Methods and apparatus for providing high speed connectivity to a hotel environment

ABSTRACT

Methods and apparatus are described for providing access to a network via a first one of a plurality of network access nodes in the network. The network access nodes each have a network address associated therewith which is unique on the network, the first network access node having a first network address associated therewith. The first network address is associated with a first computer while the first computer is connected to the first network access node thereby providing access to the network.

RELATED APPLICATION DATA

The present application claims priority from U.S. patent applicationSer. No. 09/256,719 filed Feb. 24, 1999 (Attorney Docket No. STSNP001),the entire disclosure of which is incorporated herein by reference forall purposes.

BACKGROUND OF THE INVENTION

The present invention relates to network communications and, morespecifically, to providing high speed Internet access to users in hotelenvironments.

Any business traveler who relies on network communications to maintaincontact with clients and the home office appreciates the availability offast and reliable data ports at remote locations such as airport loungesand hotel rooms. The hospitality industry has only recently begun tounderstand the necessity of providing such high speed data connectionsto business travelers. In fact, given the explosive growth of networktechnologies and the corresponding dependence of the businessprofessional on such technologies, hotels which do not move to providehigh speed connectivity in guest rooms comparable to the typical officeenvironment will likely lose a substantial portion of their business tohotels which do.

Unfortunately, many hotel rooms are not currently wired to accommodatehigh speed data traffic. That is, prior to 1990, virtually all hotelrooms were wired to provide only basic telephone service. As late as1995, less than 10% of hotel rooms were wired to handle standardEthernet data speeds. Even today, while the major players in thehospitality industry are searching for high speed connectivitysolutions, the vast majority of hotel guest and conference rooms arestill wired with low quality, single pair connections. One obvioussolution would be to completely rewire all of the guest and conferencerooms in each hotel facility to provide the desired data transmissioncapabilities. However, given the prohibitive cost of such anundertaking, a less costly solution would be desirable.

Even if such a costly rewiring were undertaken, there are other problemswhich are not addressed by an infrastructure upgrade. For example, evenif a high speed connection to the hotel's host is provided, it willoften be the case that a guest's laptop computer would be incompatiblewith the hotel network in some way. Thus, each guest's laptop must beconfigured appropriately in order to communicate with the network andwith the Internet beyond. This would likely involve loading specialsoftware onto a guest's laptop each time the guest wants to go online.Not only would such a process be cumbersome and annoying to the hotelguest, it may also be unacceptable from the guest's point of view inthat reconfiguring the laptop may interfere with the currentconfiguration in undesirable ways.

Neither does a costly wiring upgrade address the administrative andsecurity issues related to providing Internet access via a hotel host.That is, high speed Internet access for hotel guests requires a networkat the hotel property and some sort of connection between the hotelnetwork and the Internet, e.g., a T1 or T3 line. A firewall at eachhotel property would also be required to protect the internal networkfrom unauthorized access. The existence of the firewall at eachproperty, in turn, requires that most of the control and administrationof the local network be performed at the hotel property rather thanremotely, thus representing an undesirable redundancy of administrativefunctions.

Another administrative difficulty related to maintaining each hotelproperty as a separate Internet host involves the management of IPaddresses. Ranges of globally unique 32-bit IP addresses are issued toorganizations by a central Internet authority. These addresses areorganized in a four octet format. Class A IP addresses are issued tovery large organizations and employ the first of the four octets toidentify the organization's network and the other three to identifyindividual hosts on that network. Thus, a class A address pool containsnearly 17 million (2²⁴) globally unique IP addresses. With class Baddresses, the first two octets are used to identify the network and thelast two to identify the individual hosts resulting in 64,000 (2¹⁶)globally unique IP addresses for each organization. Finally, with classC addresses, the first three octets are used to identify the network andthe last octet to identify the individual hosts resulting in only 256(2⁸) globally unique IP addresses for each organization.

Unfortunately for many medium to large size organizations (1,000 to10,000 hosts), it has become very difficult, if not impossible, toobtain anything other than a class C address for their networks due tothe fact that the class A and B address spaces have been almost entirelylocked up. This problem has been addressed to some extent by the use ofa Network Address Translation (NAT) protocol. According to such aprotocol, when a local host on an organization's network requests accessto the Internet, it is assigned a temporary IP address from the pool ofglobally unique IP addresses available to the organization. The localhost is identified by the globally unique address only when sending orreceiving packets on the Internet. As soon as the local host disconnectsfrom the Internet, the address is returned to the pool for use by any ofthe other hosts on the network. For additional details on theimplementation of such a protocol please refer to K. Evegang and P.Francis, The IP Network Address Translator (NAT), Request for Comments“RFC” 1631, Cray Communications, NTT, May 1994, the entirety of which isincorporated herein by reference for all purposes.

Such dynamic assignment of IP addresses might be sufficient for certainorganizations as long as the number of simultaneous users which requireaccess to the Internet remains below the maximum of 256. However, if,for example, a 1200 room hotel were hosting an Internet technologiesseminar it would be extremely likely that the demand for Internet accesswould exceed the available address pool. All of this also assumes that amajor hotel chain would be able to obtain a complete class C pool ofaddresses for each of its properties; not necessarily a reasonableassumption.

It is therefore desirable to provide methods and apparatus by which eachof the properties in a major hotel chain may provide high speed Internetaccess to each of its guest rooms in a secure, inexpensive, and reliablemanner without undue administrative burdens on the individualproperties.

