Methods and devices for interworking of wireless wide area networks and wireless local area networks or wireless personal area networks

ABSTRACT

Embodiments describe registration in a wireless communication system. A method includes wirelessly transmitting over a WWAN a first registration message from a mobile device, wirelessly transmitting through the WWAN a second registration message to a WLAN access point and receiving at the mobile device access through the WLAN access point. According to another embodiment is a method for constructing a self-configuring ad-hoc network. The method can include receiving a GPS coordinate from a WWAN channel node at a management system and creating an initial topography based at least in part on the GPS coordinate to achieve a network connectivity with diverse routes between a plurality of nodes.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims benefit under 35 U.S.C. §119(e) from U.S.Provisional Patent application Ser. No. 60/697,504 entitled METHODS ANDDEVICES FOR INTERWORKING OF WIRELESS WIDE AREA NETWORKS AND WIRELESSLOCAL AREA NETWORKS OR WIRELESS PERSONAL AREA NETWORKS filed Jul. 7,2005 and U.S. Provisional Application Ser. No. 60/712,320 filed Aug. 29,2005 the entirety of which is hereby incorporated by reference. Thisapplication is related to co-pending patent application Ser. No.11/240,323 entitled, METHODS AND DEVICES FOR INTERWORKING OF WIRELESSWIDE AREA NETWORKS AND WIRELESS LOCAL AREA NETWORKS OR WIRELESS PERSONALAREA NETWORKS and co-pending patent application Ser. No. 11/240,045entitled, METHODS AND DEVICES FOR INTERWORKING OF WIRELESS WIDE AREANETWORKS AND WIRELESS LOCAL AREA NETWORKS OR WIRELESS PERSONAL AREANETWORKS, both filed on the same day as this application.

BACKGROUND

I. Field

The following description relates generally to wireless networks and,amongst other things, to seamless interworking of communication betweenwireless wide-area networks (WWAN), wireless local area networks (WLAN),and/or wireless personal area networks (WPAN).

II. Background

Electronic devices can include multiple communication protocols. Forexample, mobile devices have become multifunctional devices, frequentlyproviding email, Internet access, as well as traditional cellularcommunication. Mobile devices can be equipped with wide area wirelessconnectivity, for example, utilizing either or both of the followingtechnologies: third generation wireless or cellular systems (3G) orInstitute for Electrical and Electronic Engineers (IEEE) 802.16 (WiMax)and other to-be-defined WWAN technologies. Meanwhile, IEEE 802.11 basedWLAN connectivity is being installed in mobile devices as well. On thehorizon, ultra-wideband (UWB) and/or Bluetooth-based WPAN localconnectivity may also be available in mobile devices.

Other examples of multiple communication protocols in electronic devicesinclude a laptop that may include a WPAN utilized to connect the laptopto a wireless mouse, wireless keyboard, and the like. In addition, thelaptop may include a device which operates on any currently defined IEEE802.11 protocols (IEEE 802.11a/b/g/i/e) or other to-be-defined protocolsin the IEEE 802.11 family (e.g., IEEE 802.11n/s/r/p). WLAN has becomepopular and, for example, is being set up in both homes and enterprisesfor personal and business purposes. In addition, coffee shops, Internetcafes, libraries and public and private organizations utilize WLANs.

WWAN technologies are distinguished by wide area (ubiquitous) coverageand wide area deployments. However, they can suffer from buildingpenetration losses, coverage holes and comparatively, to WLAN and WPAN,limited bandwidth. WLAN and WPAN technologies deliver very high datarates, approaching hundreds of Mbps, but coverage is typically limitedto hundreds of feet in the case of WLAN and tens of feet in the case ofWPAN.

The number of networks and protocols continues to increase rapidly dueto demands for functionality associated with unique user demands anddivergent protocols. Such disparate networks and protocols are laboriousfor a user to switch between and in many cases the user is trapped in anetwork without regard to what might be the optimal network for the userat a given time. In view of the foregoing, there is a need to providefor seamless transition between networks and/or protocols for optimizingand converging on the best communication protocol for the user.

SUMMARY

The following presents a simplified summary of one or more embodimentsin order to provide a basic understanding of some aspects of suchembodiments. This summary is not an extensive overview of the one ormore embodiments, and is intended to neither identify key or criticalelements of the embodiments nor delineate the scope of such embodiments.Its sole purpose is to present some concepts of the describedembodiments in a simplified form as a prelude to the more detaileddescription presented later.

As individuals migrate through a plurality of different type of networksand protocols, the embodiments herein provide for seamless transition ofa user through the various networks and protocols in order to facilitatesmooth, seamless communication. Embodiments provide various optimizationtechnologies to transition between the various networks and protocolsand this transition can be based on a user preference, user location,signal strength, and/or other criteria. Such a seamless transition canbe transparent to the user or can be user initiated.

According to a feature is a method for registration in a wirelesscommunication system. The method includes wirelessly transmitting over aWWAN a first registration message from a mobile device, wirelesslytransmitting through the WWAN a second registration message to a WLANaccess point, and receiving at the mobile device access through the WLANaccess point. According to another aspect, transmitting through the WWANa second registration message can include transmitting the secondregistration message to the WLAN access point. According to anotheraspect transmitting through the WWAN a second registration message caninclude transmitting the second registration message through the WWAN toanother mobile device and transmitting a third registration messagebased on the second registration message from the mobile device to theWLAN access point.

According to another aspect is a method for constructing aself-configuring ad-hoc network. The method can include receiving a GPScoordinate from a WWAN channel node at a management system and creatingan initial topography based at least in part on the GPS coordinate toachieve a network connectivity with diverse routes between a pluralityof nodes. According to another aspect, the method can include decidingwhich node channels to utilize and collecting signal strengthmeasurements and routing conditions.

According to yet another aspect is system for creating an ad-hocnetwork. The system can include means for accessing a terminal in a WLANfunctionality mode and means for transmitting information from theterminal to at least a second terminal having a dual mode functionality.Also included can be means for utilizing a first channel at a WLAN nodeto pick up network traffic and means for utilizing a second channel atthe WLAN node to relay the network traffic to a mobile device or asecond WLAN node.

According to another aspect is a computer-readable medium having storedthereon computer-executable instructions. The medium can include sendinga first registration message including an encryption key over a WWAN,communicating a second registration message to a WLAN access point, andreceiving an authorization to communicate through the WLAN access point.According to another aspect, the medium can include instructions forcommunicating the second registration message through the WWAN to amobile device and transmitting a third registration message to the WLANaccess point.

Yet another aspect is a processor that executes instructions forcreating an ad-hoc network. The instructions can include accessing aterminal in a WLAN functionality mode and transmitting information fromthe terminal to at least a second terminal having a dual modefunctionality. The instructions further utilize a first channel at aWLAN node to pick up network traffic and utilize a second channel at theWLAN node to relay the network traffic to a mobile device or a secondWLAN node.

To the accomplishment of the foregoing and related ends, one or moreembodiments comprise the features hereinafter fully described andparticularly pointed out in the claims. The following description andthe annexed drawings set forth in detail certain illustrative aspects ofthe one or more embodiments. These aspects are indicative, however, ofbut a few of the various ways in which the principles of variousembodiments may be employed and the described embodiments are intendedto include all such aspects and their equivalents.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates a wireless communication system in accordance withvarious embodiments presented herein.

FIG. 2 is an illustration of a multiple access wireless communicationsystem according to one or more embodiments.

FIG. 3 is a block diagram of an embodiment of a mobile device.

FIG. 4 illustrates a methodology for determining the type of network towhich the mobile device should connect.

FIG. 5 is a simplified block diagram of another embodiment of a mobiledevice.

FIG. 6 illustrates a methodology for locating a call received from auser of a mobile device that utilizes a GPS functionality component.

FIG. 7 illustrates another methodology for locating a wireless device(e.g., mobile phone) that does not utilize a GPS receiver.

FIG. 8 illustrates a methodology for utilizing access points within aWWAN, WLAN, and/or WPAN network.

FIG. 9 illustrates a methodology for utilizing location information toseamlessly switch a mobile device between WWAN and WLAN/WPAN.

FIG. 10 illustrates another embodiment of a methodology for utilizinglocation information to automatically enhance service(s) of the mobiledevice.

FIG. 11 illustrates a methodology of providing an ad-hoc network insituations where there is no available access point.

FIG. 12 illustrates an exemplary self-configuring ad-hoc network thatcan be constructed utilizing WLAN and WWAN technologies.

FIG. 13 illustrates a methodology for utilizing WLAN and WWANtechnologies to construct a self-configuring ad-hoc network.

FIG. 14 illustrates a methodology for initializing neighbor lists on theWWAN control channel to facilitate synchronization of access terminals.

FIG. 15 illustrates peer-to-peer communication in a WLAN network.

FIG. 16 illustrates a methodology for registration and/or authenticationin an Independent Basic Service Set (IBSS) network.

FIG. 17 illustrates an exemplary ad-hoc mesh network.

FIG. 18 illustrates a system that coordinates communication betweenmultiple communication protocols in a wireless communication environmentin accordance with one or more embodiments presented herein.

