Playback Device Connection

ABSTRACT

Techniques for automatically configuring necessary parameters of a device to be coupled to a network with minimum human intervention are disclosed. In one embodiment, a wired and/or wireless Ad-hoc network is established to facilitate communications among a group of devices. When a new device is added to the network, a rudimentary communication path is initially established between one of the devices in the network and the new device such that necessary parameters (e.g., SSID, WEP security, channel frequency) can be exchanged for the new device to function properly in the network. To ensure the parameters are exchanged in a secure fashion, an additional public security procedure can be used between the two devices.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. application Ser. No.14/486,667, filed on Sep. 15, 2014; U.S. application Ser. No. 14/486,667is a continuation of U.S. application Ser. No. 13/618,829, filed on Sep.14, 2012, and issued Oct. 21, 2014, as U.S. Pat. No. 8,868,698; U.S.application Ser. No. 13/618,829 is a continuation of U.S. applicationSer. No. 11/147,116 filed on Jun. 6, 2005, and issued Dec. 4, 2012, asU.S. Pat. No. 8,326,951; U.S. application Ser. No. 11/147,116 claimspriority to provisional application 60/577,284 filed Jun. 5, 2004, andwhich is now expired. The entire contents of the Ser. Nos. 14/486,667;13/618,829; 11/147,116; and 60/577,284 applications are incorporatedherein by reference.

BACKGROUND Field of the Invention

The invention is generally related to the area of multimediatechnologies in consumer electronics industry. More particularly, theinvention is related to techniques for connecting various devices to anetwork for secure communications with a minimum of human interactionand technical ability.

The Background of Related Art

Consumer electronics devices that operate using wireless or wiredEthernet standards are often subject to the same complicated set-upprocess as a wireless computer network. Typically, the person who setsup the wireless network must have at least some knowledge about IP(Internet Protocol) networking and Ethernet (e.g., 802.3, 802.11), suchas addressing, security, broadcast, unicast, etc. Such a skillrequirement is generally acceptable for computer-to-computer networks,which is typically done by an IT professional. However, it isimpractical to require average consumers to have such knowledge to hookup consumer electronic devices, such as home entertainment products thatuse wireless/wired Ethernet connectivity.

FIG. 5 shows an exemplary setting 500 for connecting a computer to awireless network. The setting 500 is typically displayed when a user isready to connect the computer to a wireless network so that the user canenter relevant information in the setting 500. Although the setting 500requires very little information to make the computer connected to thenetwork, the information is relatively technical to the averageconsumers. First, the user has to know what type of network the computeris going to be connected to. There are two choices 502, Access Point(infrastructure) and Computer-to-computer (Ad Hoc). The distinctionbetween these two types of network is a common knowledge to the ITprofessionals yet can be a difficult question to the average consumers.Further even if the user knows the difference, there are more questionsor options related to the security settings in 504, which evidentlyrequires some good understanding about the network security over thewireless network.

For home entertainment products, there is a clear need to create simplemethods of setting up and maintaining a secure wireless/wired in-homenetwork with minimum human interventions.

SUMMARY OF THE INVENTION

This section is for the purpose of summarizing some aspects of thepresent invention and to briefly introduce some preferred embodiments.Simplifications or omissions in this section as well as in the abstractor the title of this description may be made to avoid obscuring thepurpose of this section, the abstract and the title. Suchsimplifications or omissions are not intended to limit the scope of thepresent invention.

In general, the present invention pertains to techniques forautomatically configuring necessary parameters of a device to be coupledto a network. According to one aspect of the present invention, anAd-hoc (wireless or wired) network is established to facilitatecommunications among a group of devices. When a new device is added tothe network, a rudimentary communication path is initially establishedbetween one of the devices in the network (“first device”) and the newdevice (“second device”) such that necessary parameters (e.g., SSID, WEPsecurity, channel frequency) can be exchanged for the second device tofunction properly in the network. To ensure the parameters are exchangedin a secure fashion, an additional public security procedure can be usedbetween the two devices.