SUMMARY OF THE INVENTION

According to the present invention, methods and apparatus are providedwhich make use of existing hotel wiring infrastructures to providesecure, high speed data and Internet access to each of the guest roomsin a hotel property. Specific implementations of the technologydescribed herein have the ability to auto-baud down to whatever speedthe wiring infrastructure will allow thus providing the maximumbandwidth allowable by that infrastructure. According to specificembodiments, the present invention is able to select the maximum baudrate appropriate for each individual guest room. According to otherspecific embodiments, where the wiring to the guest rooms is a singlepair phone line, the present invention allows 1 Megabit half duplex datatransmissions to coexist on the single pair with standard telephonesignals.

According to one embodiment of the invention, each guest room in thehotel is interconnected via the hotel's current wiring infrastructureinto a local network. When a guest wishes to access the Internet, heconnects his laptop to an in-room module installed in each guest roomwhich temporarily assigns a “fake” local IP address to the guest'slaptop. The “fake” local IP address is associated with the in-roommodule and is unique on the hotel's local network. The address is “fake”in that it is not a valid Internet address and in that it replaces thelaptop's own real IP address. The assigned local IP address uniquelyidentifies the guest's laptop on the hotel network while that laptopremains connected to the in-room module.

A headend module in the hotel handles packet routing and provides accessto the Internet. In facilitating access to the Internet, the headendmodule temporarily assigns globally unique IP addresses from a pool of,for example, class C addresses to in-room modules in individual guestrooms in response to requests for Internet access from those rooms. Anassigned IP address remains dedicated to a particular in-room module(and thus the associated guest's computer) for the duration of theInternet transaction. Upon termination of the transaction, the globallyunique IP address is disassociated from the in-room module and put backinto the pool for use in facilitating a later Internet transaction fromany of the hotel's rooms.

According to another embodiment of the invention, the local networks ofa number of hotels are interconnected via a remote server therebyforming a private wide area network, or a virtual private network. Theoperation of the virtual private network to provide high speed data andInternet access to individual guest rooms is similar to the processdescribed above except that the “fake” IP address of the in-room modulesare unique over the entire virtual private network, and the temporaryassignment of globally unique IP addresses is performed by the remoteserver rather than the hotel headend. This is advantageous in that it iscontemplated that the remote server has a larger pool of such addressesassociated therewith than an individual hotel network might be able toprocure (e.g., a class B address pool).

Thus, because the IP address needs of all of the hotels in the virtualprivate network are spread out over the entire installed base of theremote server, bursts of need at any one property which exceed thecapacity of a single class C address pool may be accommodated. Thevirtual private network embodiment of the present invention also has theadvantage that firewall security and other network administrativefunctions may be centralized and performed remotely without compromisingthe security of any individual hotel network.

Thus, according to the present invention, methods and apparatus areprovided for providing access to a network via a first one of aplurality of network access nodes in the network. The network accessnodes each have a network address associated therewith which is uniqueon the network, the first network access node having a first networkaddress associated therewith. The first network address is associatedwith a first computer while the first computer is connected to the firstnetwork access node thereby providing access to the network.

According to a more specific embodiment, Internet access is provided toa first computer via a first one of a plurality of network access nodesin a network using a plurality of globally unique IP addresses. Thenetwork access nodes each have a network address associated therewithwhich is unique on the network, the first network access node having afirst network address associated therewith. The first network address isassociated with the first computer while the first computer is connectedto the first network access node thereby providing access to thenetwork. A first one of the globally unique IP addresses is associatedwith the first network address for conducting an Internet transaction.The first globally unique IP address is disassociated from the firstnetwork address upon termination of the Internet transaction. The firstglobally unique IP address is then available for association with any ofthe network addresses. According to one embodiment, the networkcomprises a local area network and the associating and disassociating ofthe globally unique IP address is done by a headend associated with thelocal area network. According to another embodiment, the networkcomprises a wide area network and the associating and disassociating ofthe globally unique IP address is done by a remote server which controlsthe wide area network.

According to a specific embodiment, a network is provided having aplurality of network access nodes each having a network addressassociated therewith which is unique on the network. Each network accessnode is for providing access to the network for a computer connected tothe network access node. A headend module interconnects the networkaccess nodes. The network address associated with each network accessnode is associated with the computer connected thereto thereby providingaccess to the network.

According to another specific embodiment, a wide area network isprovided having a plurality of networks each comprising a plurality ofnetwork access nodes. Each network access node has a network addressassociated therewith which is unique among the plurality of networks.Each network access node provides access to the wide area network for acomputer connected to the network access node. A remote serverinterconnects the plurality of networks into the wide area network. Thenetwork address associated with each network access node is associatedwith the computer connected thereto thereby providing access to the widearea network.

According to yet another specific embodiment, a network access node isprovided for providing access to a network of which the network accessnode is a part. The network access node has a network address associatedtherewith which is unique on the network. According to a more specificembodiment, the network address node is operable to associate thenetwork address with a computer while the computer is connected to thenetwork access node thereby providing access to the network.

According to a further specific embodiment, a headend module is providedfor interconnecting a plurality of network access nodes in a network.Each network access node has a network address associated therewithwhich is unique on the network and provides access to the network for acomputer connected to the network access node. According to a morespecific embodiment, the headend module associates the network addressassociated with each network access node with the computer connectedthereto thereby providing access to the network.

According to another specific embodiment, methods and apparatus areprovided for providing conference services over a network having aplurality of users associated therewith. A group identification tag isassociated with selected ones of the plurality of users therebyidentifying the selected users as attendees of the conference. Theconference services are provided on the network. Access to theconference services is then restricted to the selected users using thegroup identification tag.

