz, can be selected to use for backhaul communications. The channel canbe selected based on actual communication capabilities. For example,once again referring to the example of FIG. 1, it may be that the 80 Mhzchannel between 5170 Mhz and 5250 Mhz has the highest actual bandwidth,because of, e.g., interference on the other channels, and so thatchannel is selected to use for backhaul communications. The channel canbe selected based on RSSI. For example, if a particular channel has thehighest average RSSI, has the highest minimum RSSI, etc., at the unitsof the network, that particular channel can be selected to use forbackhaul communications.

At block 2410, a wireless networking device identifies a second wirelesscommunication channel to use for fronthaul communications. The wirelessnetworking device of block 2410 can be the same wireless networkingdevice of block 2405, or can be a different wireless networking device.The channel to use for fronthaul can be selected based on any of variouscriteria. Further, more than one channel can be used for fronthaulcommunications. The channel(s) can be selected based on inherentcommunication capabilities of the channel(s). For example, in theexample of FIG. 1, the channel(s) with bandwidth lower than the backhaulchannel can be selected to use for fronthaul communications. Thechannel(s) can be selected based on actual communication capabilities.For example, once again referring to the example of FIG. 1, it may bethat the 80 Mhz channel between 5170 Mhz and 5250 Mhz has the highestactual bandwidth and is selected for backhaul communications. In such acase, another channel or channels can be selected to use for fronthaulcommunications. The channel(s) can be selected based on RSSI. Forexample, if a particular channel has the highest average RSSI, has thehighest minimum RSSI, etc., at the units of the network, that particularchannel can be selected to use for backhaul communications, and aremaining channel(s) can be selected to use for fronthaulcommunications.

At block 2415, a wireless networking device determines a network-relatedparameter. The wireless networking device of block 2410 can be the samewireless networking device of block 2405, or of block 2410, or can be adifferent wireless networking device. The network-related parameter canbe any of various network-related parameters. In an example, theparameter is a latency-related parameter, such as the latency ofcommunication between two devices, and the wireless networking devicedetermines the latency by measuring the latency of communicationsbetween the two devices. In an example, a user joins a video game wherehe is playing with other friends via an online service, such as XboxLive. He starts the video game via a gaming system, such as an Xbox 360,which connects to a first wireless networking device, which can be asatellite device, via a fronthaul channel. The first wireless networkingdevice then connects to a second wireless networking device, which canbe an access point Wi-Fi device, via a backhaul channel, where thesecond wireless networking device is able to access the Internet andsend messages to an Xbox used by another player in the online game. Thefirst wireless device, the second wireless device, as well as a Wi-Fiaccess point device, and a satellite device can each be a Wi-Fi networkcontrol device. The wireless networking device determines the latency bymeasuring the latency between the two Xbox systems (block 2415).

In some embodiments, a wireless networking device determines latencyrequirements of a gaming system (block 2415) via Deep Packet Inspection(DPI). In an example, the wireless networking device examines a headeror data of a packet sent by a gaming system. The packet includes anidentifier that identifies the type of gaming system. The wirelessnetworking device accesses a database that includes device identifiers,device version identifiers, application identifiers, application versionidentifiers, among others. The wireless networking device determines, bycorrelating the identifier obtained from the packet with an identifierin the database, the type of the gaming system. The database furtherincludes data regarding latency requirements for the gaming system, andthe wireless networking device determines the latency requirements forthe gaming system based on the latency data obtained from the database(block 2415).

In an online gaming environment, the latency of communication isimportant, as a long latency connection will suffer longer lag timesbetween when the user activates a gaming controller and when acorresponding action occurs in the video game. In such a situation, awireless networking device can change the topology of the network basedon a network-related parameter, such as the measured latency between twodevices or the latency requirement of a device (block 2420). Forexample, a wireless networking device can send a message that causes theXbox game to communicate with the first wireless networking device viathe higher bandwidth backhaul channel, or can cause the Xbox game tocommunicate directly with the first wireless communication device viathe backhaul channel. Such a change can lower the latency ofcommunication between the two Xbox systems, which can enhance the userexperience. Examples of gaming systems include Nintendo Wii, NintendoWii U, Sony PlayStation 3, Sony PlayStation 4, Microsoft Xbox 360,Microsoft Xbox One, etc. Each wireless networking device of blocks2405-2420 can each be one physical device, can each be differentphysical device, can be any of various combinations of same or differentphysical devices, etc.

In another example, the network-related parameter of block 2415 is asignal strength related parameter, such as RSSI. A first channel isinitially selected to use for backhaul communications. Periodically, awireless communication device determines the RSSI of the variouschannels at the various units and clients (block 2415). For example, thewireless communication device can communicate with any or all of theother wireless communication devices and clients and have each determineRSSI of each channel that the device/client is receiving. In thisexample, the backhaul channel is experiencing interference, so theaverage RSSI of another channel is higher than the backhaul channel. Thewireless communication device sends a message to the other devices tocause them to temporarily send backhaul communications via anotherchannel (block 2420). The wireless communication device continues itsperiodic monitoring of RSSI (block 2415), and, once the interferencesubsides and the RSSI of the backhaul channel recovers to acceptablelevels, the wireless communication device sends a message to the otherdevices to have them once again send backhaul traffic via the backhaulchannel (block 2420).