According to another aspect of the present invention, a first devicethat may be or may not be the device in the network broadcasts a messageincluding probing datagrams in compliance with the standard IPbroadcast. The rudimentary communication path may be established afterthe second device responds to the message from the first device.According to yet another aspect of the present invention, such anautomatic configuration process is only started when a user is indeedready to do so. In general, a mechanism is provided and accessible bythe user to activate the process. As such, no incident or unwantedconfiguration process could be initiated without the approval of theuser. In one embodiment, the second device is equipped with two buttonsthat must be pressed simultaneously to activate the automaticconfiguration process.

The necessary parameters in the second device are subsequentlyconfigured in several exchanges of messages with the first device. Atleast some of the messages are encrypted. As a result, the second deviceis automatically configured to operate correctly in the network with aminimum of human intervention and technical ability. In an exemplaryapplication of the present invention for an audio system with acontroller and multiple zone players, an Ad-hoc network is formed amongthe controller and the zone players, where the network may be wired orwireless or a mixture of both. In one case, either a handheld controlleror a zone player (referred to as an access device) is coupled to anaccess point of a LAN. An Ad-hoc network can be thus formed based on theaccess device. The remaining (unconfigured) zone players may be coupledto the network whenever desired, all with minimum human intervention. Asa result, any one of the zone players may communicate with each other toshare or distribute audio sources available on the Internet andreproduce sounds together or separately.

The present invention may be implemented in many forms includingsoftware, hardware or a combination of both as method, process, orsystem. According to one embodiment of the present invention, thepresent invention is a method for providing a first device and a seconddevice for the network, activating the second device intentionally toautomatically configure necessary parameters with the first device,establishing automatically a rudimentary communication path between thefirst device and the second device by scanning all availabletransmission channels allocated in accordance with a protocol; andexchanging messages between the first device and the second device overthe rudimentary communication path till the second device is fullyoperating with the first device.

According to another embodiment of the present invention, the presentinvention is a system for establishing a network for a group of devices,the system comprises at least one of the devices provided to remotelycontrol operations of one or more of the other devices, one of thedevices (hereinafter “first device”) configured to establishautomatically respective rudimentary communication paths for probingcommunication, each of the rudimentary communication paths being withone of the other devices, wherein an automatic configuration processtakes place only in one of the other devices after the user authorizesthe one of the other devices to start the automatic configurationprocess, and wherein the automatic configuration process causes severalmessages to be exchanged between the first device and one of the otherdevices, some of the messages carry information pertaining to anappropriate transmission channel, an identifier of the network and asecurity key for subsequent communication, the some of the messages areencrypted.

According to yet another embodiment of the present invention, thepresent invention is a system for establishing a network for a group ofdevices, the system comprises a plurality of zone players, each equippedwith a mechanism that is once manually activated by a user, an automaticconfiguration process starts, wherein one of the zone players is coupledto a local area network as an access device; and at least a controllerprovided to remotely control operations of one or more of the zoneplayers, wherein the access device establishes automatically respectiverudimentary communication paths, each with the controller or one of theremaining zone players, the automatic configuration process takes placesin the controller and each of the remaining zone players after the usermanually activates the automatic configuration process respectively inthe controller and each of the remaining zone players, and wherein theautomatic configuration process causes several messages to be exchangedbetween the access device and any one of the controller and theremaining zone players that have been activated for the automaticconfiguration process, some of the messages carry information pertainingto a transmission channel, an identifier of the network and a securitykey for subsequent communication, at least some of the messages areencrypted.

According to still another embodiment of the present invention, thepresent invention is a software product to be executable in a device forestablishing a network for a group of devices, the software productcomprises program code for activating a second device, when requested,to automatically configure necessary parameters with a first device,program code for establishing automatically a rudimentary communicationpath with the first device by scanning all available transmissionchannels allocated in accordance with a protocol, and program code forexchanging messages between the first device and the second device overthe rudimentary communication path till the second device is fullyoperating with the first device.