FIG. 19 illustrates a system that coordinates communication in wirelesscommunication environment in accordance with various aspects.

FIG. 20 illustrates a wireless communication environment that can beemployed in conjunction with the various systems and methods describedherein.

DETAILED DESCRIPTION

Various embodiments are now described with reference to the drawings. Inthe following description, for purposes of explanation, numerousspecific details are set forth in order to provide a thoroughunderstanding of one or more aspects. It may be evident, however, thatsuch embodiment(s) may be practiced without these specific details. Inother instances, well-known structures and devices are shown in blockdiagram form in order to facilitate describing these embodiments.

As used in this application, the terms “component,” “system,” and thelike are intended to refer to a computer-related entity, eitherhardware, firmware, a combination of hardware and software, software, orsoftware in execution. For example, a component may be, but is notlimited to being, a process running on a processor, a processor, anobject, an executable, a thread of execution, a program, and/or acomputer. By way of illustration, both an application running on acomputing device and the computing device can be a component. One ormore components can reside within a process and/or thread of executionand a component may be localized on one computer and/or distributedbetween two or more computers. In addition, these components can executefrom various computer readable media having various data structuresstored thereon. The components may communicate by way of local and/orremote processes such as in accordance with a signal having one or moredata packets (e.g., data from one component interacting with anothercomponent in a local system, distributed system, and/or across a networksuch as the Internet with other systems by way of the signal).

The disclosed embodiments can incorporate various heuristic and/orinference schemes and/or techniques in connection with dynamicallychanging networks or communications protocols employed. As used herein,the term “inference” refers generally to the process of reasoning aboutor inferring states of the system, environment, and/or user from a setof observations as captured though events and/or data. Inference can beemployed to identify a specific context or action, or can generate aprobability distribution over states, for example. The inference can beprobabilistic—that is, the computation of a probability distributionover states of interest based on a consideration of data and events.Inference can also refer to techniques employed for composinghigher-level events from a set of events and/or data. Such inferenceresults in the construction of new events or actions from a set ofobserved events and/or stored event data, whether or not the events arecorrelated in close temporal proximity, and whether the events and datacome from one or several event and data sources.

Accordingly, it is contemplated that users can be automatically shiftedor outside of and into different communications regions in accordancewith the embodiments described herein. Automatic action (e.g.,seamlessly transitioning a user during a communication session from aWWAN to a WLAN) can be taken as a function of inferring a user'sintentions with respect to handling of the communications session aswell as tertiary communications, passive/background communications, andupcoming sessions. With respect to taking automatic action, machinelearning techniques can be implemented to facilitate performingautomatic action. Moreover, utility based analyses (e.g., factoringbenefit of taking correct automatic action versus costs of takingincorrect action) can be incorporated into performing the automaticaction. More particularly, these artificial intelligence (AI) basedaspects can be implemented by any suitable machine learning basedtechnique and/or statistical-based techniques and/or probabilistic-basedtechniques. For example, the use of expert systems, fuzzy logic, supportvector machines, greedy search algorithms, rule-based systems, Bayesianmodels (e.g., Bayesian networks), neural networks, other non-lineartraining techniques, data fusion, utility-based analytical systems,systems employing Bayesian models, . . . are contemplated and areintended to fall within the scope of the hereto appended claims.

Furthermore, various embodiments are described herein in connection witha subscriber station. A subscriber station can also be called a system,a subscriber unit, mobile station, mobile, remote station, access point,base station, remote terminal, access terminal, user terminal, useragent, or user equipment. A subscriber station may be a cellulartelephone, a cordless telephone, a Session Initiation Protocol (SIP)phone, a wireless local loop (WLL) station, a personal digital assistant(PDA), a handheld device having wireless connection capability, or otherprocessing device connected to a wireless modem.

Moreover, various aspects or features described herein may beimplemented as a method, apparatus, or article of manufacture usingstandard programming and/or engineering techniques. The term “article ofmanufacture” as used herein is intended to encompass a computer programaccessible from any computer-readable device, carrier, or media. Forexample, computer readable media can include but are not limited tomagnetic storage devices (e.g., hard disk, floppy disk, magnetic strips. . . ), optical disks (e.g., compact disk (CD), digital versatile disk(DVD) . . . ), smart cards, and flash memory devices (e.g., card, stick,key drive . . . ).

Referring now to the drawings, FIG. 1 illustrates a wirelesscommunication system 100 in accordance with various embodimentspresented herein. System 100 can comprise one or more access point(s)102 that receive, transmit, repeat, etc., wireless communication signalsto each other and/or to one or more mobile devices 104. Access point(s)102 can represent an interface between wireless system 100 and a wirednetwork (not shown).

Each access point 102 can comprise a transmitter chain and a receiverchain, each of which can in turn comprise a plurality of componentsassociated with signal transmission and reception (e.g., processors,modulators, multiplexers, demodulators, demultiplexers, antennas, . . .). Mobile devices 104 can be, for example, cellular phones, smartphones, laptops, handheld communication devices, handheld computingdevices, satellite radios, global positioning systems, PDAs, and/orother suitable devices for communicating over wireless system 100. Inwireless system 100, the periodic transmission of small data packets(commonly referred to as beacons) from access point 102 can make knownthe presence of wireless system 100 and transmit system 100 information.Mobile devices 104 can sense the beacons and attempt to establish awireless connection to access points 102 and/or to other mobile devices104.

System 100 facilitates seamless transition through various networksand/or protocols to provide a user using mobile device 104 the abilityto take advantage of the available networks and protocols. System 100also automatically affords the user the opportunity to utilize the bestnetwork and/or protocol given the current location or data usage of theuser as well as other users of the network.

A component located in mobile device 104 can operate in conjunction withone or more access point 102 to facilitate monitoring which user is ineach network and can be facilitated though a GPS component and/or WWANcomponent associated with mobile device 104. Alternatively or inaddition, location information can be provided from a WLAN access pointto a WLAN component associated with a mobile device that does notinclude a GPS or other location component(s). The location informationcan be provided to mobile device(s) that do not have locationcapabilities through location information obtained through GPS or WANcapable multi-mode access terminal(s) that are in proximity orcommunication with access point 104 (including receiving andtransmitting beacons).

The location information can be utilized to predict which user is bestsuited to have a transparent handoff to a secondary network. Forexample, in an open area mall a user can be using mobile device 104connected to a general wideband network. Mobile device 104 canseamlessly switch to Bluetooth, a narrower band, etc. as the userapproaches a specific merchant. The network to which the mobile deviceis switched can be a function of the content which the user desirespushed or pulled to mobile device 104.

Since the merchant networks can overlap due to dynamics of a shoppingmall, mobile device 104 can seamlessly switch between the variousmerchant networks autonomously without interaction from the user. System100 allows the networks to cooperate with each other and handoff mobiledevice 104 from one network to another. This can be accomplished with aGPS component that can monitor the location of the user and the desiredcontent to be pushed/pulled to the device.

FIG. 2 is an illustration of a multiple access wireless communicationsystem according to one or more embodiments. Illustrated is a system 200that includes a WLAN associated with a wired local area network (LAN).Access point 102 can be in communication with mobile devices 104. Accesspoint 102 is connected to an Ethernet hub or switch 202 for a LAN.Ethernet hub 202 may be connected to one or more electronic devices 204that can include personal computers, peripheral devices (e.g., facsimilemachines, copiers, printers, scanners, etc.), servers, and the like.Ethernet hub 202 can be connected to a router 206 that transmits datapackets to a modem 208. Modem 208 can transmit data packets to a widearea network (WAN) 210, such as the Internet. System 200 illustrates asingle, simple network configuration. Many additional configurations ofsystem 200 including alternative electronic devices are possible.Although system 200 has been illustrated and describe with reference toa LAN, it is possible that system 200 can utilize other technologiesincluding WWAN and/or WPAN either separately or concurrently.

System 200 can facilitate mobile device 104 seamlessly switching betweenan access point currently being utilized by mobile device 140 to assesspoint 102 associated with system 200. Such transfer to access point 102and to the network supported by access point 102 can be selected toprovide user of mobile device 104 a sought after functionality and canbe a function of the mobile device 104 location or the data the userdesires to access or upload to mobile device 104. By way of example andnot limitation, the wireless device can be coupled to electronicdevice(s) 204 to utilize the WWAN and/or WLAN functionality availablethrough the electronic device(s) 204. Such a transition can be userinitiated or performed autonomously by system 200.

FIG. 3 illustrates a simplified block diagram of an embodiment of amobile device 300. Mobile device 300 can include WWAN (e.g.,Code-Division Multiple Access (CDMA), which is a technology thatutilizes spread-spectrum techniques), WLAN (e.g., IEEE 802.11) and/orrelated technologies. Mobile device 300 can be utilized as a Voice OverInternet Protocol (VoIP) phone. VoIP includes the transmission of voicetelephone conversation through the Internet and/or through IP networks.VoIP can be utilized by mobile device 300 at home or when it is invicinity of a wireless access point (WAP) connected to a broadbandnetwork that provides VoIP services. In other situations, mobile device300 can work as a regular wireless mobile phone while providingcommunication services.