In yet another example, the network-related parameter of block 2415 is adetection of a device. A user with a smartphone returns home, and entersthe coverage area of his home Wi-Fi network. A wireless networkingdevice detects the smartphone (block 2415). Based on past history ofmovement of the smartphone, such as when the user returns home at asimilar time on a similar day of the week, the wireless networkingdevice determines that the user will likely go to a certain area of thehouse. For example, referring to FIG. 4, the wireless networking deviceanticipates that the user will travel from location 410 to location 420.Given this past history, the wireless networking device determines tohave the smartphone roam directly from unit 1 of FIG. 4 to unit 2 ofFIG. 4 (block 2420), and to bypass roaming to unit 3 of FIG. 4, eventhough the smartphone passes through the coverage area of unit 3.

In another example, the network-related parameter of block 2415 is adata-traffic-related parameter. A wireless networking device determinesthat a bandwidth need of a video device has increased (block 2415), suchas due to streaming a high definition video. The video device iscommunicating with the wireless networking device via a fronthaulchannel, and the wireless networking device determines to have the videodevice switch from the fronthaul channel to the higher bandwidthbackhaul channel for streaming the video (block 2420).

In yet another example, the network-related parameter of block 2415 is asignal strength-related parameter. A wireless networking devicedetermines that two other wireless networking devices, a first deviceand a second device, are physically close to each other based on an RSSIof a signal broadcast from the first device to the second device beingabove a certain threshold (block 245). Because the two devices arephysically close, their areas of coverage are similar. This can resultin a client device roaming between the two devices while it is in thearea covered by both devices. The devices being physically close canalso result is higher interference on the communication channels. Toavoid the interference and unnecessary roaming, the wirelesscommunication device sends a message that causes one of the devices tostop broadcasting with its radio (block 2420). The device that stoppedbroadcasting continues to monitor the backhaul channel, and can resumebroadcasting if so directed by an incoming message, after apredetermined period of time, etc.

In another example, the network-related parameter of block 2415 is adetection of a type of device. A user installs a home security system,which includes a motion activated video camera that the user installsinside of his house. The security system is programmed to send a messageto a user's smartphone to notify the user of an intruder when the motionactivated video camera activates while the security system is alarmed.Once the security system is installed and activated, the security systembegins to communicate with a wireless networking device. The wirelessnetworking device detects that the communication is from a securitysystem (block 2415), and determines, based on the device being asecurity system, that communications from the security system are highpriority. In some embodiments, the detection that the communication isfrom a security system is made via DPI. The wireless networking devicesends a message to the security system that causes the security systemto send broadcasts on multiple channels when sending a message (block2420), such as on both a backhaul channel and a fronthaul channel. Bysending a message on multiple channels, the message has a higherlikelihood of being received by the receiving device when an issueoccurs, such as interference on one of the channels. The wirelessnetworking device can also broadcast a message to the security system onmultiple channels in order to, e.g., increase the reliability ofcommunication with the security system.

In another example where the network-related parameter of block 2415 isa detection of a type of device, a wireless networking device detects anew type of device via DPI. The wireless networking device examines aheader or data of a packet sent by a gaming system. The packet includesan identifier that identifies the type of gaming system. The wirelessnetworking device accesses a database that includes device identifiers,device version identifiers, application identifiers, application versionidentifiers, among others. The wireless networking device determines, bycorrelating the identifier obtained from the packet with an identifierin the database, the type of the gaming system (block 2415). Thedatabase further includes data regarding latency requirements for thegaming system, and the wireless networking device determines the latencyrequirements for the gaming system based on the latency data obtainedfrom the database (block 2415). The wireless networking devicedetermines, based on the type of the device and the latency requirementsof the device, to send data of the gaming system via the higherbandwidth backhaul channel (block 2420).

In yet another example, the network-related parameter of block 2415 is adetection of a particular mode of a device. A user uses a particularmodel of smartphone, and the wireless networking device communicateswith the smartphone and determines, based on the communication, that thesmartphone is the particular model (block 2415). The wireless networkingdevice determines that this particular model of smartphone is a modelthat has problems roaming. To cause the smartphone to roam from a firstwireless networking device to a second wireless networking device, thewireless networking device sends a message to the first wirelessnetworking device that causes the first wireless networking device tostop broadcasting (block 2420). The smartphone, in response to the firstwireless networking device stopping broadcasting, roams to the secondnetworking device.

The wireless networking device can cause a topology of the network tochange in any of various ways. In a first example, the wirelessnetworking device sends a message to each device on the networkinstructing each device to stop transmitting at 8:00:00 pm, and to swapchannels used for backhaul and fronthaul communications at 8:00:05 pm,and to start transmitting once again at 8:00:10 pm. In a second example,the wireless networking device selects a first device and sends amessage that instructs the first device to swap channels used forbackhaul and fronthaul immediately. Once the wireless networking devicedetermines that the first device has successfully swapped channels, thewireless networking device does the same for a second device. Thewireless networking device continues this process until each of thedevices has swapped channels.

Security and Intruder Detection

Network Security is important. Nowadays almost everybody has a phonewith them when they move. The phone may be used to detect an intruder ofthe network. Particularly, intruder detection can use solution ofmonitoring WiFi and Bluetooth activities with the multiple units of thesystem. Indoor localization techniques can also be used. The system maymonitor probe request to detect presence of a new device. If a certainRSSI pattern is seen on new MAC address, the information can be used forintruder detection. Also, certain time of arrival or round trip delay ona new MAC address or AID may be used to detect intruder.