A further understanding of the nature and advantages of the presentinvention may be realized by reference to the remaining portions of thespecification and the drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram illustrating the provision of high speed dataand Internet access to guest rooms in a hotel according to a specificembodiment of the invention;

FIG. 2 is a flowchart illustrating a method for providing high speeddata and Internet access to guest rooms in a hotel according to aspecific embodiment of the invention;

FIGS. 3 a and 3 b are more detailed block diagrams of the in-room moduleand head-end module of FIG. 1;

FIG. 4 is a block diagram illustrating the combination of half duplexdata and standard telephone data on a single pair of conductorsaccording to a specific embodiment of the invention;

FIG. 5 is a block diagram illustrating the provision of high speed dataand Internet access to guest rooms in hotels according to anotherspecific embodiment of the invention;

FIG. 6 is a block diagram illustrating the provision of high speed dataand Internet access to guest rooms in hotels according to yet anotherspecific embodiment of the invention;

FIG. 7 is a block diagram illustrating the auto-bauding technique of thepresent invention;

FIG. 8 is a flowchart illustrating the auto-bauding technique of thepresent invention;

FIG. 9 is a flowchart illustrating the customization of a guest room andthe transmission of control information to in-room systems via a hotelnetwork;

FIG. 10 is a block diagram of file server for use with variousembodiments of the present invention; and

FIG. 11 is a flowchart illustrating the providing of online conferenceservices.

DESCRIPTION OF SPECIFIC EMBODIMENTS

FIG. 1 is a block diagram illustrating the provision of high speed dataand Internet access to guest rooms in a hotel network 100 according to aspecific embodiment of the invention. In each guest room 102 is anin-room module (IRM) 104 by which a telephone 106 and a guest's laptopcomputer 108 may be connected to the hotel's wiring infrastructure.According to a specific embodiment, IRM 104 is plugged directly into theroom's phone jack and has at least two additional ports, one for theroom's telephone, e.g., an RJ-11 jack, and one for the guest's laptop,e.g., an RJ-45 Ethernet port. According to various embodiments, IRM 104performs a number of functions including, for example, combining andseparating Ethernet data and standard telephone signals for transmissionover the hotel's wiring infrastructure. According to other embodimentsand as discussed below, IRM 104 is configured to receive controlinformation from a central location for automated control of variousroom environmental parameters, e.g., temperature and lighting. Accordingto still other embodiments, IRM 104 is configured to receive a widevariety of other types of data such as, for example, digital audio andvideo for presentation in the guest room, or a wide variety of otherinformation services.

Transmission line 110 connects IRM 104 to the hotel's head-end 112 viaany of a wide variety of infrastructures. In the example shown,transmission line 110 connects IRM 104 to head-end 112 via standardtelephone company wiring as represented by punch down blocks 114 and 116and telephone company transmission line 118. It will be understood,however, that the wiring between IRM 104 and head-end 112 may take otherforms such as, for example, a four-conductor Ethernet network. Head-end112 comprises punch down block 116 and public branch exchange (PBX) 120.Interposed between punch down block 116 and PBX 120 is a connection port122 which, according to a specific embodiment, may be easily installedsimply by unplugging the standard 24-pin connector from PBX 120,plugging connection port 122 into the PBX connector (not shown), andplugging the original connector from punch down block 116 intoconnection port 122. Standard telephone signals pass through connectionport 122 to PBX 120 while half duplex Ethernet data packets aretransmitted and received by head-end module (HEM) 124.

Depending on the configuration of the present invention, HEM 124performs a variety of functions and, according to some embodiments, canbe thought of as an enhanced router with additional capabilitiesprogrammed into its operating system. That is, according to suchembodiments, HEM 124 serves as a switch which routes data packets to andfrom IRMs 104, and serves as the other end of the communications to andfrom IRMs 104 in which Ethernet data and phone signals are combined oversingle twisted pair technology. According to other alternativeembodiments, HEM 124 handles address translation and assignment,controls network access, and serves as a bridge for Ethernet datatransmitted over the hotel's single twisted pair infrastructure. HEM 124has a plurality of ports 126 each of which communicates with acorresponding IRM 104. This communication may be individually monitoredand controlled (by either the IRM or the HEM) thus allowing centralhotel management of billing and access as well as the ability togenerate reports for troubleshooting purposes.

Each IRM 104 (and thus the corresponding HEM port 126) has a fixed IPaddress which may be configured using the Simple Network ManagementProtocol (SNMP). If the guest's computer connected to a particular IRM104 does not have its own internal IP address, the fixed IP address ofthe corresponding IRM 104/HEM port 126 is assigned to the guest'scomputer using the Dynamic Host Configuration Protocol (DHCP) tofacilitate access to network 100. If the guest's computer already hasits own internal IP address, address translation is performed betweenthe computer's internal IP address and the fixed IP address of the IRM104/HEM port 126. According to various embodiment of the invention, thisaddress translation may be performed by either IRM 104 or HEM 124. HEM124 has a small boot ROM (not shown) for basic IP communications and alarge flash ROM (not shown) for fully functional software andconfiguration data. This allows for remote software upgrades using, forexample, an encrypted protocol riding on top of IP.

FIG. 2 is a flowchart 200 illustrating a method for providing high speeddata and Internet access to guest rooms in a hotel using the system ofFIG. 1. When a guest's computer connects to an IRM in any one of theguest rooms, the network IP address associated with that IRM isassociated with the computer (204). As discussed above, this associationcould mean a DHCP assignment of the network IP address to the guest'scomputer where the computer did not already have an internal IP address.It could also mean that the internal IP address of the computer istranslated into the network IP address. This addressassignment/translation may be effected by either the IRM and the HEM. Inaddition, it will be understood that depending on where theassignment/translation occurs it may precede or follow 206 describedbelow. The network IP address is associated with the guest's computerwhile it remains connected to the IRM.