In an embodiment, a WWAN component 302 that provides WWAN functionalityand a WLAN component 304 that provides WLAN functionality are locatedtogether and are capable of communication with a transceiver 308 througha bus 306 or other structures or devices. It should be understood thatcommunication means other than busses could be utilize with thedisclosed embodiments. Transceiver 308 is coupled to one or moreantennas 310 to allow transmission and/or reception by mobile device300. WLAN component 304 can generate voice data provided to transceiver308 for communication. In an embodiment, WWAN functionality component302 and/or WLAN functionality component 304 can be included in aprocessor of mobile device 300. In another embodiment, WWANfunctionality and WLAN functionality can be provided by distinctintegrated circuits. In a further embodiment, WWAN functionality andWLAN functionality can be provided by one or more integrated circuitsincluding functionality that is utilized by both. Mobile device 300 isequipped with connectivity options for the wide area (WWAN) and localarea (WLAN and WPAN) to allow a rich combination of services and userexperiences.

The WLAN functionality component 304 can include an optional WPANfunctionally component 312. Mobile device 300 can connect to either theWWAN or WLAN and WPAN, or to both simultaneously, based upon one or morecriteria that relates to functions of the mobile device. The criteriacan be stored in a memory of the mobile device and a processor cananalyze a network based on the stored criteria. These criteria andrelated connection determination are described with reference to FIG. 4,which illustrates a methodology 400 for determining the type of networkto which mobile device should connect. While, for purposes of simplicityof explanation, the methodologies are shown and described as a series ofacts, it is to be understood and appreciated that the methodologies arenot limited by the order of acts, as some acts may, in accordance withthese methodologies, occur in different orders and/or concurrently withother acts from that shown and described herein. For example, thoseskilled in the art will understand and appreciate that a methodologycould alternatively be represented as a series of interrelated states orevents, such as in a state diagram. Moreover, not all illustrated actsmay be required to implement the following methodologies.

The method starts at 402 with a request by mobile device to access anetwork. The network can be a WWAN, a WLAN, and/or a WPAN. When therequest is sent one or more access points associated with the network(s)can receive the request and respond with network information that caninclude characteristics of each network. For example, mobile device canreceive network type information, bandwidth information, cost ofservice, available applications, signal strength, number of identifiedaccess points, etc.

At about the same time as receiving the network information, mobiledevice can analyze certain criteria, at 406, in order to make adetermination as to what network connection will provide the bestresults for the user of mobile device. For example, the criteria caninclude the bandwidth available to the mobile device based uponbandwidth necessities of the application(s) being utilized by the mobiledevice or applications to be downloaded to the mobile device. In otherembodiments, the criteria can be the cost to the user of mobile deviceof the WWAN and/or WLAN (e.g., the lowest cost service provider). In afurther embodiment, the determination can be based upon theapplication(s) available using the WWAN and/or the WLAN. In additionalembodiments, the criteria can be the best coverage available to themobile device in its current location (e.g., based upon signal strengthor number of identified access points for the WWAN and/or the WLAN).Other embodiments can combine one or more of the above-identifiedcriteria as well as other criteria that can be defined by the user ofmobile device or by the service provider. The criteria can be embodiedin the WWAN functionality component, WLAN functionality component, boththe WWAN functionality component and WLAN functionality component oranother controller residing in the mobile device.

Based upon the criteria analyzed, at 406, mobile device can connect, at408, to the WWAN or the WLAN and WPAN separately. In a furtherembodiment, mobile device can connect to both the WWAN and WLAN and WPANsimultaneously. The determination whether to connect separately orsimultaneously is based upon the analyzed criteria and the bestconnection possible to satisfy the one or more criteria.

The interworking between the WWAN and WLAN (and WPAN) can involvemultiple wireless networking providers, multiple service providers anddatabases of available connectivity options by location, or otherheterogeneous network topologies. For example, the WWAN service providermay maintain an up-to-date database of available networking and servicesby location as new access points are added by network service providersor private entities for WLAN and/or WPAN functionality (e.g., accesspoints provided by private companies or the like). Moreover, in someembodiments, the WWAN can extend its connectivity by exploiting thepresence of a WLAN and/or WPAN multi-hop mesh that is not established bya service provider. In a multi-hop mesh network, small nodes that act assimple routers can be installed. Each node then transmits a low powersignal that can reach other nearby nodes. These nearby nodes transmit toanother node that is nearby. This process can be repeated until the datareaches its final destination.

The combination of these technologies in mobile devices enables newtypes of usage models and services that are not available from eachtechnology (WWAN, WLAN, and/or WPAN) individually. These applicationscreated by the interactions between WWAN and WLAN technologies can beclassified into a number of areas. For example, these technologies canbe classified into location-based services, timing based services,and/or topology based services. Location based services can includeemergency situations where the location of a mobile device user needs tobe ascertained to provide such emergency services, however theembodiments described herein are not limited to emergency services. Forexample, users of mobile devices (end user) may desire location basedbilling services. These types of services include those services inwhich users are billed at different rates depending upon the location ofthe user. For example, the user might have one rate if the user is athome and a different rate when the user is in the office (or other workplace) or at an Internet kiosk or café. In another embodiment, locationinformation can be utilized to provide multimedia content that can bedownloaded to the mobile device. This multimedia content can be locationdependent based upon whether the user is in a sports stadium or ashopping mall for which different multimedia content can be provided.

Referring now to FIG. 5, illustrated is a simplified block diagram ofanother embodiment of a mobile device 500. In an embodiment, WWANcomponent 502 that provides WWAN functionality and WLAN component 504that provides WLAN functionality are located within mobile device 500and are capable of communication with transceiver 508 through a bus 506or other structures or devices. Transceiver 508 is coupled to one ormore antennas 510 to allow transmission and reception by mobile device500. The WLAN functionality component 504 can include an optional WPANfunctionality component 512. In addition, a Global Positioning Service(GPS) functionality component 514 can be provided to allow forpositional and/or timing based functionality. A number of applicationsutilizing the position or location information and timing basedfunctionality can be provided.

For example, in a retail mall or shopping center (indoor and/oroutdoor), retail establishments may have access points that aremaintained by the same or different service providers. As a user walksaround the mall, different access points may pick up the user at thesame time. Since there may be some overlap of the WLANs because of thelocation of the retail establishments, the precise or an approximatelocation of the user can be established through a GPS component or otherlocating means. If the user is close to a music store or video kiosk,etc. the user can receive an offer from the retail establishment to buya movie or music. The retail establishment can recommend the offer byutilizing the location of the user, since the system(s) know where theuser is located. The offer can also be based on a user preference thatwas previous established by the user, either internally in the mobiledevice or externally by the service provider. The user can chose to takeadvantage of the offer or to reject the offer. It is to be understoodthat if a user preference is known, certain retail establishments can beprevented from offering unwanted services to the user.

If the user chooses to download a movie, for example, the user canaccess a WAN and pay for the movie with a credit card and/or apre-established payment method (e.g., e-wallet). After confirmation ofthe payment, the user can receive the selected movie along with therights, management, and other features associated with owning theparticular movie. Different networks may be used to deliver the rightsand the content. In one scenario, the rights may be delivered using aWWAN while the content itself is accessed through the WLAN. The actualservice (e.g., movie) can be accessed through the WLAN or WWAN,depending on the requirements. A DVD, for example, can be downloaded tothe mobile device through the WLAN because of the data throughput.Determination of which functionality to utilize to upload the data canbe decided by a WWAN component that provides WWAN functionality, a WLANcomponent that provides WLAN functionality, or a combination of both aWWAN component and a WLAN component. The determination can also be madeby a controller or processor associated with the mobile device.

FIG. 6 illustrates a methodology 600 for locating a call received from auser of a mobile device that utilizes a GPS functionality component. Themethod begins at 602 when a call is initiated by user of mobile device.This call can be an emergency phone call (e.g., 911 call) or it can be acall that is non-emergency. In an embodiment, when the call isinitiated, at 602, a signaling message based on a session initiationprotocol (SIP) can carry the location information supplied by the GPSfunctionality component. The SIP is a signaling protocol that can beutilized for initiating, modifying, and terminating an interactive usersession that can include optional multimedia elements, such as Internetconferencing, telephone, event notification, video, instant messaging,online games, and/or virtual reality. The location information can becarried, at 604, to a VoIP Call Agent, for example. Thus, if anemergency situation arises, the VoIP call agent has the locationinformation and knows the location of the caller. The VoIP call agentcan supply this information to the appropriate agencies, at 606. This isuseful when the caller does not know the calling location and/or cannotcommunicate such information to the call recipient.

In another embodiment, the call can be made outside the coverage area ofthe user's home network/WLAN. For example, the WLAN AP may be located ina user's home and the user may be talking on a mobile phone in suchuser's backyard. As the user is talking the user may be walking aroundand wander (intentionally and/or unintentionally) onto the coverage areaserviced by a different WLAN. In another embodiment, the user may takethe mobile phone to a distant location (e.g., friend's house, relative'shouse, school).