Particularly, GATT (Generic Attributes) Profile usage for intruderdetection. FIG. 9 shows the communications between GATT servers andclients. The system can use GATT MAC address and UUID (universallyunique identifier) to detect new devices. Signal strength or time ofarrival of SLAVE response may also be used.

The system may use the localization techniques available on WiFi andBluetooth for intrude detection if device is known or the system canlocalize a new unknown device. The system can use long dedicatedbackhaul to do the coordination between units as a detection mechanismfor intruders. The system can use Bluetooth packets that can be sent toa new device to detect an intruder. The system can use pre-associationWiFi for intruder detection. The system can combine all methodsavailable for pre-association of WiFi and for new Bluetooth device toprovide robust intruder detection. The system can use higher frequenciessuch as 28 GHz, 60 GHz for more accurate radar type intruder detection.

When intruder is detected the information may be communicated to theuser via, e.g., phone app, audio alarm, lighting alarm, email, textmessage, phone call, etc. Video may be recorded using in home camerawhen intruder is detected. Audio may also be recorded.

The system can recognize the pattern of movement of devices which maybelong to an intruder. Different patterns can be learned over differenttime of the day, for example between 1:00 am to 5:00 am, the pattern maybe different than 4:00 pm to 8:00 pm. The pattern can be learned overtime by seeing the RSSI of request that comes over Bluetooth or WiFi forunknown devices. The pattern can related to, e.g., RSSI, time ofarrival, phase of arrival, etc. FIG. 10 shows an example of a detectedintruder device.

The system can learn over time patterns of devices. For example, duringthe first few hours or few days, the system may be trained to MACaddress of known device at home. The system may also learn the MACaddress of neighbor device and other devices that are regularly withinthe range. After a few days the system may start sending alerts if MACaddresses of devices are suspicious.

HMM may be used to model movement of unknown clients and see if they areat location they should not be. First order HMM may be used to modelmovement in and out of house or different locations. FIG. 11 shows anexample of HMM for modeling device movement. It can be a different partof a property. Or it can be RSSI or time of arrival.

The system can use Backhaul for coordination and time measurements. FIG.12 shows an HMM model for coordination and time measurements. Forexample, given a set of RSSI variation trends, V=fv1, v2, . . . , vM anda settled HMM, the hidden location sequence L=fI1, I2, . . . , I_N canbe estimated by employing the Viterbi algorithm.

Data packets between units of the system may be used to detect anintruder device moving between the units. FIG. 13 shows intruder devicesthat are between the units of the system.

Deep Packet Inspection

The system can use Deep Packet Inspection (DPI) technology to analyzetraffic from different devices and to differentiate them according totheir payload. DPI is a form of computer network packet filtering thatexamines the data part and possibly the header of a packet as it passesan inspection point. In various embodiments, DPI searches for protocolnon-compliance, viruses, spam, intrusions, or other defined criteria todecide whether the packet may pass or if the packet needs to be routedto a different destination or via a different route, such as via abackbone, or, for the purpose of collecting statistical information thatfunctions at the Application layer of the Open Systems Interconnection(OSI) model.

A DPI AP (unit) may look at traffic from a specific IP or MAC address,pick out the HTTP traffic, then drill even further down to capturetraffic headed to and from a specific sever. FIG. 14 shows architectureof Deep Packet Inspection technology. For example, for application ofemail mail server, the system can reassemble e-mails as they are typedout by the user. DPI can feed back information on device type, length ofconnection, frequency of connection, etc. DPI can be used to detecttiming critical applications, such as computer gaming or video chat. DPIcan be used to detect the application and type of device sending data,the bandwidth or delay requirements for the application, etc. Data usedby DPI, such as information that enables DPI detection of applications,devices, etc., may be updated using cloud infrastructure. For example,as new devices or applications are released, or current devices orapplications are updated, a database containing application or deviceidentification information used by DPI can be updated with informationthat enables identification of these new or updated applications ordevices, such as device identifiers, device version identifiers,application identifiers, application version identifiers, among others.

The system can use DPI to classify IP traffic patterns and userbehavior, and to act on that information. For example, the system canuse DPI to improve network performance, to control WiFi congestion, toenhance quality of experience (QoE). The system can also use DPI to makesystem to be application-aware in scenarios such as roaming behaviorbeing adjusted based on DPI, topology selection according to DPI, WiFipriority (e.g., EDCA (Enhanced Distributed Channel Access) parameter),power saving related behaviors.

The system can use DPI for band steering and AP steering. Some devicesmay be considered static devices in the home (which are not moving). Forexample, set-top-box (STB) can be characterized as static and unlesssudden change in RSSI is made, we do not need to consider STB forroaming. Solar panel may be recognized as fixed device which does notrequire high bandwidth so it may be kept in 2.4 G and it does not needto be steered to 5 G or to another AP.

The system can use DPI for power saving. For example, sensor device maybe recognized as low power device and it may be kept on a band that getsless power. 2.4 GHz power amplifier are more energy-efficient than 5 GHzso client may be kept in 2.4 G even if it can be roamed to 5 G,especially if bandwidth requirement is relatively small. If the devicetraffic pattern change and high bandwidth traffic is initiated then theclient may be steered to 5 G where packets may be sent in a faster way.Channel may be switched if another channel appears better for a powersensitive device. FIG. 15 shows devices that have different needs forpower and data throughput.