Where the transmission line connecting the IRM to the hotel networkcomprises a single twisted pair of conductors, the data communicationsbetween the IRM and the HEM are configured so that they may betransmitted substantially simultaneously over the single twisted pairwith the standard telephone signals from the phone in the guest room(206). A specific technique by which this configuration is effected isdescribed below with reference to FIGS. 3 a and 4.

Once the connection is established, the communications between the IRMand the HEM are monitored either periodically or continuously for avariety of purposes (208). This information may be used by the hotel forbilling purposes or for troubleshooting and improving the reliability ofthe hotel network.

If an Internet transaction is requested by the guest's computer, aglobally unique IP address from a pool of such addresses is temporarilyassociated with the network IP address currently associated with theguest's computer using, for example, a network address translationprotocol (210). As discussed above, the pool of addresses could be, forexample, class A, B, or C addresses. As will be discussed below withreference to FIGS. 5 and 6, the temporary association of the globallyunique IP address may be done by the HEM in the hotel or, according toanother embodiment, by a remote server which interconnects one or morehotel properties in a wide area network. When the Internet transactionis complete (212), the globally unique IP address is disassociated fromthe network IP address and put back in the pool for use in facilitatingsubsequent Internet transactions from any of the hotel's guest rooms(214). The network IP address remains associated with the guest'scomputer until the session ends, e.g., the computer is disconnected fromthe IRM or powered down (216).

FIGS. 3 a and 3 b are more detailed block diagrams of IRM 104 and HEM124 of FIG. 1, respectively. IRM 104 comprises connection circuitry forconnecting the IRM to the room's standard telephone jack as well as theroom's telephone and the guest's computer. According to a specificembodiment, the connection circuitry includes RJ-11 ports 302 forconnecting to the phone and 303 for connecting to the wall jack, anEthernet port 304, an iEEE 1394 port 305, and a universal serial bus(USB) port 306 for connecting to the guest's computer, and an additionaldata port 307 for receiving various types of data. iEEE 1394 port 305and USB port 306 may, in some instances, prove more convenient thanEthernet port 304 in that certain network reconfiguration issues don'thave to be dealt with. In addition, many business travelers often don'ttravel with the Ethernet dongle which is necessary for connecting theirlaptop's Ethernet port to a network Ethernet port. Thus, depending uponwhich of the two alternate standards, iEEE 1394 or USB, the laptop isconfigured for, IRM 104 is operable to translate the laptop'stransmissions to the Ethernet standard.

According to a specific embodiment, IRM 104 also includes transmissioncircuitry 308 for transmitting and receiving data on a single twistedpair of conductors of which the majority of hotel wiring infrastructuresare comprised. According to one embodiment, a portion of transmissioncircuitry 308 is implemented according to the home PNA (Phone-lineNetworking Alliance) standard which allows half duplex data and phonesignals on the same line as illustrated by the diagram of FIG. 4.According to the home PNA standard, data transmissions from IRM 104 to aport 126 of HEM 124 and transmissions from the HEM to the IRM arealternated at a frequency in the range of 4-9 MHz. Because standardphone signals exists at a relatively low frequency compared to the homePNA modulation frequency, all of the signals may easily exist on asingle pair of wires.

According to a specific embodiment, transmission circuitry 308 isoperable to associate the network IP address associated with IRM 104with the guest's computer. That is, the address translation orassignment which allows the guest access to the local or wide areanetwork is performed by the transmission circuitry in the IRM. Accordingto a more specific embodiment, transmission circuitry 308 includes aprocessing unit 309 based on RISC microprocessor which performs theaddress translation, the combining and separation of signals fortransmission to the headend, and the routing of the received signals tothe appropriate IRM port. According to a specific embodiment, processingunit 309 comprises an Intel 80960VH and the appropriate supportcircuitry.

According to another specific embodiment, IRM 104 also includes controlcircuitry 310 for receiving control information via the hotel's networkfor controlling one or more control systems 311 proximate to the IRM. Aswill be discussed below with reference to FIG. 9, such control systemsmay include, for example, the room's temperature control, lighting, andaudio systems. In one embodiment, the control circuitry includesconversion circuitry 312 for converting the received control informationinto the necessary control signals for actually controlling the in-roomcontrol systems. The conversion circuitry may include, for example, anRF transmission element 314 (e.g., an antenna) for transmitting RFcontrol signals to the various control systems. According to analternative embodiment, conversion circuitry 312 includes an infraredtransmission element (e.g., an IR diode) for transmitting infraredcontrol signals to various control systems.

Transmission circuitry 308 (using processor 309) discriminates betweenthe various data it receives and directs it to the appropriate port onIRM 104 according to address information in data packet headers.According to a specific embodiment, digital audio and video may betransmitted to individual rooms via the system described herein. Thedigital audio and video are directed to additional data port 307 towhich an audio and/or video system may be connected for presenting thetransmitted content. In this way, an ambience may be set for the guest'sarrival. In addition, the guest could select a wide variety ofentertainment and information services via the hotel network which maythen be transmitted to the guest's room via the auxiliary data port 307on IRM 104. According to one embodiment, data port 307 receives audiodata which directly drives a pair of speakers in the guest room.