In another embodiment, a call is initiated, at 602. If the mobile deviceis in a location that has broadband access through a wireless accesspoint (WAP), the mobile device utilizes such broadband access, at 608.The location of the mobile device can be provided, at 610, during thecall, through a transceiver that can transmit the location informationobtained utilizing the WWAN interface of the device. Voice data,generated by a WLAN functionality, can be provided to the transceiverfor communication that is sent with the location information. Thismethodology can be utilized, for example, in a school or educationalsetting where a child can use a handset to make an emergency (ornon-emergency) call. The handset can take advantage of the broadbandaccess provided by the school and/or other facility to locate the user(child) and provide the information to the call recipient (e.g. police,fire department). Thus, the child (or other person) can be locatedwithout such child needing to communicate location information.

With reference now to FIG. 7, illustrated is a methodology 700 forlocating a wireless device (e.g., mobile phone) that does not utilize aGPS receiver or GPS component that provides GPS functionality. Singlemode access terminals are those that have a single functionality such asWLAN or WPAN. For example, mobile phones that handle VoIP in a homegenerally do not utilize embedded GPS technology. However, in somesituations (e.g., emergency) it may still be important to determine thelocation of a mobile device that does not have GPS technology. Even whenthe device is away from the home because the user has transported thedevice to different location (e.g., educational facility, friend'shouse), the location of the device can still be determined. Thisdetermination can be based upon the known location of other device(s)that are in the vicinity of the mobile device that does not utilize GPStechnology. The vicinity may include the same access point and/or accesspoints within a certain geographic area of the access point utilized bythe mobile phone without GPS technology.

The location determination begins, at 702, when a call is initiated by auser of a mobile device without GPS technology. The mobile devicecontacts an access point to place the call. The access point can have alisting or concurrently receive information from dual mode device(s)(e.g., one that utilizes WLAN, WPAN, and/or GPS functionality). The dualmode device(s) can provide its location information to the access pointor to other WLAN stations (user terminals) depending on the mode ofoperation (infrastructure or ad-hoc) through a control or managementmessage. The access point that has the location information from thedual access terminal can broadcast this information in an infrastructurenetwork. Other user terminals in the vicinity of the access point canuse the information for location management, at 708. VoIP accessterminals can use the location information in SIP signaling messages toindicate location information, at 710. The location information can beutilized for location-based services and/or for providing marketingand/or sales messages to the mobile device(s), at 712. If a user is in aretail outlet, such as an outdoor or indoor mall, the locationinformation can also be utilized to provide the user of mobile deviceinformation regarding particular retail information. It should beunderstood that marketing and/or advertising is optional, as shown bythe dotted lines, and may not be utilized with the disclosedembodiments.

The location of a user that is inside a building can be roughlyapproximated because the user enters the building from a particularplace, which is the user's last known coordinate. The last knowncoordinate can be latched or maintained by the access terminal untilsuch time as the user exits the building and a GPS functionality and/orother locating means can be utilized to establish the new location. Whenthe user exits the building or structure, the access terminal willacquire its current position though the GPS or other locating means. Inaddition, there can be a plurality of users who enter the building andthe last known coordinate of each user can be combined to construct arange determination for a particular access point (WLAN) and/or basestation (WAN). The access point (WLAN) can determine its position withrespect to the base station (WAN) and/or with respect to any devicesthat feedback location information to the access point. Thus, eventhought the access point might not have a means to determine its ownlocation, the location information is provided through the mobiledevices that access that access point.

FIG. 8 illustrates a methodology 800 for utilizing access points withina WWAN, WLAN, and/or WPAN network. A mobile device having WWAN and WLANand/or WPAN functionality can receive accurate network timing from, forexample, a GPS receiver that can be located on the mobile device orthrough the pilot signaling of a WWAN. This timing can be utilized forQuality of Service (QoS) and/or handoff management. A mobile device inthe region and/or vicinity of hot spots or multiple access points canreceive a beacon from an access point, at 802. Upon receipt of thebeacon, the mobile device can time stamp the arrival time of the beacon,at 804, utilizing internal GPS functionality or relative to the WWANtiming obtained through the WWAN interface. The beacon information caninclude an access point identifier, access point location, currentnetwork load at the WLAN AP, etc. The stamped arrival time and otherinformation can be sent by the mobile device to a Network Management(NM) system, at 806, through, for example, a WWAN link. The NM systemmaintains a list of the access points and/or arrival times, at 808. Thisinformation can be maintained by a database or memory associated withthe NM system. The NM system for the WWAN and/or WLAN, for example,maintains a list of the detected access points in the area of theWLAN/WPAN, the channels the access points are using and/or their beacontransmission time, and the current load at each AP. The user can utilizethis information in selecting an appropriate AP and/or network to join.

The NM system can send the mobile device, at 810, a listing of theaccess points in the area to which the mobile device can connect. Theaccess point listing can include respective channels and/or beacontransmission times and the current load at the access points as well asother information collected and maintained by the NM system, at 808.

In another embodiment, the mobile device (e.g., access terminal) cantune to each of the access points at beacon times and measure thereceived channel quality information (e.g., SNR). The mobile device canshare the information about the link quality of the current network andother networks with the current AP. This information can be passed tothe NM system, at 808, and can be made accessible to other users. Insuch a manner, handoff management for WLAN/WPAN can be provided. Inaddition or alternatively, this information can be broadcast by eachaccess point through specific signaling and/or through an informationelement beacon. The information element beacon can be utilized by themobile device(s) in the vicinity of the access point to update the NMsystem or neighborhood network information.

In another embodiment, location information can be utilized toseamlessly switch the mobile device between the WWAN and WLAN/WPAN, asillustrated in the methodology 900 of FIG. 9. The method begins, at 902,where location information of a mobile device can be made availablethrough a GPS functionality component or other locating means (e.g.,triangulation, location of other devices in the vicinity, . . . ). At904, an indication that the signal quality available through a WWAN ispoor can be sent to the mobile device. For example, the mobile devicecan indicate that a particular bandwidth and/or signal strength shouldbe available to carry out a particular function and/or satisfy therequirement/quality of service for a particular link for that device andif the link conditions do not meet these requirements and/or qualitylevel, a message can be sent to and/or generated by mobile device. Theinformation regarding system requirements (e.g., bandwidth, signalstrength, . . . ) can be stored in a memory of the mobile device and maybe based upon information provided by a service provider and/or a useras it relates to one or more device application. A processor associatedwith the mobile device can analyze the stored information and determineif the system requirements are satisfied. If the requirements aresatisfied, the device can connect to the current network. If therequirements are not satisfied, the device can search for a network thatsatisfies the device requirements.

For example, the WLAN functionality can detect, at 906, beacons anddetermine the signal strength and/or bandwidth available at the WLANaccess point. This information can be utilized by the mobile device,through a WWAN and/or WLAN functionality component, at 908, for example,to make a determination to switch from WWAN to WLAN if the bandwidthand/or signal strength is superior on the WLAN than on the WWAN. Theinformation can also be utilized to switch from WLAN to WWAN. It shouldbe appreciated that the transition from WLAN to WWAN and/or WWAN to WLANis seamless and the user of such device may not be aware that there hasbeen a switch in the type of network.

In another embodiment, the signal strength and/or bandwidth determined,at 906, can be utilized to couple with other devices, at 910. Forexample, if the mobile device allows connectivity with other devices,the mobile device can be coupled to those other devices. In such amanner, the mobile device utilizes the connection provided through theWLAN. By way of example and not limitation, the wireless device can becoupled to a computer to utilize the WWAN and/or WLAN functionalityavailable through the computer.

FIG. 10 illustrates another embodiment of a methodology 1000 forutilizing location information to automatically enhance service(s) ofthe mobile device. For example, a video telephone call can start on anaccess terminal through a WWAN. Through, for example, insufficientbandwidth on the WWAN, the video and/or graphics resolution may be orbecome poor. Alternatively or in addition, a user can start theconference at an office and during the conference might desire to moveto another location (e.g., home, coffee shop, library, . . . ). Thisincludes the situation where a late-night call is placed to accommodatecallers that are in different time zones. The call can start at onelocation and during the conversation either or both parties can move toa different location. The call can continue without interruptions as theuser(s) change location and the mobile device can be seamlesslyauthenticated as it is moved through different access points and/ornetworks.

When the mobile device moves into the proximity of an access point(e.g., WWAN access point), at 1002, the location information provided bya GPS component or other locating means of the mobile device can be sentto a Network Management (NM) system. The NM system can prompt the accessterminal to look for the access point, at 1004, and provide informationabout the WLAN APs present in the area, their operating channels and thebeacon timings and other information. The access terminal can thensearch for an access point and can lock on to the beacon, at 1006, whichcan be the beacon timing provided by the NM system. At 1008, a handoffcan be performed to switch the device from WWAN to WLAN and/or from WLANto WWAN, for example. Since the WLAN is typically connected to aBroadband network, the call quality can be significantly improved if thecall transmission is redirected to the WLAN. The resolution of video andgraphics can be vastly improved and the mobile device (e.g., accessterminal) can be attached to a computer display to take advantage of thehigh-resolution video call. This makes possible enhanced services, suchas enhanced performance or performance in areas where access waspreviously unavailable.