Using DPI, the system can learn traffic over time. In other words, thetype of traffic that is conveyed over a certain device may be learnedduring the time. The traffic type (voice, video, data, etc.), the amountof traffic (Mbps), and the combination will be learned. If a device haslot of heavy traffic (file download, Linux distribution), it should beput on a band on an AP (unit) that has the highest TPUT. A device whichis primarily used for audio should be on a band which has least delayvariation and packet loss. A unit may not be roamed at middle of a VoIPcall as far as bandwidth, delay, and packet loss are at acceptablelevels.

The system can also use DPI for topology and channel selection. Forexample, the traffic load may be measured in part of network and see howmuch airtime and data bytes are sent over the air. If the mediumutilization goes more than X percentage (a threshold value), the unitsthat has high medium utilization may be given higher priority inbackhaul channel selection and front haul selection. The unit withhigher traffic may roam some clients away to other units with lesstraffic.

Roaming

The system can conduct, e.g., 11k RSSI measurement when different APs(units) are on different channels for roaming purpose. However, 11k withmultiple channel requests does not work with many clients. The systemrequests the client to conduct 11k response on current channel andconduct uplink/downlink calibration. After that, the system usescalibration to estimate downlink power based on uplink power. The systemconducts 11k on candidate AP (unit), and infers 11k measurement based onlast received packet on serving AP. The system compares the downlinkmeasurement on other AP with estimated downlink power on current AP.Then the system makes decision to do roaming or not.

The system can conduct uplink/downlink calibration using 11k. Whenclient supports 11k, the system performs the 11k measurement to see whatthe difference in power is. Later the system can use the information anddoes not need to ask for 11k measurement on serving AP if other APs areon other channels. The system asks for measurement report on currentchannel, receives the 11k report. The system compares the downlink powermentioned in 11k report to the RSSI of 11k report packet and comes upwith a delta measurement. Several measurements may be done so the powerdifference can be averaged over multiple measurements so that themeasurement is more accurate. The system can help rate control.

The system can in a monitor mode for legacy client with APs on samechannel. With the monitor mode, other APs can go to sniffing mode todetect clients. A limited number of clients can be sniffed. If anotherAP is better by some margin, roaming can be triggered. Once another APis deemed better, the system can use different roaming mechanism toconduct the roaming. APs are calibrated so that RSSI measurement is moreaccurate than client.

The system can monitor client selection. Legacy clients with RSSIsmaller than X can be monitor mode candidate. Clients with which 11krequest fails can be candidate for roaming. Clients with which 11kmeasurements are not accurate can be used. When 11k measurement has adelay that is larger than a desired level, the client may be candidatefor monitor mode. Monitor mode can be used to calibrate transmit andreceive power difference. FIG. 16 shows that monitor mode can betriggered in middle mode.

The system monitor mode can use fast channel switch. AP needs to hop toanother channel to make a measurement. Coordination needs to be done forAP so it can hop to the other channel and hop back. AP needs to makesure when it jumps to other channel, the current client does not treatthe AP as disconnected.

The monitor mode can be on different channels. Channel switchcoordination can be done over backhaul. The system asks the non-servingAP to come to channel of serving AP, and does a measurement and thengoes back to current channel and sends measurement data back to servingAP over backhaul. The AP will send a control packet on its channelindicating it is offline for a time period. In this case the uplink RSSIis measured and compared between different AP on different channel.

Indoor Object Tracking

Indoor positioning is one of the challenging problems. For areas wherethere is a line-of-sight (LOS) to satellites, the GNSS (GlobalNavigation Satellite System) provides a good estimate (within a fewmeters) of a mobile user (MU) location. Signals coming from satellitescannot be currently used in most indoor environments due to the factthat they are not strong enough to penetrate most materials.Infrastructures which offer strong signals indoor should be used forindoor localization or tracking such as 802.11, BLE, Bluetooth.

Applications for indoor localization/tracking includes, pet tracking,asset tracking (e.g. phone tracking, shopping mall asset tracking,etc.), indoor navigation, asset tracking and troubleshooting, gettinglocations of units that have issues, getting locations of WiFi devicethat have issues, getting locations of Bluetooth devices that haveissues, retail analytics, tracking people movement by tracking theircell phones, measuring how long people stay in some locations, elderlocation, valuables tracking, burglar detection, etc.

The system can use the localization techniques available on WiFi andBluetooth. The system can use backhaul to do the coordination betweenunits that is required to come up with accurate location. The system canuse Bluetooth on several units as opposed to only main unit which helpslocating a low range Bluetooth device. The system can use Bluetoothtriangulation, WiFi triangulation, or a combination thereof. The systemcan use GPS from phone APP to help when possible. 60 GHz may also beused for better accuracy.