Specific embodiments of IRM 104 also include an LED or LCD display 316on which status and other information may be communicated to theoccupant of the guest room whether or not they are currently connected.For example, before a connection is made, display 316 could be used toinform the hotel guest of all of the services available through IRM 104as well as instructions for connecting to IRM 104. Other informationsuch as stock quotes and weather information may also be presentedcontinuously or periodically. Once connected, display 316 couldcommunicate the status of the connection as well as the time connectedand current connection charges. It will be understood that a widevariety of other information may be presented via display 316.

IRM 104 may also include an array of individual colored LEDs 318 whichprovide information to the user. Such LEDs may indicate, for example,the connection status of the IRM, i.e., whether it is connected to theHEM, using red or green LEDs. LEDs 318 may also be configured toindicate a purchase status to the user. That is, because connectionservices are often purchased in 24 hour blocks, LEDs 318 may indicate tothe user whether she is operating within a block of time which hasalready been paid for (green), whether the end of the current block isapproaching (yellow), or whether she has already entered the next timeblock (red). LEDs 318 could also indicate which type of connection theuser has established, e.g., USB, Ethernet, or IEEE 1394.

As mentioned above and as shown in FIG. 3 b, HEM 124 may be thought ofas an enhanced router which routes data packets to and from IRMs 104,controls network access, serves as a bridge for Ethernet datatransmitted over the hotel's single twisted pair infrastructure, and,according to some embodiments, handles address translation andassignment. According to one embodiment, a 2611 router from CiscoSystems, Inc. is used to implement HEM 124. HEM 124 includes a mastercentral processing unit (CPU) 352, low and medium speed interfaces 354,and high-speed interfaces 356. When acting under the control ofappropriate software or firmware, the CPU 352 is responsible for suchrouter tasks as routing table computations and network management. Itmay also be responsible for controlling network access andtransmissions, etc. It preferably accomplishes all these functions underthe control of software including an operating system (e.g., theInternet Operating System (IOS®) of Cisco Systems, Inc.) and anyappropriate applications software. CPU 352 may include one or moremicroprocessor chips 358. In a specific embodiment, a memory 360 (suchas non-volatile RAM and/or ROM) also forms part of CPU 352. However,there are many different ways in which memory could be coupled to thesystem.

The interfaces 354 and 356 are typically provided as interface cards(sometimes referred to as “line cards”). Generally, they control thesending and receipt of data packets over the network and sometimessupport other peripherals used with HEM 124. The low and medium speedinterfaces 354 include a multiport communications interface 362, aserial communications interface 364, and a token ring interface 366. Thehigh-speed interfaces 356 include an FDDI interface 368 and a multiportEthernet interface 370. Preferably, each of these interfaces (low/mediumand high-speed) includes (1) ports for communication with theappropriate media, (2) an independent processor, and in some instances(3) volatile RAM. The independent processors control such communicationsintensive tasks as packet switching, media control and management. Byproviding separate processors for the communications intensive tasks,this architecture permits the master microprocessor 352 to efficientlyperform routing computations, network diagnostics, security functions,etc.

The low and medium speed interfaces 354 are coupled to the master CPU352 through a data, control, and address bus 372. High-speed interfaces356 are connected to the bus 372 through a fast data, control, andaddress bus 374 which is in turn connected to a bus controller 376.

Although the system shown in FIG. 3 b is one type of router by which thepresent invention may be implemented, it is by no means the only routerarchitecture by which the present invention may be implemented. Forexample, an architecture having a single processor that handlescommunications as well as routing computations, etc. would also beacceptable. Further, other types of interfaces and media could also beused with the router.

Regardless of network device's configuration, it may employ one or morememories or memory modules (including memory 360) configured to storeprogram instructions for the network operations and network access andcontrol functions described herein. The program instructions may specifyan operating system and one or more applications, for example. Suchmemory or memories may also be configured to store, for example, controlinformation for controlling in-room control systems, etc.

Because such information and program instructions may be employed toimplement the systems/methods described herein, the present inventionrelates to machine readable media that include program instructions,state information, etc. for performing various operations describedherein. Examples of machine-readable media include, but are not limitedto, magnetic media such as hard disks, floppy disks, and magnetic tape;optical media such as CD-ROM disks; magneto-optical media such asfloptical disks; and hardware devices that are specially configured tostore and perform program instructions, such as read-only memory devices(ROM) and random access memory (RAM). The invention may also be embodiedin a carrier wave travelling over an appropriate medium such asairwaves, optical lines, electric lines, etc. Examples of programinstructions include both machine code, such as produced by a compiler,and files containing higher level code that may be executed by thecomputer using an interpreter.

Referring back to FIG. 3 b, HEM 124 has a plurality of ports 126 each ofwhich communicates with a corresponding IRM 104. HEM 124 has the abilityto sense when any of ports 126 are being used so that the hotel may billthe user accordingly. This monitoring feature is also useful fortechnical support, network bandwidth requirement estimates, billingestimates, and buying pattern data. HEM 124 also has the capability ofenabling and disabling individual ports 126. Where network 100 is partof a wide area network (as discussed below), the monitoring, enabling,and disabling of ports 126 may be done from a remote server at thecenter of the WAN.

As described above, each HEM port 126 (and thus the corresponding IRM104) has a fixed IP address which may be configured using SNMP. Thefixed IP address of the HEM port 126 and the IRM 104 is assigned to theguest's computer using DHCP. Alternatively, an address translation isperformed between the computer's internal IP address and the fixed IPaddress of IRM 104/HEM port 126. HEM 124 has a small boot ROM 378 forbasic IP communications and a large flash ROM 380 for fully functionalsoftware and configuration data. This allows for remote softwareupgrades using, for example, an encrypted protocol riding on top of IP.