According to still another embodiment of the present invention, thepresent invention is a method for establishing a network for a group ofdevices, the method comprises providing a plurality of zone players,each equipped with a mechanism that once is manually activated by auser, an automatic configuration process starts, wherein at least acontroller is provided to remotely control operations of one or more ofthe zone players; coupling one of the zone players to a local areanetwork as an access device; establishing automatically respectiverudimentary communication paths with the access device, each of pathsbeing with the controller or one of the remaining zone players, whereinthe automatic configuration process takes place in the controller andeach of the remaining zone players after the user manually activates theautomatic configuration process respectively in the controller and eachof the remaining zone players, and exchanging several messages betweenthe access device and any one of the controller and the remaining zoneplayers that have been activated for the automatic configurationprocess, wherein some of the messages carry information pertaining to atransmission channel, an identifier of the network and a security keyfor subsequent communication, and at least some of the messages areencrypted.

One of the objects, features, and advantages of the present invention isto provide techniques that facilitate automatic configuration of devicesto be coupled to a network with minimum human intervention.

Other objects, features, and advantages of the present invention willbecome apparent upon examining the following detailed description of anembodiment thereof, taken in conjunction with the attached drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

These and other features, aspects, and advantages of the presentinvention will become better understood with regard to the followingdescription, appended claims, and accompanying drawings where:

FIG. 1 shows an exemplary configuration in which the present inventionmay be practiced;

FIG. 2A shows an exemplary functional block diagram of a player inaccordance with the present invention;

FIG. 2B shows an example of controllers that may be used to remotelycontrol one of more players of FIG. 1;

FIG. 2C shows an exemplary internal functional block diagram of acontroller in accordance with one embodiment of the present invention;

FIG. 3A shows three zone players and a controller that form an Ad-Hocnetwork as an example to facilitate the description of an automaticconfiguration process contemplated in the present invention;

FIG. 3B shows an embodiment that involves a process of five exchanges ofdata;

FIG. 4A shows a flowchart or process according to one embodiment of thepresent invention;

FIG. 4B shows another flowchart or process according to one embodimentof the present invention; and

FIG. 5 shows an exemplary setting for connecting a computer to awireless network.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

The present invention pertains to techniques for automaticallyconfiguring necessary parameters of a device to be coupled to a networkwith minimum human intervention. According to one aspect of the presentinvention, a wired and/or wireless Ad-hoc network is established tofacilitate communications among a group of devices. According to oneaspect of the present invention, when a new device is added to thenetwork, a rudimentary communication path is initially establishedbetween one of the devices (“first device”) in the network and the newdevice (“second device”) such that necessary parameters (e.g., SSID, WEPsecurity, channel frequency) can be exchanged for the new device tofunction properly in the network. To ensure the parameters are exchangedin a secure fashion, an additional public security procedure can be usedbetween the two devices.

The detailed description of the present invention is presented largelyin terms of procedures, steps, logic blocks, processing, or othersymbolic representations that directly or indirectly resemble theoperations of devices or systems that can be used on networks. Thesedescriptions and representations are typically used by those skilled inthe art to most effectively convey the substance of their work to othersskilled in the art.

Reference herein to “one embodiment” or “an embodiment” means that aparticular feature, structure, or characteristic described in connectionwith the embodiment can be included in at least one embodiment of theinvention. The appearances of the phrase “in one embodiment” in variousplaces in the specification are not necessarily all referring to thesame embodiment, nor are separate or alternative embodiments mutuallyexclusive of other embodiments. Further, the order of blocks in processflowcharts or diagrams or the use of sequence numbers representing oneor more embodiments of the invention do not inherently indicate anyparticular order nor imply any limitations in the invention.

Embodiments of the invention are discussed herein with reference to anaudio system with multi-zone capability. However, those skilled in theart will readily appreciate that the detailed description given hereinwith respect to the audio system is for explanatory purposes as theinvention extends beyond these limited embodiments.

Referring now to the drawings, in which like numerals refer to likeparts throughout the several views. FIG. 1 shows an exemplaryconfiguration 100 in which the present invention may be practiced. Theconfiguration may represent, but not be limited to, a part of aresidential home, a business building or a living complex with multiplezones. There are a number of multimedia players of which three examples102, 104 and 106 are shown as audio devices. Each of the audio devicesmay be installed or provided in one particular area or zone and hencereferred to as a zone player herein.