The system can use various types of measurement for tracking purposes,such as Time of Arrival (TOA), Time Difference of Arrival (TDOA), Angleof Arrival (AOA), and Received Signal Strength (RSS). Instead of TOA,round-trip time (RTT) may be used to avoid synchronization need. LOS maynot be available, the system can use a linear regression with meansquare error as the model which best relates the statistical estimatorof the RTT to the actual distance between two wireless units in LOS orNLOS. The statistical estimator that best fits that model is found withthe aim of improving the accuracy achieved in distance estimates.Moreover, hybrid location techniques as TDOA and AOA, TOA and RSS or DOAand RSS can be exploited to improve the accuracy. FIG. 17 shows time ofarrival and amplitude measurements for tracking. FIG. 18 shows atriangulation concept using WiFi or BLE.

The system can also use Bluetooth for proximity estimation. For example,if a low power Bluetooth device is intended to be tracked, the systemcan identify a unit closest to the Bluetooth device if it is reachablefrom only one of the devices. Bluetooth GATT profile may be used forproximity detection. Propagation time of electromagnetic waves may beused on Bluetooth to do the relative location measurement to a unit ofthe system if Bluetooth can be heard from multiple devices. Relativeposition of units of the system in the house and the house plot may beentered by the user and then the positions are shown on top of the houseplot to the user. The position can be shown on a web page or phone app.FIG. 19 shows client within ranges of multiple Bluetooth while units ofthe system only communicate over WiFi.

The system can conduct Bluetooth localization using time of arrival.FIG. 20 shows a Bluetooth localization using time of arrival.Synchronization between base station and satellite units may beperformed in order to measure relative delay. Dedicated hardware forphase measurement can be installed on Bluetooth device or on units ofthe system.

The system can use backhaul for coordination and time measurement. Inother words, the management of time synchronization of Bluetooth may beperformed over backhaul. The amplitude may also be used for measurement.All information will be communicate to one or more of the units andrelative location will be calculated and communicate to the user.

The system can also use WiFi localization. A trigger frame may be sentfrom AP to client. Client may measure relative delay from all APs. Atrigger frame may be sent from AP to client and client may send anotherframe back to AP to calculate RTT. Trigger frame may be sent from clientto AP as well. Relative delay or RTT can be measured from client side aswell.

FIG. 21 shows that location of one unit of the system can be detectedfrom known locations of other units of the system.

The system can use a device to locate itself. The management of timesynchronization of Bluetooth may be performed over backhaul. The dataaggregation may be done on base unit. Communication can be done on aunit of the system or a cloud server which the unit is communicatingwith. FIG. 22 shows a device is used for locating itself.

An AP (unit) or a cloud server can initiate the estimation. For example,an AP may trigger the location detection. The AP may send trigger framesto client or it may ask client to send trigger to AP. Alternatively, thecloud server may be used to initiate the location estimation. A phoneapp may be used to initiate the location estimation using Bluetooth orusing cloud connection.

The system can use different protocols for localization/tracking. Thereare various protocols for request sent by an AP to a client to conduct aset of timing measurements with other access points. For example,802.11k may be used standardized RSSI measurements if RSSI is used forlocalization. 802.11u may be used addresses requirement for locationawareness for E911. 802.11v provides formats for sendingRSSI+geolocation (from GPS/aGPS) around the network.

Fine Timing Measurement (FTM) protocol under IEEE 802.11 may also beused. For example, client can request an AP to share its location (e.g.in latitude/longitude or as a civic address). AP can share informationabout their “height,” e.g. floor number or “height above floor” withclient devices. AP can share a set of AP locations in the form of a“neighbor report,” which can significantly enhance the efficiency of thedata exchange. AP can send a request to a client to conduct a set oftiming measurements with other access points. AP can send a request toask a client to report its location. A client can send a request to askan AP to share a URI or Domain Name where additional assistance or mapsand mapping data can be obtained. A client and an AP can negotiate toschedule timing measurements at pre-arranged times and use timingmeasure to location estimation. Those measurements can be combined withGPS locations. FIG. 23 shows that locations can be tracked based oninitial GPS locations.

In some other embodiments, the system can also track locations based onIP addresses or known SSID (Service Set Identifier).

FIG. 26 is a high-level block diagram illustrating an example of aprocessing system in which at least some operations described herein canbe implemented, consistent with various embodiments. The processingsystem can be processing device 2600, which represents a system that canrun any of the methods/algorithms described above. For example,processing device 2600 can be any of devices STA 410, STA 420, STA 710,or wireless networking device 2700, among others. A system may includetwo or more processing devices such as represented in FIG. 26, which maybe coupled to each other via a network or multiple networks. A networkcan be referred to as a communication network.

In the illustrated embodiment, the processing device 2600 includes oneor more processors 2602, memory 2604, a communication device 2606, andone or more input/output (I/O) devices 2608, all coupled to each otherthrough an interconnect 2610. The interconnect 2610 may be or includeone or more conductive traces, buses, point-to-point connections,controllers, adapters and/or other conventional connection devices. Eachof the processors 2602 may be or include, for example, one or moregeneral-purpose programmable microprocessors or microprocessor cores,microcontrollers, application specific integrated circuits (ASICs),programmable gate arrays, or the like, or a combination of such devices.The processor(s) 2602 control the overall operation of the processingdevice 2600. Memory 2604 may be or include one or more physical storagedevices, which may be in the form of random access memory (RAM),read-only memory (ROM) (which may be erasable and programmable), flashmemory, miniature hard disk drive, or other suitable type of storagedevice, or a combination of such devices. Memory 2604 may store data andinstructions that configure the processor(s) 2602 to execute operationsin accordance with the techniques described above. The communicationdevice 2606 may be or include, for example, an Ethernet adapter, cablemodem, Wi-Fi adapter, cellular transceiver, Bluetooth transceiver, orthe like, or a combination thereof. Depending on the specific nature andpurpose of the processing device 2600, the I/O devices 2608 can includedevices such as a display (which may be a touch screen display), audiospeaker, keyboard, mouse or other pointing device, microphone, camera,etc.