According to various embodiments, HEM 124 also comprises transmissioncircuitry 316 for transmitting and receiving data on a single twistedpair of conductors. Thus, the Ethernet data which has been combined withthe standard telephone signals at IRM 104 may be picked off andreconfigured for transmission according to standard Ethernet techniques.Also, data headed to IRM 104 may be combined for transmission over thesingle twisted pair. As with transmission circuitry 308, transmissioncircuitry 316 may be implemented according to the home PNA standard.

FIG. 5 is a block diagram illustrating the provision of high speed dataand Internet access to guest rooms in a chain of hotels 502 according toone embodiment of the invention. Using the internal infrastructuredescribed above with reference to FIG. 1, each hotel 502 has a localarea network (LAN) (not shown) which provides direct access to theInternet 504 for each of its guest rooms. According to this embodiment,each hotel 502 must provide its own security in the form of a firewall506 for the protection of its LAN.

FIG. 6 is a block diagram illustrating the provision of high speed dataand Internet access to guest rooms in a chain of hotels 602 according toanother embodiment of the invention. Using the internal infrastructuredescribed above with reference to FIG. 1, each hotel 602 has a LAN (notshown) which is then connected with other LANs in the other hotels 602to form a wide area network (WAN) referred to herein as a virtualprivate network (VPN) 604. According to a specific embodiment, VPN 604is built on an optical fiber backbone employing asynchronous transfermode (ATM) technology to transmit data packets. It will be understoodhowever that any of a variety of transmission protocols andinfrastructures may be employed to transmit data in such a networkwithout departing from the scope of the present invention. Suchprotocols may include but are not limited to frame relay, Ethernet, andFDDI. Data are configured in the appropriate format as they leave eachhotel 602 by a framer (not shown) which may be part of or associatedwith each hotel's router or file server.

The embodiment of FIG. 6 provides several advantages over the embodimentdescribed above with reference to FIG. 5. High speed access to theInternet requires some form of connection to the Internet such as, forexample, a T1 or T3 line. Not only does such a connection require ahardware infrastructure to support it, it also necessitates some form ofprotection for the network in the form of, for example, a firewall.Thus, if each hotel property in a hotel chain were to be directlyconnected to the Internet (as shown in FIG. 5), each property would needto have its own network hardware infrastructure, firewall, and thetechnical and administrative staff and functions to support the same. Bycontrast, with VPN 604, access to the Internet 606 is provided via asingle network center (represented by remote network operation center(NOC) server 608) at which one or more firewalls 610 and any othernecessary networking hardware and equipment may be located and managed.According to a specific embodiment, a redundant network center isprovided in a different city than the first against the event that oneor the other goes down.

Having each hotel property directly connected to the Internet isproblematic for effecting control of the hotels from a central location.That is, the more each hotel LAN is amenable to control from a centrallocation, the more vulnerable it is to hacking. With VPN 604, securityis complete and centralized control is virtually unlimited. This makesthings like remote software upgrades convenient thus eliminating whatmight otherwise be significant field service costs. In addition, becausemuch of the equipment is centrally located, the costly redundancy ofequipment and support functions at each hotel property made necessary bythe embodiment of FIG. 5 is avoided.

Another important benefit of VPN 604 relates to the management ofglobally unique IP addresses. As mentioned above, there is a paucity ofpools of globally unique IP addresses which are sufficiently large toaccommodate each host on the networks of most medium to large sizeorganizations. For example, one pool of class C addresses accommodatesless than 256 simultaneous users on a network. This might be sufficientat most hotels much of the time, but it is clear that there areforeseeable circumstances where it would not be. For example, asmentioned above, if a 1200 room hotel hosted an Internet technologiesseminar it is highly likely that such a pool of addresses would not besufficient. In addition, this scenario makes the assumption that eachproperty in a hotel chain (some comprising over 1000 properties) couldprocure a pool of class C addresses.

VPN 604 addresses this problem in that it spreads the IP address needsof each of the hotel properties over the resources of the entire widearea network. Thus, for example, a single class B pool of addressesmight be used to accommodate all of the Internet access needs of anentire hotel chain even where the total number of rooms in the chain farexceeds the number of available globally unique IP addresses. That is,large bursts of IP address needs may occur simultaneously at dozens ofthe hotel properties without exhausting the nearly 64,000 globallyunique addresses available in the class B pool.

Other secure services may also be provided via VPN 604. For example,video teleconferencing-over-IP 612 and voice-over-IP communications 614may be provided to hotel guests. Moreover, by arranging access to VPN604 by corporate hosts 616, individual employees of those corporationscan have secure access to their employer's network from remotelocations. Other services such as, for example, property managementservices 618 may be provided to the management of hotels 602.

FIG. 7 is a block diagram illustrating an auto-bauding technique whichmay be employed with certain alternative embodiments of the presentinvention. FIG. 8 is a flowchart 800 illustrating the same. Everytransmission line in a hotel's wiring infrastructure has differenttransmission characteristics due to its length and proximity to sourcesof distortion. Therefore, according to a specific embodiment of theinvention in which an alternative to the home PNA standard is employed,IRM 702 and HEM 704 are operable to determine the maximum data rate foreach guest room individually. That is, instead of using a single rate toaccommodate the slowest transmission line in the network, each room isallowed a data rate which is the maximum allowed by its transmissionline. On power, IRM 702 goes to its lowest baud rate, i.e., 128 kHz(802). HEM 704 transmits empty packets at 400 microsecond intervalswhile IRM listens at its current baud rate (804). If communication isnot established (806), an error message is generated notifying thenetwork administrator that IRM 702 is not operational (808). If,however, communication is established (806), HEM 704 instructs IRM 702to baud up to the next higher rate (810). If communication isestablished at the next higher rate (812), HEM 704 again instructs IRM702 to baud up to the next higher rate (810). This occurs iterativelyuntil a baud rate is reached at which communication cannot beestablished. At that point, IRM 702 returns to the lowest baud rate(814) and HEM 704 instructs IRM 702 to baud up to the highest baud rateat which communication was established (816). In this way, data to anfrom IRM 702 will always be transmitted at the maximum allowable rate.