Alternatively or in addition, in the IEEE 802.11n WLAN standard, timebased scheduling can take place. For example, the access point candeclare a schedule for transmission and/or reception of packets to/fromthe access terminals. The access terminals can receive packets atpredetermined times and can then send packets when the time to sendpackets occurs. These schedules can be communicated and coordinated by aNM system through a WWAN signaling link. The NM system can allocatedifferent access terminals to different access points along with theappropriate schedule information.

In a further embodiment, certain applications can have demanding jitterneeds and may need to receive timing from the network. For example, inVoIP, jitter is the variation in time between packets arriving and canbe caused by network congestion, timing drift and/or route changes. Theaccurate timing available at the mobile device can be utilized forapplications with jitter needs. The access points and the mobile devicecan be driven from a network clock. If the access point does not have anaccurate clock, the mobile device can provide timing to the accesspoint, such as through a GPS component that provides GPS functionality.The access point can make this timing received from the mobile deviceavailable by access terminals that are not dual mode and/or that do nothave timing functionality.

In a further embodiment, the WWAN and WLAN technologies can be utilizedto construct self-configuring ad-hoc networks. Ad-hoc networks canoperate in an infrastructure mode utilizing access points, or can bewireless networks that comprise only stations (e.g., mobile devices) buthave no access points, or a network that utilizes both infrastructuremode (access points) and peer-to-peer mode. Ad-hoc networks can also bereferred to as Independent Basic Service Set (IBSS) Networks.

Ad-hoc networks can have different properties depending upon theapplication scenarios. For example, in certain emergency scenarios(e.g., disasters) different agencies (e.g., fire, police, security, . .. ) might utilize different frequencies so that communications can bemaintained with minimal interruptions. Therefore, these agencies may notbe able to respond effectively or might have difficulty communicatingwith each other. Dual mode access terminals can provide low costcommercial systems that can address the needs of multiple agenciesduring emergency (and routine) situations.

Referring now to FIG. 11, illustrated is a methodology 1100 forproviding an ad-hoc network in situations where there is no availableaccess point. This can be beneficial inside a building where emergencypersonnel, for example, have dual mode access terminals. The methodbegins at 1102 where the terminals located within a building or othercontained area are in the WLAN mode. When a message is initiated at aterminal, the terminal relays all the information it has to accessterminals within its vicinity. Each terminal that receives theinformation relays the information it has (both from the terminal userand from other terminals) to terminals within their respectivevicinities, at 1104. This relay of information between the terminalsforms the IBSS network, at 1106. The information, at 1108, eventuallymakes its way to an access terminal, which can also have a WWANconnection. Thus, a simple implementation in a rapidly changingemergency environment can be formed for the access terminals tobroadcast the information it receives from the user of the terminal aswell as other access terminals in its vicinity. While this can create anon-optimal utilization of bandwidth, it also provides sufficientredundancy allowing the information to eventually be transmitted out ofthe building and received by the appropriate recipient.

In an alternate embodiment, a more sophisticated implementation can useOpen Shortest Path First (OSPF) type of protocol for route construction,as indicated at 1110. OSPF is an interior gateway routing protocoloriginally developed for IP networks. The protocol is based on theshortest part first or link-state algorithm that a router can use tosend routing information to the nodes in a network. The shortest path toeach node can be calculated based on a topography that includes thenodes. However, it should be noted that these protocols might take sometime to converge and may not be suitable in environments where thetopology is constantly changing.

FIG. 12 illustrates an exemplary self-configuring ad-hoc network 1200that can be constructed utilizing WLAN and/or WWAN technologies. Forexample, a metropolitan area can be served by a cluster of WLAN nodesfor applications that should have high bandwidth but do not require highmobility. Generally, backhauling traffic from every LAN node on a fiberlink to the WAN is an expensive proposition, therefore, aself-configuring ad-hoc network can provide a less expensivealternative.

As illustrated, mobile devices 1202 can communicate wirelessly with acluster of WLAN nodes 1204, 1206, 1208. A few nodes 1204, 1206 might beconnected to a fiber backhaul facility 1210 while other node(s) 1208 arenot connected to the fiber backhaul facility 1210. It should beappreciated that while one facility 1210 is shown, the network caninclude more than one facility. The WLAN nodes 1204, 1206, 1208 can beutilized to relay traffic from a mobile device 1202 and/or a sourcenode, such as node 1208 to a node connected by fiber transmissionfacilities, such as nodes 1204 and 1206.

One or more nodes can be a hot spot nodes configured to operate onmultiple WLAN channels simultaneously, such as node 1208. One of thechannels 1212 can be utilized for picking up traffic from the stationsassociated with the node. Another one (or more) channels 1214 can beutilized to perform the relay function. Alternatively, a single channel1216 can be associated with a hot spot node 1204 and the single channel1216 can be utilized to pick up traffic and perform the relayfunctionality.

Configuring the network topology, allocating channels to different nodesand/or making routing decisions should be provided through control,coordination, and communication between the WLAN nodes 1204, 1206, 1208.To achieve this functionality, one or more WLAN nodes can have a WWANfunction built into it, illustrated at node 1206. Dual functionalitymakes available an out of band channel that can be utilized for controlpurposes.

A Network Management (NM) system 1218 can be associated with an ad-hocnetwork 1200 to create an initial topography. The NM system can alsodecide which channels to use 1212, 1214, 1216. Another function of theNM system can be a determination of routing among the nodes 1204, 1206,1208.

By way of example and not limitation, a handset can be provided orobtain information, through the WAN, for example, that a first accesspoint is at its peak or using the majority of its resources at a certaintime and at which frequency. A different access point, in closeproximity to the first access point may reach its peak at a differenttime and/or on a different frequency. With this information, the handsetdoes not have to continuously tune to the channel or frequency utilizedby the second access point because it can already be supplied withinformation about both the first and second access point. In such amanner, the handset knows when to tune and listen for the beacon ofeither access point. It can also determine whether it can move to thedifferent access point and/or frequency utilizing both location andtiming information.

Referring now to FIG. 13 illustrated is a methodology 1300 for utilizingWLAN and/or WWAN technologies to construct a self-configuring ad-hocnetwork similar to that shown and described with reference to FIG. 12.The method begins at 1302 where each node utilizes a WWAN channel toindicate its GPS coordinates, which can be communicated to an NM system.The NM system, having knowledge of the location of each node can createan initial topology, at 1304. The topology is designed to achieve a richconnectivity between the nodes and diverse routes from the nodes to thenode connected to the WAN by fiber. The NM system can also decide thechannels to be used as well as routing, at 1306. The informationpertinent to each node can be downloaded on the WWAN, at 1308. Once thewireless hot spots are activated, further measurements can be collectedat 1310. The received signal strengths can be sent to the NM system, at1312, which can utilize the initial topology and routing to take intoaccount the actual field conditions. In addition, the access point canutilize timing information generated by the WWAN to synchronize itself.

The methodology and system described above is a centralized approach andcan be used for a large network of hot spots with strong QoS needs.Capacity of the network can be maximized while minimizing interference.

FIG. 14 illustrates another embodiment of a methodology 1400 forinitializing neighbor lists on the WWAN control channel to facilitatesynchronization of access terminals. The methodology can be utilized ina self-configuring Wireless Mesh network. The methodology beings, at1402, when the WLAN nodes initialize. At a substantially similar time asthe nodes initialize, they exchange neighbor lists on the WWAN controlchannel, at 1404. These neighbor lists can include information aboutaccess points in the surrounding area and/or mobile devices that areutilizing those access points. For example, the neighbor lists caninclude a timing signal transmitted by the mobile device in response toa communication over a WWAN. A protocol, such as Open Shortest PathFirst (OSPF) can be utilized to exchange neighbor lists and createshortest paths in a distributed manner. The exchange of timing lists, at1404, can include a second timing signal transmitted through a WLAN andbased upon the timing signal sent in response to the communication overthe WWAN. The mobile device or access terminal can utilize the timinginformation generated by the WWAN to self-synchronize, at 1406, forcommunication through the WLAN with one or more other access terminalsbased on the second timing signal. This can be done directly through theclosest WWAN or WLAN access point whose vicinity is known (e.g., fromthe neighbor list or directly through its own WWAN function).Alternatively, it may receive this information from an access terminalwith combined WWAN and WLAN functionality. For example, transmission ofthe timing signal can include sending a timing signal from a firstaccess terminal to one or more other terminals that synchronizes withthe first access terminal.

FIG. 15 illustrates peer-to-peer communication 1500 in a WLAN network.In certain scenarios, individual access terminals 1502 and 1504 cancommunicate with each other using one or more WLAN access points 1506,1508. To improve this communication, timing information from WWAN accesspoints 1508, 1510 can be utilized to synchronize the access terminalclocks. It will be appreciated that some access points can include onlyWLAN functionality 1506 or WWAN functionality 1510 or a combination ofboth WLAN and WWAN functionality 1508.

The timing information can be provided through the WLAN access point, ifthe device has WWAN functionality 1512, 1514 or knowledge of a WWANaccess point. Alternatively, the WWAN functionality on either or bothaccess terminals can be utilized to provide this information to theaccess terminals that can then use the information to communicate overthe WLAN.