As used herein, unless explicitly stated otherwise, a track and an audiosource are used interchangeably, an audio source or audio sources are indigital format and can be transported or streamed across a data network.To facilitate the understanding of the present invention, it is assumedthat the configuration 100 represents a home. Thus, the zone player 102and 104 may be located in two of the bedrooms respectively while thezone player 106 may be installed in a living room. All of the zoneplayers 102, 104 and 106 are coupled directly or indirectly to a datanetwork 108. In addition, a computing device 110 is shown to be coupledon the network 108. In reality, any other devices such as a home gatewaydevice, a storage device, or an MP3 player may be coupled to the network108 as well.

The network 108 may be a wired network, a wireless network or acombination of both. In one example, all devices including the zoneplayers 102, 104 and 106 are coupled to the network 108 by wirelessmeans based on an industry standard such as IEEE 802.11. In yet anotherexample, all devices including the zone players 102, 104 and 106 arepart of a local area network that communicates with a wide area network(e.g., the Internet).

All devices on the network 108 may be configured to download and storeaudio sources or receive streaming audio sources. For example, thecomputing device 110 can download audio sources from the Internet andstore the downloaded sources locally for sharing with other devices onthe Internet or the network 108. The zone player 106 can be configuredto receive streaming audio source and share the source with otherdevices. Shown as a stereo system, the device 112 is configured toreceive an analog source (e.g., from broadcasting) or retrieve a digitalsource (e.g., from a compact disk). The analog sources can be convertedto digital sources. In accordance with the present invention, all audiosources, regardless of where they are located or how they are received,may be shared among the devices on the network 108.

Any device on the network 108 may be configured to control operations ofthe zone players 102, 104 and 106. In particular, one or morecontrolling devices 140 and 142 are used to control zone players 102,104 and 106 as shown in FIG. 1. The controlling devices 140 and 142 arepreferably portable and remotely control the zone players via wirelessmeans (e.g., infrared, radio, wireless standard IEEE 802.11b or802.11g). In one embodiment, besides controlling an individual zoneplayer, the controlling device 140 or 142 is configured to manage audiosources and other characteristics of all the zone players regardlesswhere the controlling device 140 or 142 is located in a house or aconfined living complex.

Referring now to FIG. 2A, there is shown an exemplary functional blockdiagram of a zone player 200 in accordance with the present invention.The zone player 200 includes a network interface 202, a processor 204, amemory 206, an audio processing circuit 210, a digital signal processingmodule 212, and an audio amplifier 214. The network interface 202facilitates a data flow between a data network (i.e., the data network108 of FIG. 1) and the zone player 200 and typically executes a specialset of rules (i.e., a protocol) to send data back and forth. One of thecommon protocols is TCP/IP (Transmission Control Protocol/InternetProtocol) commonly used in the Internet. In general, a network interfacemanages the conversion of an audio source or file into smaller packetsthat are transmitted over the data network or reassembles receivedpackets into the original source or file. In addition, the networkinterface 202 handles the address part of each packet so that it gets tothe right destination or intercepts packets destined for the zone player200.

The network interface 202 may include either one or both of a wirelessinterface 216 and a wired interface 217. The wireless interface 216,also referred to as a RF interface, provides network interface functionsby a wireless means for the zone player 200 to communicate with otherdevices in accordance with a communication protocol (such as thewireless standard IEEE 802.11a, 802.11b or 802.11g). The wired interface217 provides network interface functions by a wired means (e.g., anEthernet cable). Depending on implementation, each of the zone playersmay be equipped with either one or both of the interfaces 216 or 217. Inone embodiment, a zone player, referred to as an access zone player,including both of the interfaces 216 and 217 is coupled to an accesspoint of an LAN and communicates with other zone players wirelessly.Thus these other zone players may communicate with other devices on anetwork or retrieve audio sources via the access zone player. Theprocessor 204 is configured to control the operation of other parts inthe zone player 200. The memory 206 may be loaded with one or moresoftware modules that can be executed by the processor 204 to achievedesired tasks.

The audio processing circuit 210 resembles most of the circuitry in anaudio playback device and includes one or more digital-to-analogconverters (DAC), an audio preprocessing part, an audio enhancement partor a digital signal processor and others. In operation, when an audiosource (e.g., audio source) is retrieved via the network interface 202,the audio source is processed in the audio processing circuit 210 toproduce analog audio signals. The processed analog audio signals arethen provided to the audio amplifier 214 for playback on speakers. Inaddition, the audio processing circuit 210 may include necessarycircuitry to process analog signals as inputs to produce digital signalsfor sharing with other devices on a network.