While processes or blocks are presented in a given order, alternativeembodiments may perform routines having steps, or employ systems havingblocks, in a different order, and some processes or blocks may bedeleted, moved, added, subdivided, combined, and/or modified to providealternative or sub-combinations, or may be replicated (e.g., performedmultiple times). Each of these processes or blocks may be implemented ina variety of different ways. In addition, while processes or blocks areat times shown as being performed in series, these processes or blocksmay instead be performed in parallel, or may be performed at differenttimes. When a process or step is “based on” a value or a computation,the process or step should be interpreted as based at least on thatvalue or that computation.

Software or firmware to implement the techniques introduced here may bestored on a machine-readable storage medium and may be executed by oneor more general-purpose or special-purpose programmable microprocessors.A “machine-readable medium”, as the term is used herein, includes anymechanism that can store information in a form accessible by a machine(a machine may be, for example, a computer, network device, cellularphone, personal digital assistant (PDA), manufacturing tool, any devicewith one or more processors, etc.). For example, a machine-accessiblemedium includes recordable/non-recordable media (e.g., read-only memory(ROM); random access memory (RAM); magnetic disk storage media; opticalstorage media; flash memory devices; etc.), etc.

Note that any and all of the embodiments described above can be combinedwith each other, except to the extent that it may be stated otherwiseabove or to the extent that any such embodiments might be mutuallyexclusive in function and/or structure.

Although the present invention has been described with reference tospecific exemplary embodiments, it will be recognized that the inventionis not limited to the embodiments described, but can be practiced withmodification and alteration within the spirit and scope of the appendedclaims. Accordingly, the specification and drawings are to be regardedin an illustrative sense rather than a restrictive sense.

Physical and functional components (e.g., devices, engines, modules, anddata repositories, etc.) associated with processing device 2600, any ofSTA 410, STA 420, STA 710, wireless networking device 2700, etc., can beimplemented as circuitry, firmware, software, other executableinstructions, or any combination thereof. For example, the functionalcomponents can be implemented in the form of special-purpose circuitry,in the form of one or more appropriately programmed processors, a singleboard chip, a field programmable gate array, a general-purpose computingdevice configured by executable instructions, a virtual machineconfigured by executable instructions, a cloud computing environmentconfigured by executable instructions, or any combination thereof. Forexample, the functional components described can be implemented asinstructions on a tangible storage memory capable of being executed by aprocessor or other integrated circuit chip. The tangible storage memorycan be computer readable data storage. The tangible storage memory maybe volatile or non-volatile memory. In some embodiments, the volatilememory may be considered “non-transitory” in the sense that it is not atransitory signal. Memory space and storages described in the figurescan be implemented with the tangible storage memory as well, includingvolatile or non-volatile memory.

Each of the functional components may operate individually andindependently of other functional components. Some or all of thefunctional components may be executed on the same host device or onseparate devices. The separate devices can be coupled through one ormore communication channels (e.g., wireless or wired channel) tocoordinate their operations. Some or all of the functional componentsmay be combined as one component. A single functional component may bedivided into sub-components, each sub-component performing separatemethod step or method steps of the single component.

In some embodiments, at least some of the functional components shareaccess to a memory space. For example, one functional component mayaccess data accessed by or transformed by another functional component.The functional components may be considered “coupled” to one another ifthey share a physical connection or a virtual connection, directly orindirectly, allowing data accessed or modified by one functionalcomponent to be accessed in another functional component. In someembodiments, at least some of the functional components can be upgradedor modified remotely (e.g., by reconfiguring executable instructionsthat implements a portion of the functional components). Other arrays,systems and devices described above may include additional, fewer, ordifferent functional components for various applications.

FIG. 27 is a system block diagram of an wireless networking device 2700according to various embodiments. Wireless networking device 2700, whichcan be an access point, a router, a satellite device, etc., can furtherbe processing device 2600 of FIG. 26. Wireless networking device 2700transmits a wireless signal 2702 which clients use to connect to thewireless networking device 2700 and there through, to connect to otherwireless networking devices or to the Internet. Wireless networkingdevice 2700 is processor based, and therefore includes a processor 2704,which can be the same as processor 2602. Further included are at leastone antenna 2706 transmitting and receiving wireless communications. Insome embodiments, wireless networking device 2700 includes networkinterface 2708 for communicating with a wired network, such as a wirednetwork with access to the Internet. Network interface 2708 and antenna2706 can be part of communication device 2606.

Wireless networking device 2700 additionally communicates withneighboring wireless networking devices, such as via a backhaul channel.Each wireless networking device may be constructed similarly and mayhave an organized topology based on the local environment.

Wireless networking device 2700 includes additional modules: a networkmonitor 2710, and a topology module 2712, among others. Network monitor2710 is a module designed to determine a network-related parameter, suchas by collecting data from a client device or other wireless networkingdevice. Topology module 2712 is a module designed to change a topologyof a network, such as by changing a connection of a particular wirelessdevice.