FIG. 16 illustrates a methodology 1600 for registration and/orauthentication in an Independent Basic Service Set (IBSS) network. AnIBSS network is an IEEE 802.11-based wireless network that has nobackbone infrastructure. The IBSS network consists of at least twowireless stations. An IBSS network can be referred to as an ad-hocnetwork because it can be constructed quickly with little or noplanning. The WWAN functionality residing at either the access terminalor WLAN access point can be utilized for registration and/orauthentication of the access terminal for communication or access toservices through the WLAN access point.

The method begins, at 1602, where a WWAN functionality at an accessterminal can indicate a device identification or registration message(e.g., device identification residing on a subscriber identity module).The first registration message can include an encryption key. The deviceidentification or registration message can be authenticated through theWWAN from a first access terminal. A second registration message ordevice identification can be transmitted and provided to a WLAN accesspoint or other services, at 1604. The second registration message can bebased on the first registration message. The message to the WLAN can betransmitted through either a backhaul or through an over the air tokenor air interface obtained through the WWAN for the access terminal. Thisalso allows utilizing device specific encryption keys that can beauthenticated through a WWAN system or WLAN system.

The registration/authentication approach is beneficial in a situationwhere a user of an access terminal is in wireless communication with akiosk having WLAN functionality but lacking a broadband or completebackhaul connection to a network, e.g., Internet. In this situation, theauthentication or billing information for sales scenarios (e.g., music,video, or other information) can be provided through the WWAN. Forexample, the user identification whether it is device or user specific(e.g., password or encryption key), can be exchanged throughout theWWAN. This enables the access terminal to obtain a token or otherauthenticator, at 1606. The token or other authenticator can betransmitted over the air to a kiosk, at 1608, allowing the accessterminal to access a video, song, or other multimedia content. In such amanner, access through the WLAN is granted to the access terminal. Itshould be appreciated that after the second registration message istransmitted through the WWAN to the access terminal, a thirdregistration message, based on the second registration message, can besent from the access terminal to the WLAN access point. This thirdregistration message can be sent through various media including an airinterface.

This multimedia content can also be provided based upon the location ofthe mobile device. For example, in a mall, multimedia content can beprovided from one or more retail store or other retail establishmentsbased on the user location as well as a user-preference. Theuser-preference can be a preference previously communicated by the userand stored in a memory of the mobile device. A processor associated withthe mobile device can analyze the information stored in the memory anddetermine if multimedia content should be accepted and communicated tothe user or disregarded and not communicated to the user of the device.In another embodiment, the user-preference can be communicated to aservice provider who maintains the information. For example, if the useris near a sporting goods store and previously specified that such userdoes not desire any information (e.g. current sales or price reductions,events, . . . ) relating to sports and/or sporting goods, theinformation broadcast by that particular store can be prevented frombeing transmitted to the user's mobile device. It should be understoodthat multimedia content is optional and the disclosed embodiments can beutilized without employing multimedia content.

According to another embodiment, ad-hoc WLAN networks can be coupledthrough WWAN. For example, if one or more IBSS networks are discoveredthey can be coupled through a backhaul provided by the WWAN. This mightbe available if one or more WLAN nodes/stations, in a given IBSS, havediscovered or been discovered by an access point of the WWAN. Thisallows connection of WLAN stations, from different IBSSs, through a WWANbackhaul that may have a greater bandwidth or may have access toimproved services. The different IBSSs can provide radio coverage indifferent areas, which can be non-continuous with respect to each other.

According to another embodiment is the ability for multi-cast and/orbroadcast in an IBSS network. Broadcast and multi-cast messages can beprovided through the WWAN backhaul. This can facilitate providingbroadcast or multi-cast messages or data based upon locationinformation. Further, this can provide the ability to transmitsynchronized broadcast or multi-cast messages based upon timinginformation available through the WWAN (e.g., the timing signal from aneighboring WWAN access point can be utilized for timing purposes).

FIG. 17 illustrates an exemplary ad-hoc mesh network 1700. The network1700 is illustrated as an ad-hoc network utilizing four access points orbase stations “A” 1702, “B” 1704, “C” 1706, and “D” 1708. An ad-hoc meshnetwork 1700 can employ any number of access points and four accesspoints is chosen for illustration purposes only. It should be understoodthat an ad-hoc mesh network 1700 can be a network in infrastructure modeutilizing access points (as shown), a peer-to-peer network that does notutilize access points, or a network that utilizes both infrastructuremode (access points) and peer-to-peer mode.

The topology of network 1700 illustrates that access point A 1702 isconnected through wireless communication to access points B 1704, accesspoint C 1706 and/or access point D 1708. A decision relating toefficient links should be established for the access points. Thisdecision can be performed through a wide area control channel whereineach access point sends its GPS coordinate (or other location means) toa central network management (NM) system 1710. NM system 1710 having thelocation of all the access points 1702, 1704, 1706, 1708 in the network1700 determines the network topology and the communication link betweenthe access points 1702, 1704, 1706, 1708. For example, NM network 1710might determine that in the topology access point A 1702 shouldcommunicate with access point B 1704, access point B 1704, shouldcommunicate with access point C 1706, and access point C 1706 shouldcommunicate with access point D 1708. NM system 1710 can also determinewhich channel each access point should use as a function of frequencymanagement. For example, NM system 1710 can determine that access pointA 1702 should use channel A or a 20 MHz channel and that access point B1704 should use a different channel, such as a different 20 MHz channel,etc.

In an ad-hoc network, access points can be deleted or added at any time.However, the communication between the access points should remainconstant to provide a smooth transmission of communication. When a majorevent occurs (disaster, etc.) the entire topology may need to change.Thus, a control channel should be configured to provide adequateconnectivity without excessive interference. Each access point can beconfigured with WLAN functionality, which automatically configures eachaccess point with a permissive channel, allowing anyone to communicatethrough that network management channel. This permissive channelmitigates problems associated with lack of availability of the controlchannel. The channel communicates its coordinates to the NM system 1710.This can be established through any level of bandwidth, and a narrowband WAN channel can be sufficient for this purpose. Once the locationinformation is received, the ad-hoc network can be reconfigured or a newad-hoc network established.

NM system 1710 can also provide the routing of specific packets. The NMsystem 1710 can access each access point 1702, 1704, 1706, 1708 andprovide or download to each access point 1702, 1704, 1706, 1708 arouting table. The routing table can provide routing information forspecific packets or specific types of packets. For example if a voicepacket is to be routed, NM system 1710 (through the routing table) caninstruct the access point that the voice packet is to be routed toaccess point B 1704, then to access point C 1706, then to access point D1708, etc. until the voice packet reaches its final destination. If thepacket is a data packet, the routing might be from access point D 1708to access point B 1704 to access point A 1702. A video packet might takea different route. In such a manner, the NM system 1710 is determiningboth the topology or configuration of the ad-hoc network 1700 and howthe packets are routed in real time. Thus, a WWAN network can providepowerful control and signaling capabilities to manage the ad-hocnetwork(s) 1700 and can provide data paths to make up for connectivitygaps in a WLAN network. It should be understood that the routing and/ortopology discussed is for example purposes and is not meant to limit thedisclosed embodiments.

NM system 1710 can take into account traffic sensitivity to determinepacket routing. For example, links can be reestablished during certaintimes of the day, week, etc. NM system 1710 can monitor the trafficduring potentially peak times (e.g. morning rush hour, evening rushhour, . . . ). During such times, there can be a certain flow of trafficand the routing or links can be set-up and/or changed on demand, with ahigh level of flexibility.

In a network that is operating in a peer-to-peer mode (no access points)or a combination of infrastructure mode and a peer-to-peer mode, thehandsets are utilized to establish the network, or a portion of thenetwork. In such a situation, a NM system might not be utilized sincethe configuration of the network can change quickly. In this situation,each handset broadcasts its information and the handsets that receivethe information would rebroadcast the information to other handsets.This passing off or rebroadcast of the information would continue untilthe information reaches its destination. In such a peer-to-peer ad-hocnetwork, a first handset A might communicate to handset B utilizingWLAN. Handset B might communicate with handset C utilizing WWAN. Thehandsets can communicate utilizing mixed modes or sets, provided thehandsets have WWAN, WWAN, WPAN, Wi-Fi, etc. functionality.

With reference now to FIG. 18, illustrated is a system 1800 thatfacilitates coordinated communication between multiple communicationprotocols in a wireless communication environment in accordance with oneor more of the disclosed embodiments. System 1800 can reside in anaccess point and/or in a user device. System 1800 comprises a receiver1802 that can receive a signal from, for example, a receiver antenna.The receiver 1802 can perform typical actions thereon, such asfiltering, amplifying, downconverting, etc. the received signal. Thereceiver 1802 can also digitizes the conditioned signal to obtainsamples. A demodulator 1804 can obtain received symbols for each symbolperiod, as well as provide received symbols to a processor 1806.

Processor 1806 can be a processor dedicated to analyzing informationreceived by receiver component 1802 and/or generating information fortransmission by a transmitter 1816. Processor 1806 control one or morecomponents of user device 1800, and/or processor 1806 that analyzesinformation received by receiver 1802, generates information fortransmission by transmitter 1816 and controls one or more components ofuser device 1800. Processor 1806 may include a controller componentcapable of coordinating communications with additional user devices.