Depending on an exact implementation, the digital signal processingmodule 212 may be implemented within the audio processing circuit 210 oras a combination of hardware and software. The audio amplifier 214 istypically an analog circuit that powers the provided analog audiosignals to drive one or more speakers.

Referring now to FIG. 2B, there is shown an example of a controller 240,which may correspond to the controlling device 140 or 142 of FIG. 1. Thecontroller 240 may be used to facilitate the control of multi-mediaapplications, automation and others in a living complex. In particular,the controller 240 is configured to facilitate a selection of aplurality of audio sources available on the network, controllingoperations of one or more zone players (e.g., the zone player 200)through a RF interface corresponding to the wireless interface 216 ofFIG. 2A. According to one embodiment, the wireless means is based on anindustry standard (e.g., infrared, radio, wireless standard IEEE802.11a, 802.11b or 802.11g). When a particular audio source is beingplayed in the zone player 200, a picture, if there is one, associatedwith the audio source may be transmitted from the zone player 200 to thecontroller 240 for display. In one embodiment, the controller 240 isused to select an audio source for playback. In another embodiment, thecontroller 240 is used to manage (e.g., add, delete, move, save, ormodify) a playlist.

The user interface for the controller 240 includes a screen 242 (e.g., aLCD screen) and a set of functional buttons as follows: a “zones” button244, a “back” button 246, a “music” button 248, a scroll wheel 250, “ok”button 252, a set of transport control buttons 254, a mute button 262, avolume up/down button 264, a set of soft buttons 266 corresponding tothe labels 268 displayed on the screen 242.

The screen 242 displays various screen menus in response to a selectionby a user. In one embodiment, the “zones” button 244 activates a zonemanagement screen or “Zone Menu” to allow a user to group players in anumber of desired zones so that the players are synchronized to play anidentical playlist or tracks. The “back” button 246 may lead todifferent actions depending on the current screen. In one embodiment,the “back” button triggers the current screen display to go back to aprevious one. In another embodiment, the “back” button negates theuser's erroneous selection. The “music” button 248 activates a musicmenu, which allows the selection of an audio source (e.g., a song track)to be added to a playlist (e.g., a music queue) for playback.

The scroll wheel 250 is used for selecting an item within a list,whenever a list is presented on the screen 242. When the items in thelist are too many to be accommodated in one screen display, a scrollindicator such as a scroll bar or a scroll arrow is displayed beside thelist. When the scroll indicator is displayed, a user may rotate thescroll wheel 250 to either choose a displayed item or display a hiddenitem in the list. The “ok” button 252 is use to confirm the userselection on the screen 242 or activate a playback of an item.

There are three transport buttons 254, which are used to control theeffect of the currently playing track. For example, the functions of thetransport buttons may include play/pause and forward/rewind a track,move forward to the next track, or move backward to the previous track.According to one embodiment, pressing one of the volume control buttonssuch as the mute button 262 or the volume up/down button 264 activates avolume panel. In addition, there are three soft buttons 266 that can beactivated in accordance with the labels 268 on the screen 242. It can beunderstood that, in a multi-zone system, there may be multiple audiosources being played respectively in more than one zone players. Themusic transport functions described herein shall apply selectively toone of the sources when a corresponding zone player is selected.

FIG. 2C illustrates an internal functional block diagram of an exemplarycontroller 270, which may correspond to the controller 240 of FIG. 2B.The screen 272 on the controller 270 may be a LCD screen. The screen 272communicates with and is commanded by a screen driver 274 that iscontrolled by a microcontroller (e.g., a processor) 276. The memory 282may be loaded with one or more application modules 284 that can beexecuted by the microcontroller 276 with or without a user input via theuser interface 278 to achieve desired tasks. In one embodiment, anapplication module is configured to facilitate automatic establishmentof a wireless connection with a network or another device. In anotherembodiment, an application module is configured to facilitateautomatically configuring itself after communicating with anotherconfigured device. It should be noted that similar application modulesmay also be included in the memory 206 of FIG. 2A. As a result, either azone player or a controller may be automatically configured tocommunicate over a network, provided such an automatic configuration isintended by a user.