Aspects of the disclosed embodiments may be described in terms ofalgorithms and symbolic representations of operations on data bitsstored in memory. These algorithmic descriptions and symbolicrepresentations generally include a sequence of operations leading to adesired result. The operations require physical manipulations ofphysical quantities. Usually, though not necessarily, these quantitiestake the form of electric or magnetic signals that are capable of beingstored, transferred, combined, compared, and otherwise manipulated.Customarily, and for convenience, these signals are referred to as bits,values, elements, symbols, characters, terms, numbers, or the like.These and similar terms are associated with physical quantities and aremerely convenient labels applied to these quantities.

While embodiments have been described in the context of fullyfunctioning computers, those skilled in the art will appreciate that thevarious embodiments are capable of being distributed as a programproduct in a variety of forms and that the disclosure applies equally,regardless of the particular type of machine or computer-readable mediaused to actually effect the embodiments.

The invention claimed is:
 1. A method for utilizing a backhaul channel to control channel usage for a plurality of communication channels of a Wi-Fi network, the method comprising: identifying, by an access point (AP) Wi-Fi device, the backhaul channel to use as a primary channel for communication between the AP Wi-Fi device and a satellite Wi-Fi device based on a determination that the backhaul channel is configured for higher bandwidth communication than a first communication channel of the plurality of communication channels, wherein the AP Wi-Fi device is a router device that is configured to forward data packets between communication networks, that is configured to connect to a wired network, and that is configured to connect with other Wi-Fi devices via the plurality of communication channels, identifying, by the AP Wi-Fi device, the first communication channel as a primary channel for communication between a client Wi-Fi device and any of the AP Wi-Fi device or the satellite Wi-Fi device; determining, by the AP Wi-Fi device, first interference characteristics of each channel of the plurality of communication channels, and, by the satellite Wi-Fi device, second interference characteristics of each channel of the plurality of communication channels; sending, via the backhaul channel, by the satellite Wi-Fi device, to the AP Wi-Fi device, the second interference characteristics; determining, by the AP Wi-Fi device, to use a second communication channel of the plurality of communication channels for communication from the AP Wi-Fi device to the client Wi-Fi device based on the first and the second interference characteristics; and sending a message, from the AP Wi-Fi device, to the client Wi-Fi device, that causes the client Wi-Fi device to switch from the first communication channel to the second communication channel to facilitate communication between the AP Wi-Fi device and the client Wi-Fi device.
 2. The method of claim 1, wherein the satellite Wi-Fi device is configured to relay data between the AP Wi-Fi device and the client Wi-Fi device via any of the plurality of communication channels, wherein the plurality of communication channels include a fast communication channel and a slow communication channel, wherein the backhaul channel is the fast communication channel, wherein the fast communication channel has higher bandwidth communication capabilities than the slow communication channel, and wherein the router device is a layer 2 bridge device or a layer 3 gateway device.
 3. The method of claim 1, further comprising: categorizing a type of interference detected on the second communication channel, wherein the determination to use the second communication channel is based on the categorization of the type of interference.
 4. The method of claim 3, wherein the type of interference is electromagnetic interference generated by one of a baby monitor, a cordless phone, a Bluetooth device, a car alarm, a microwave oven, a video device, or a ZigBee device.
 5. The method of claim 3, wherein the categorization of the type of interference detected indicates that the interference detected will continue for longer than a predetermined amount of time, and wherein the determination to use the second communication channel is based in the indication that the interference detected will continue for longer than the predetermined amount of time.
 6. The method of claim 1, wherein determining to use the second communication channel includes: sending, by the AP Wi-Fi device, to a cloud-based server, data that indicates the first and the second interference characteristics; and receiving, from the cloud-based server, by the AP Wi-Fi device, selection data that indicates that the cloud-based server made a determination, based on an analysis of the first and the second interference characteristics, that the AP Wi-Fi device should use the second communication channel, wherein the determining, by the AP Wi-Fi device, to use the second communication channel is based on the selection data; wherein the selection data was generated after the cloud-based server detected a certain type of interference based on the first or the second interference, and after the cloud-based server categorized the certain type of interference, and wherein the selection data indicates that the cloud-based server made the determination by indicating that the cloud-based server categorized the interference in a particular category.
 7. A method comprising: identifying, by an access point (AP) Wi-Fi device or a satellite Wi-Fi device, a backhaul channel to use as a primary channel for communication between the AP Wi-Fi device and the satellite Wi-Fi device based on a determination that the backhaul channel is configured for higher bandwidth communication than a first communication channel of a plurality of communication channels; identifying, by the AP Wi-Fi device or the satellite Wi-Fi device, the first communication channel as a primary channel for communication between a client Wi-Fi device and any of the AP Wi-Fi device or the satellite Wi-Fi device; determining, by the AP Wi-Fi device, first interference characteristics of a subset of the plurality of communication channels; determining, by the satellite Wi-Fi device, second interference characteristics of the subset of the plurality of communication channels; determining, by a first device of the AP Wi-Fi device or the satellite Wi-Fi device, to use a second communication channel of the plurality of communication channels for communication between the first device and the client Wi-Fi device based on data received via the backhaul channel that indicates the first or the second interference characteristics; and sending a message, by the first device, to the client Wi-Fi device, that causes the client Wi-Fi device to switch from the first communication channel to the second communication channel to facilitate communication with the first device.