FIG. 9 is a flowchart 900 illustrating the customization of a guest roomand the transmission of control information to in-room systems via ahotel network. The ability of the present invention to provide halfduplex data to each guest room over a single twisted pair connectionprovides additional advantages which are likely to engender furtherhotel customer loyalty. In recent years, the hospitality industry hasbeen looking for customization solutions to tailor guest rooms to theneeds and preferences of the individual guest. The belief is that thiswould go a long way toward creating the type of customer loyalty withthe business traveler that airlines have created with frequent flyerprograms. The basic idea is that a hotel or hotel chain keeps a databaserecord for frequent guests in which a variety of parameters may bespecified such as, for example, room temperature, lighting, backgroundmusic, etc. Other customization options include various informationservices preferred by the guest such as, for example, stock quotes,weather reports, entertainment calendars, etc. When the guest checks in,the assigned room is then automatically configured to suit that guest'spreferences.

One method of configuring the room automatically involves adjustingvarious controls in the room via remote control signals such as, forexample, radio frequency (RF) or infrared signals. According to aspecific embodiment of the invention, control signals are sent to theIRM (e.g., IRM 104 of FIGS. 1 and 3 a) in the guest room via the hotelnetwork where they are converted to the appropriate form, e.g., RF, andused to set the room controls appropriately. In this way, the room'sthermostat, light controls, and stereo controls may be set to provide acomfortable and familiar environment for the newly arrived guest. And,because the present invention allows half duplex data to be combinedwith standard telephone signals, the transmission of room controlsignals may be done in this manner even where the hotel wiring consistsof only single twisted pair technology. In addition and as describedabove, digital audio and video signals as well as digital informationservices may be sent to the room in the same manner providing furthercustomization capabilities. Thus, the guest room customization solutionof the present invention provides a powerful tool by which individualhotels and hotel chains may engender greater customer loyalty andthereby realize increased revenues.

Referring now to FIG. 9, a specific embodiment of the invention will nowbe described. As described above, specific information for an individualguest is maintained in a database record 901 either on the server of aspecific hotel or on a central remote server from which it may bedownloaded to the specific hotel at which the corresponding guest isscheduled to arrive or is actually checking in (902). As the guest ischecking in or in response to some other appropriate event, informationregarding the guest's room environment and other preferences in databaserecord 901 is transmitted from the HEM to the IRM in the guest'sassigned room (904). The information is transmitted via the hotelnetwork which may comprise the hotel's single twisted pair telephonewiring infrastructure. The in-room module then displays some of thereceived information, e.g., stock quotes, and converts some of thereceived information into an appropriate set of control signals, e.g.,RF signals, for communicating with the rooms various environmentalcontrols (906). These environmental controls may include, for example,the thermostat, lighting controls, stereo controls, television controls,etc. The appropriate adjustments are then made to the various systems inthe guest room to provide the optimal environment specifically suited tothe stated preferences of the arriving guest (908).

FIG. 10 is a block diagram of a file server 1000 for use with variousembodiments of the present invention. File server 1000 may be used, forexample, to implement any of HEM 124 of FIGS. 1 and 3 a, firewall 506 ofFIG. 5, and firewalls 610 and remote server 608 of FIG. 6. File server1000 includes display 1002 and keyboard 1004, and mouse 1006. Computersystem 801 further includes subsystems such as a central processor 1008,system memory 1010, fixed disk storage 1012 (e.g., hard drive),removable disk 1014 (e.g., CD-ROM drive), display adapter 1016, andnetwork interface 1018 over which LAN, WAN, and Internet communicationsmay be transmitted. File server 1000 operates according to networkoperating system software and may perform other functions such as, forexample, file and database management. Other systems suitable for usewith the invention may include additional or fewer subsystems. Forexample, another system could include more than one processor 1008(i.e., a multi-processor system), or a cache memory (not shown).

The system bus architecture of file server 1000 is represented by arrows1020. However, these arrows are illustrative of any interconnectionscheme serving to link the subsystems. For example, a local bus could beutilized to connect the central processor to the system memory. Fileserver 1000 is but an example of a system suitable for use with theinvention. Other architectures having different configurations ofsubsystems may also be utilized.

Various embodiments of the present invention may be used to providespecial levels of service to specific groups such as, for example, theattendees of a conference at a hotel property. That is, conferenceattendees are identified when they connect to the hotel network and areprovided access to specific content and online services which arerelated to the conference. FIG. 11 is a flowchart 1100 illustrating theproviding of such online conference services using various ones of thenetwork infrastructures described above such as, for example, thenetwork environments of FIGS. 1, 3 a, 3 b, 5 and 6. A groupidentification number or tag is associated with each of the attendees ofa specific conference (1102). According to a specific embodiment, thisis accomplished by associating the network addresses of the IRMs in eachof the guest rooms occupied by one of the attendees with the group IDtag. Conference specific services and content are then provided on thenetwork (1104).