User device 1800 can additionally comprise memory 1808 that isoperatively coupled to processor 1806 and that stores informationrelated to coordinating communications and any other suitableinformation. Memory 1808 can additionally store protocols associatedwith coordinating communication. It will be appreciated that the datastore (e.g., memories) components described herein can be eithervolatile memory or nonvolatile memory, or can include both volatile andnonvolatile memory. By way of illustration, and not limitation,nonvolatile memory can include read only memory (ROM), programmable ROM(PROM), electrically programmable ROM (EPROM), electrically erasable ROM(EEPROM), or flash memory. Volatile memory can include random accessmemory (RAM), which acts as external cache memory. By way ofillustration and not limitation, RAM is available in many forms such assynchronous RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM),double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), SynchlinkDRAM (SLDRAM), and direct Rambus RAM (DRRAM). The memory 1808 of thesubject systems and/or methods is intended to comprise, without beinglimited to, these and any other suitable types of memory. User device1800 still further comprises a symbol modulator 1810 and a transmitter1812 that transmits the modulated signal.

FIG. 19 is an illustration of a system 1900 that facilitatescoordination of communication protocols in accordance with variousaspects. System 1900 comprises a base station or access point 1902. Asillustrated, base station 1902 receives signal(s) from one or more userdevices 1904 by a receive antenna 1906, and transmits to the one or moreuser devices 1904 through a transmit antenna 1908.

Base station 1902 comprises a receiver 1910 that receives informationfrom receive antenna 1906 and is operatively associated with ademodulator 1912 that demodulates received information. Demodulatedsymbols are analyzed by a processor 1914 that is coupled to a memory1916 that stores information related to code clusters, user deviceassignments, lookup tables related thereto, unique scrambling sequences,and the like. A modulator 1918 can multiplex the signal for transmissionby a transmitter 1920 through transmit antenna 1908 to user devices1904.

FIG. 20 illustrates an exemplary wireless communication system 2000.Wireless communication system 2000 depicts one base station and oneterminal for sake of brevity. However, it is to be appreciated thatsystem 2000 can include more than one base station or access pointand/or more than one terminal or user device, wherein additional basestations and/or terminals can be substantially similar or different forthe exemplary base station and terminal described below. In addition, itis to be appreciated that the base station and/or the terminal canemploy the systems and/or methods described herein to facilitatewireless communication there between.

Referring now to FIG. 20, on a downlink, at access point 1905, atransmit (TX) data processor 2010 receives, formats, codes, interleaves,and modulates (or symbol maps) traffic data and provides modulationsymbols (“data symbols”). A symbol modulator 2015 receives and processesthe data symbols and pilot symbols and provides a stream of symbols. Asymbol modulator 2015 multiplexes data and pilot symbols and obtains aset of N transmit symbols. Each transmit symbol may be a data symbol, apilot symbol, or a signal value of zero. The pilot symbols may be sentcontinuously in each symbol period. The pilot symbols can be frequencydivision multiplexed (FDM), orthogonal frequency division multiplexed(OFDM), time division multiplexed (TDM), frequency division multiplexed(FDM), or code division multiplexed (CDM).

A transmitter unit (TMTR) 2020 receives and converts the stream ofsymbols into one or more analog signals and further conditions (e.g.,amplifies, filters, and frequency upconverts) the analog signals togenerate a downlink signal suitable for transmission over the wirelesschannel. The downlink signal is then transmitted through an antenna 2025to the terminals. At terminal 2030, an antenna 2035 receives thedownlink signal and provides a received signal to a receiver unit (RCVR)2040. Receiver unit 2040 conditions (e.g., filters, amplifies, andfrequency downconverts) the received signal and digitizes theconditioned signal to obtain samples. A symbol demodulator 2045 obtainsN received symbols and provides received pilot symbols to a processor2050 for channel estimation. Symbol demodulator 2045 further receives afrequency response estimate for the downlink from processor 2050,performs data demodulation on the received data symbols to obtain datasymbol estimates (which are estimates of the transmitted data symbols),and provides the data symbol estimates to an RX data processor 2055,which demodulates (e.g., symbol demaps), deinterleaves, and decodes thedata symbol estimates to recover the transmitted traffic data. Theprocessing by symbol demodulator 2045 and RX data processor 2055 iscomplementary to the processing by symbol modulator 2015 and TX dataprocessor 1910, respectively, at access point 2005.

On the up link, a TX data processor 2060 processes traffic data andprovides data symbols. A symbol modulator 2065 receives and multiplexesthe data symbols with pilot symbols, performs modulation, and provides astream of symbols. A transmitter unit 2070 then receives and processesthe stream of symbols to generate an uplink signal, which is transmittedby the antenna 2035 to the access point 2005.

At access point 2005, the uplink signal from terminal 2030 is receivedby the antenna 2025 and processed by a receiver unit 2075 to obtainsamples. A symbol demodulator 2080 then processes the samples andprovides received pilot symbols and data symbol estimates for theuplink. An RX data processor 2085 processes the data symbol estimates torecover the traffic data transmitted by terminal 2030. A processor 2090performs channel estimation for each active terminal transmitting on theuplink.

Processors 2090 and 2050 direct (e.g., control, coordinate, manage,etc.) operation at access point 2005 and terminal 2030, respectively.Respective processors 2090 and 2050 can be associated with memory units(not shown) that store program codes and data. Processors 2090 and 2050can also perform computations to derive frequency and impulse responseestimates for the uplink and downlink, respectively.

For a multiple-access system (e.g., FDMA, OFDMA, CDMA, TDMA, etc.),multiple terminals can transmit concurrently on the uplink. For such asystem, the pilot subbands may be shared among different terminals. Thechannel estimation techniques may be used in cases where the pilotsubbands for each terminal span the entire operating band (possiblyexcept for the band edges). Such a pilot subband structure would bedesirable to obtain frequency diversity for each terminal. Thetechniques described herein may be implemented by various means. Forexample, these techniques may be implemented in hardware, software, or acombination thereof For a hardware implementation, the processing unitsused for channel estimation may be implemented within one or moreapplication specific integrated circuits (ASICs), digital signalprocessors (DSPs), digital signal processing devices (DSPDs),programmable logic devices (PLDs), field programmable gate arrays(FPGAs), processors, controllers, micro-controllers, microprocessors,other electronic units designed to perform the functions describedherein, or a combination thereof. With software, implementation can bethrough modules (e.g., procedures, functions, and so on) that performthe functions described herein. The software codes may be stored inmemory unit and executed by the processors 2090 and 2050.

It is to be understood that the embodiments described herein may beimplemented by hardware, software, firmware, middleware, microcode, orany combination thereof. When the systems and/or methods are implementedin software, firmware, middleware or microcode, program code or codesegments, they may be stored in a machine-readable medium, such as astorage component. A code segment may represent a procedure, a function,a subprogram, a program, a routine, a subroutine, a module, a softwarepackage, a class, or any combination of instructions, data structures,or program statements. A code segment may be coupled to another codesegment or a hardware circuit by passing and/or receiving information,data, arguments, parameters, or memory contents. Information, arguments,parameters, data, etc. may be passed, forwarded, or transmitted usingany suitable means including memory sharing, message passing, tokenpassing, network transmission, etc.

For a software implementation, the techniques described herein may beimplemented with modules (e.g., procedures, functions, and so on) thatperform the functions described herein. The software codes may be storedin memory units and executed by processors. The memory unit may beimplemented within the processor or external to the processor, in whichcase it can be communicatively coupled to the processor through variousmeans as is known in the art.

What has been described above includes examples of one or moreembodiments. It is, of course, not possible to describe everyconceivable combination of components or methodologies for purposes ofdescribing the aforementioned embodiments, but one of ordinary skill inthe art may recognize that many further combinations and permutations ofvarious embodiments are possible. Accordingly, the described embodimentsare intended to embrace all such alterations, modifications andvariations that fall within the spirit and scope of the appended claims.Furthermore, to the extent that the term “includes” is used in eitherthe detailed description or the claims, such term is intended to beinclusive in a manner similar to the term “comprising” as “comprising”is interpreted when employed as a transitional word in a claim.