 8. The method of claim 7, further comprising: sending a message, by the AP Wi-Fi device, to the satellite Wi-Fi device, via the backhaul channel, that includes data that indicates a coordination of usage, by the AP Wi-Fi device and the satellite Wi-Fi device, of the plurality of communication channels.
 9. The method of claim 7, further comprising: when the first device is the AP Wi-Fi device, sending, by the AP Wi-Fi device, to a cloud-based server, the data that indicates the first and the second interference characteristics; and receiving, from the cloud-based server, by the AP Wi-Fi device, selection data that indicates that the cloud-based server made a determination, based on an analysis of the first and the second interference characteristics, that the first device should use the second communication channel, wherein the determining, by the first device, to use the second communication channel is based on the selection data.
 10. The method of claim 9, further comprising: receiving, from the cloud-based server, data that indicates a coordination of usage, by the AP Wi-Fi device and the satellite Wi-Fi device, of the plurality of communication channels, wherein the selection data is the data that indicates the coordination of usage.
 11. The method of claim 9, wherein the selection data was generated after the cloud-based server detected a certain type of interference based on the first or the second interference, and after the cloud-based server categorized the certain type of interference, and wherein the selection data indicates that the cloud-based server made the determination by indicating that the cloud-based server categorized the interference in a particular category.
 12. The method of claim 9, wherein the cloud-based server collected the data that indicates the first and the second interference characteristics over a predetermined period of time to create historical interference characteristics, and wherein the determination that the first device should use the second communication channel is based on an analysis of the historical interference characteristics.
 13. The method of claim 7, wherein the subset of the plurality of communication channels is all of the plurality of communication channels.
 14. The method of claim 7, wherein the first device is the AP Wi-Fi device, the method further comprising: receiving, by the AP Wi-Fi device, from the satellite Wi-Fi device, data that indicates that the second communication channel has less interference than other communication channels, wherein the determining, by the first device, to use the second communication channel is based on the data from the satellite Wi-Fi device.
 15. The method of claim 7, wherein the AP Wi-Fi device is a router device that is configured to forward data packets between communication networks, that is configured to connect to a wired network, and that is configured to communicate with other Wi-Fi devices via the plurality of communication channels, wherein the satellite Wi-Fi device is configured to relay data between the AP Wi-Fi device and the client Wi-Fi device via any of the plurality of communication channels, wherein the plurality of communication channels include a fast communication channel and a slow communication channel, and wherein the backhaul channel is the fast communication channel, and wherein the fast communication channel has higher bandwidth communication capabilities than the slow communication channel.
 16. The method of claim 15, wherein the fast communication channel is a 5 Ghz channel, and wherein the slow communication channel is a 2.4 Ghz channel.
 17. The method of claim 15, wherein the fast communication channel is a 60 GHz channel or a millimeter wave channel, and wherein the slow communication channel is a 5Ghz channel or a 2.4 Ghz channel.
 18. The method of claim 15, wherein the data received via the backhaul channel indicates that the fast communication channel has more interference than the slow communication channel, wherein the second communication channel is the slow communication channel, and wherein the determination to use the second communication channel is based on the data that indicates that the fast communication channel has more interference than the slow communication channel.
 19. The method of claim 7, wherein the backhaul channel is a faster communication channel, wherein the second communication channel is a slower communication channel, and wherein the faster communication channel has higher bandwidth communication capabilities that the slower communication channel.
 20. An Access Point (AP) Wi-Fi device comprising: a processor; a wireless interface coupled to the processor; and a memory coupled to the processor and storing instructions which, when executed by the processor, cause the AP Wi-Fi device to perform operations including: identifying a backhaul channel to use as a primary channel for communication between the AP Wi-Fi device and a satellite Wi-Fi device based on a determination that the backhaul channel is configured for higher bandwidth communication than a first communication channel of a plurality of communication channels; identifying the first communication channel as a primary channel for communication between a client Wi-Fi device and the AP Wi-Fi device; determining interference characteristics of a subset of the plurality of communication channels; receiving, via the wireless interface, from the satellite Wi-Fi device, data transmitted via the backhaul channel that indicates interference characteristics of the subset of the plurality of communication channels; determining to use a second communication channel of the plurality of communication channels for communication between the AP Wi-Fi device and the client Wi-Fi device based on the data received over the backhaul channel, and based on the determined interference characteristics of the subset of the plurality of communication channels; and sending a message, via the wireless interface, to the client Wi-Fi device, that causes the client Wi-Fi device to switch from the first communication channel to the second communication channel to facilitate communication with the AP Wi-Fi device.
 21. The AP Wi-Fi device of claim 20, wherein the operations further include: sending the interference characteristics to a cloud-based server to enable the cloud-based server to make a determination as to which channel to use for communication between the AP Wi-Fi device and the client Wi-Fi device, wherein the determination to use the second communication channel is based on the determination as to which channel to use for communication between the AP Wi-Fi device and the client Wi-Fi device.
 22. The AP Wi-Fi device of claim 20, wherein the operations further include: categorizing a type of interference detected on the second communication channel, wherein the determination to use the second communication channel is based on the categorization of the type of interference. 