Conference services might include, for example, substantially real timevoice communication and/or video teleconferencing with other attendeesof the conference. Speakers or conference organizers may have softwarethey want to distribute to attendees electronically. Only conferenceattendees have access to such electronic information. Conferencespecific content such as, for example, electronic copies of paperspresented at the conference as well as PowerPoint® presentations areprovided. Individual presenters at the conference can post follow upnotes and answers to questions they were not able to get to during theirpresentation. Chat Rooms could be provided in which, at the end of theday, conference members can get online from their room to interact withother members. Only conference members would have access to the chatroom. This service allows conference attendees to discuss questions andcomments about the conference, talk about the sessions that were goodand bad, critique speakers, and in general exchange information withother attendees. According to various embodiments, the chat rooms couldbe recorded and the information provided to conference organizers toallow them to better serve their members at future conferences. The realnames of chat room participants may be excluded from this information.Bulletin boards for the posting of information by any conferenceattendee may also be provided. Discounted access to other services suchas, for example, entertainment and information services, may also beprovided.

As described above with reference to FIG. 2, when a guest's computerconnects to an IRM in any one of the guest rooms, the network IP addressassociated with that IRM is associated with the computer (1106). Asdiscussed above, this association could mean a DHCP assignment of thenetwork IP address to the guest's computer where the computer did notalready have an internal IP address. It could also mean that theinternal IP address of the computer is translated into the network IPaddress. This address assignment/translation may be effected by the IRM,the HEM, or a remote server where the hotel is part of a virtual privatenetwork as described above with reference to FIG. 6.

If the network IP address associated with a particular guest's computeris associated with the group ID tag (1108), access to the conferencespecific services and content are provided to the user of that computer(1110). If, on the other hand, the network IP address is not associatedwith the group ID (1108), access to the conference specific services andcontent is blocked. The network IP address remains associated with theguest's computer until the session ends, e.g., the computer isdisconnected from the IRM or powered down (1114).

The technique described above with reference to FIG. 11 could be usedmore generally to restrict access to particular services, content, websites, other networks, etc. to specific identifiable groups. Forexample, when an employee of a particular corporation checks into thehotel, the network IP address of the IRM in that employee's room may beassociated with a group ID tag which will enable access to thecorporation's computer (e.g., see computer host 616 of FIG. 6). As willbe understood, restriction of access to a variety of content andservices in this manner may be effected according to a variety of groupidentifications without departing from the scope of the presentinvention.

While the invention has been particularly shown and described withreference to specific embodiments thereof, it will be understood bythose skilled in the art that changes in the form and details of thedisclosed embodiments may be made without departing from the spirit orscope of the invention. For example, many of the embodiments describedherein have been described with reference to hotels. It will beunderstood, however, that the techniques employed by the presentinvention may be applied to a variety of structures and institutionssuch as, for example, schools, office buildings, and the like. Inaddition, several embodiment described herein employ single twisted pairwiring which is the standard telephone wiring found in most buildings.However, it will be understood that the techniques described herein maybe implemented on any of a wide variety of wiring infrastructuresincluding, for example, Ethernet and ATM systems. Therefore, the scopeof the invention should be determined with reference to the appendedclaims.

1-31. (Canceled)
 32. A method for providing conference services over anetwork having a plurality of users associated therewith, comprising:associating a group identification tag with selected ones of theplurality of users thereby identifying the selected users as attendeesof the conference; providing the conference services on the network; andrestricting access to the conference services to the selected usersusing the group identification tag.
 33. The method of claim 32 whereinassociating the group identification tag with selected users comprisesassociating the group identification tag with network access nodesassociated with the selected users.
 34. The method of claim 33 whereineach network access node has a network address associated therewithwhich is unique on the network, and wherein associating the groupidentification tag with the network access nodes comprises associatingthe group identification tag with the network addresses.
 35. The methodof claim 34 wherein restricting access to the conference servicescomprises verifying that a particular network address from which arequest has been received has the group identification tag associatedtherewith before providing access to the conference services.
 36. Themethod of claim 32 wherein providing the conference services on thenetwork comprises providing access to conference data content to theselected users via the network.
 37. The method of claim 36 wherein theconference data content comprises PowerPoint® presentation data.
 38. Themethod of claim 36 wherein the conference data content compriseselectronic copies of written materials.
 39. The method of claim 32wherein providing the conference services on the network comprisesproviding discounted access to entertainment content.
 40. The method ofclaim 32 wherein providing the conference services on the networkcomprises providing discounted access to information services.
 41. Themethod of claim 32 wherein providing the conference services on thenetwork comprises providing substantially real time voice communication.42. The method of claim 32 wherein providing the conference services onthe network comprises providing video teleconferencing services.
 43. Amethod for providing conference services over a network having aplurality of network access nodes each having a network addressassociated therewith which is unique on the network, comprising:associating the network addresses with computers associated with aplurality of users while the computers are connected to the networkaccess nodes thereby providing access to the network for each of theplurality of users; associating a group identification tag with selectedones of the plurality of users thereby identifying the selected users asattendees of a conference; providing the conference services on thenetwork; and restricting access to the conference services to theselected users using the group identification tag.
 44. The method ofclaim 43 wherein selected ones of the computers have internal IPaddresses and associating the network addresses with the selectedcomputers comprises translating the internal IP addresses to the networkaddresses.
 45. The method of claim 43 wherein selected ones of thecomputers do not have internal IP addresses and associating the networkaddresses with the selected computers comprises assigning the networkaddresses to the computers.
 46. The method of claim 43 wherein thenetwork comprises a local area network and associating the networkaddresses is done by a headend associated with the local area network.47. The method of claim 43 wherein the network comprises a wide areanetwork and associating the network addresses is done by a remote serverwhich controls the wide area network.
 48. The method of claim 43 whereinassociating the network addresses is done by the network access nodes.