1. A method for interworking in a wireless communication system,comprising: detecting presence of a wireless wide area network (WWAN)and a collocated one or more of a wireless local area network (WLAN) ora wireless personal area network (WPAN); selecting a wireless networkfrom one of the WLAN or the WPAN for conducting a wireless transaction,wherein the selected wireless network comprises a network lacking abackbone infrastructure; wirelessly transmitting a first registrationmessage from a mobile device to the WWAN requesting access informationfor the selected wireless network; receiving a second registrationmessage from the WWAN, the second registration message comprising atoken containing access information for the selected wireless network;transmitting the token from the mobile device to the selected wirelessnetwork to gain access to the selected wireless network; and conductingat least a part of the wireless transaction using the accessed selectedwireless network, wherein selecting the wireless network furthercomprises selecting based on a number of access points associated withthe selected wireless network, wherein the at least the part of thewireless transaction comprises multimedia content based on a userpreference, and wherein the user preference is maintained by theselected wireless network.
 2. The method of claim 1, the firstregistration message comprising an encryption key.
 3. The method ofclaim 1, further comprising: transmitting data of a first type to theWWAN; and receiving data of a second type from the selected wirelessnetwork.
 4. The method of claim 3, wherein data of the first typecomprises billing information and data of the second type comprises themultimedia content.
 5. The method of claim 1, further comprisingconducting at least another part of the wireless transaction using theWWAN.
 6. The method of claim 1, wherein selecting the wireless networkfurther comprises selecting based on available applications associatedwith the selected wireless network.
 7. The method of claim 1, whereinthe selecting is further based at least in part on one or more of avendor type and a location of a content vendor.
 8. The method of claim1, wherein selecting the wireless network further comprises selectingbased on a type of content being provided by the selected wirelessnetwork.
 9. The method of claim 1, wherein the selected wireless networkcomprises an ad hoc network.
 10. The method of claim 1, wherein theselected wireless network comprises an Independent Basic Service Set(IBSS) network.
 11. The method of claim 1, wherein the multimediacontent is based upon a location of the mobile device.
 12. Anon-transitory computer-readable medium having stored thereoncomputer-executable instructions, comprising: instructions for detectingpresence of a wireless wide area network (WWAN) and a collocated one ormore of a wireless local area network (WLAN) or a wireless personal areanetwork (WPAN); instructions for selecting a wireless network from oneof the WLAN or the WPAN for conducting a wireless transaction, whereinthe selected wireless network comprises a network lacking a backboneinfrastructure; instructions for sending a first registration messagefrom a mobile device to the WWAN requesting access information for theselected wireless network; instructions for receiving a secondregistration message from the WWAN, the second registration messagecomprising a token containing access information for the selectedwireless network; instructions for transmitting the token to theselected wireless network to gain access to the selected wirelessnetwork; and instructions for conducting at least a part of the wirelesstransaction using the accessed selected wireless network, wherein theinstructions for selecting the wireless network further compriseselecting based on a number of access points associated with theselected wireless network.
 13. The non-transitory computer-readablemedium of claim 12, further comprising: transmitting data of a firsttype to the WWAN; and receiving data of a second type from the selectedwireless network.
 14. The non-transitory computer-readable medium ofclaim 13, wherein data of the first type comprises billing informationand data of the second type comprises the multimedia content.
 15. Thenon-transitory computer readable medium of claim 12, further comprisinginstructions for conducting at least another part of the wirelesstransaction using the WWAN.
 16. The non-transitory computer readablemedium of claim 12, wherein the instructions for selecting the wirelessnetwork further comprise selecting based on available applicationsassociated with the selected wireless network.
 17. The non-transitorycomputer readable medium of claim 12, wherein the selecting is furtherbased at least in part on one or more of a vendor type and a location ofa content vendor.
 18. The non-transitory computer readable medium ofclaim 12, wherein the instructions for selecting the wireless networkfurther comprise selecting based on a type of content being provided bythe selected wireless network.
 19. The non-transitory computer-readablemedium of claim 12, wherein the selected wireless network comprises anad hoc network.
 20. The non-transitory computer-readable medium of claim12, wherein the selected wireless network comprises an Independent BasicService Set (IBSS) network.
 21. An apparatus for interworking in awireless communication system, comprising: a processor operable todetect presence of a wireless wide area network (WWAN) and a collocatedone or more of a wireless local area network (WLAN) or a wirelesspersonal area network (WPAN); and select a wireless network from one ofthe WLAN or the WP AN for conducting a wireless transaction, wherein theselected wireless network comprises a network lacking a backboneinfrastructure; a transmitter for wirelessly transmitting a firstregistration message from a mobile device to the WW AN requesting accessinformation for the selected wireless network; and a receiver operableto receive a second registration message from the WWAN, the secondregistration message comprising a token containing access informationfor the selected wireless network, wherein the transmitter furtheroperable to transmit the token to the selected wireless network to gainaccess to the selected wireless network, wherein the processor isfurther operable to conduct at least a part of the wireless transactionusing the accessed selected wireless network, wherein the processor isfurther operable to select the wireless network based on a number ofaccess points associated with the selected wireless network, wherein theat least the part of the wireless transaction comprises multimediacontent based on a user preference, and wherein the user preference ismaintained by the selected wireless network.
 22. The apparatus of claim21, wherein the transmitter is further for transmitting data of a firsttype to the WW AN and the receiver is further for transmitting data of asecond type to the selected wireless network.
 23. The apparatus of claim22, wherein data of the first type comprises billing information anddata of the second type comprises the multimedia content.
 24. Theapparatus of claim 21, wherein the processor further operable to conductat least another part of the wireless transaction using the WWAN. 25.The apparatus of claim 21, wherein the processor is further operable toselect the wireless network based on available applications associatedwith the selected wireless network.
 26. The apparatus of claim 21,wherein the selecting is further based at least in part on one or moreof a vendor type and a location of a content vendor.
 27. The apparatusof claim 21, wherein the processor is further operable to select thewireless network based on a type of content being provided by theselected wireless network.
 28. The apparatus of claim 21, wherein theselected wireless network comprises an ad hoc network.
 29. The apparatusof claim 21, wherein the selected wireless network comprises anIndependent Basic Service Set (IBSS) network.
 30. An apparatus forregistration in a wireless communication system, comprising: means fordetecting presence of a wireless wide area network (WWAN) and acollocated one or more of a wireless local area network (WLAN) or awireless personal area network (WPAN); means for selecting a wirelessnetwork from one of the WLAN or the WPAN for conducting a wirelesstransaction, wherein the selected wireless network comprises a networklacking a backbone infrastructure; means for wirelessly transmitting afirst registration message from a mobile device to a WWAN requestingaccess information for the selected wireless network; means forreceiving a second registration message from the WWAN, the secondregistration message comprising a token containing access informationfor the selected wireless network; means for transmitting the token fromthe mobile device to the selected wireless network to gain access to theselected wireless network; and means for conducting at least a part ofthe wireless transaction using the accessed selected wireless network,wherein the means for selecting the wireless network is further operableto select based on a number of access points associated with theselected wireless network, wherein the at least the part of the wirelesstransaction comprises multimedia content based on a user preference, andwherein the user preference is maintained by the selected wirelessnetwork.
 31. The apparatus of claim 30, wherein the means fortransmitting is further for transmitting data of a first type to theWWAN and the means for receiving is further for transmitting data of asecond type to the selected wireless network.
 32. The apparatus of claim31, wherein data of the first type comprises billing information anddata of the second type comprises the multimedia content.
 33. Theapparatus of claim 30, further comprising means for conducting at leastanother part of the wireless transaction using the WWAN.
 34. Theapparatus of claim 30, wherein the means for selecting the wirelessnetwork is further operable to select based on available applicationsassociated with the selected wireless network.
 35. The apparatus ofclaim 30, wherein the selecting is further based at least in part on oneor more of a vendor type and a location of a content vendor.
 36. Theapparatus of claim 30, wherein the means for selecting the wirelessnetwork is further operable to select based on a type of content beingprovided by the selected wireless network.
 37. The apparatus of claim30, wherein the selected wireless network comprises an ad hoc network.38. The apparatus of claim 30, wherein the selected wireless networkcomprises an Independent Basic Service Set (IBSS) network.
 39. Aprocessor that executes instructions for interworking in a wirelesscommunication system, comprising: detecting presence of a wireless widearea network (WWAN) and a collocated one or more of a wireless localarea network (WLAN) or a wireless personal area network (WPAN);selecting a wireless network from one of the WLAN or the WPAN forconducting a wireless transaction, wherein the selected wireless networkcomprises a network lacking a backbone infrastructure; wirelesslytransmitting a first registration message from a mobile device to theWWAN requesting access information for the selected wireless network;receiving a second registration message from the WWAN, the secondregistration message comprising a token containing access informationfor the selected wireless network; transmitting the token from themobile device to the selected wireless network to gain access to theselected wireless network; and conducting at least a part of thewireless transaction using the accessed selected wireless network,wherein selecting the wireless network further comprises selecting basedon a number of access points associated with the selected wirelessnetwork, wherein the at least the part of the wireless transactioncomprises multimedia content based on a user preference, and wherein theuser preference is maintained by the selected wireless network.
 40. Theprocessor of claim 39, wherein the first registration message comprisesan encryption key.
 41. The processor of claim 39, further comprising:transmitting data of a first type to the WWAN; and receiving data of asecond type from the selected wireless network.
 42. The processor ofclaim 41, wherein data of the first type comprises billing informationand data of the second type comprises the multimedia content.
 43. Theprocessor of claim 39, further comprising conducting at least anotherpart of the wireless transaction using the WWAN.
 44. The processor ofclaim 39, wherein selecting the wireless network further comprisesselecting based on available applications associated with the selectedwireless network.
 45. The processor of claim 39, wherein the selectingis further based at least in part on one or more of a vendor type and alocation of a content vendor.
 46. The processor of claim 39, wherein theselecting is further based on a type of content being provided by theselected wireless network.
 47. The processor of claim 39, wherein theselected wireless network comprises an ad hoc network.
 48. The processorof claim 39, wherein the selected wireless network comprises anIndependent Basic Service Set (IBSS) network.