The controller 270 includes a network interface 280 referred to as a RFinterface 280 that facilitates wireless communication with a zone playervia a corresponding wireless interface or RF interface thereof. Thecontroller 270 may control one or more zone players, such as 102, 104and 106 of FIG. 1. Nevertheless, there may be more than one controllers,each preferably in a zone (e.g., a room) and configured to control anyone and all of the zone players.

It should be pointed out that the controller 240 in FIG. 2B is not theonly controlling device that may practice the present invention. Otherdevices that provide the equivalent control functions (e.g., a computingdevice, a PDA, a hand-held device, and a laptop computer) may also beconfigured to practice the present invention. In the above description,unless otherwise specifically described, it is clear that keys orbuttons are generally referred to as either the physical buttons or softbuttons, enabling a user to enter a command or data.

It is assumed that a user has obtained an audio system that includes aset of zone players and a controller. Although it is possible to connecteach of the zone players and the controller to a network, therequirement for extra network cards, cables and a hub/switch/routermakes the idea unattractive. The introduction of wireless networking hasallowed for an implementation without these requirements. FIG. 3A showsthat there are three zone players 302, 304 and 306 and a controller 308that form a network branch that is also referred to as an Ad-Hoc network310. In one embodiment, the network 310 is pure wireless. In anotherembodiment, the network 310 is wired or a combination of wired andwireless. In general, an Ad-Hoc (or “spontaneous”) network is a localarea network or other small network in which there is no one accesspoint for all traffics. With an established Ad-Hoc network, the devices302, 304, 306 and 308 can all communicate with each other in‘peer-to-peer’ style of communication. Furthermore, any device maycome/go from the network and the network will automatically reconfigureitself without needing the user to reconfigure the network.

By the Ad-Hoc network 310, the devices 302, 304, 306 and 308 may shareor exchange one or more audio sources and be grouped to play identicalor different audio sources. For example, the devices 302 and 304 aregrouped to play back one piece of music, and at the same time, thedevice 306 plays back another piece of music. In other words, thedevices 302, 304, 306 and 308 as shown in FIG. 3A form a HOUSEHOLD thatdistribute audio and/or reproduce sound. As used herein, the termHOUSEHOLD (always in caps to disambiguate from the user's domicile) isused to represent a collection of networked devices that are cooperatingto provide an application or service. An instance of a HOUSEHOLD isidentified with a Household ID (or HHID).

In one embodiment, an HHID is a short string or an identifier that iscomputer-generated to ensure that it is unique. Accordingly, the network310 may be characterized by a unique HHID and a unique set ofconfiguration variables or parameters, such as Channels (i.e.,respective frequency bands), SSID (a sequence of alphanumeric charactersas a name of a wireless network), and WEP keys (wired equivalentprivacy, or simply security keys). In one embodiment, SSID is simply setto be the same as HHID. One of the aspects of the present invention isto provide a bootstrap procedure that enables automatic and simpleestablishment of these configuration parameters in each device within aHOUSEHOLD to enable communications among the devices.

In general, each HOUSEHOLD includes two types of network nodes:

-   -   Control Point (CP)—it controls the overall network setup process        and sequencing, including an automatic generation of required        network parameters (e.g., WEP keys). In one embodiment, it also        provides the user with a HOUSEHOLD configuration user interface.        The CP function is typically provided by a computer running a CP        application module, or by a handheld controller (e.g., the        controller 308) also running CP application module.    -   Zone Player (ZP)—the ZP is any other device on the network that        is placed to participate in the automatic configuration process.        It should be noted that ZP, as a notation used herein, includes        the controller 308 or a computing device.

The configuration of a HOUSEHOLD involves multiple CP's and ZP's thatrendezvous and establish a known configuration such that they can usestandard networking protocol (e.g., IP over Wired or Wireless Ethernet)for communication. In one embodiment, there are two types ofnetworks/protocols: Ethernet—802.3 and Wireless—802.11g.Interconnections between a CP and a ZP may use either one of thenetworks/protocols. A device in the system as a member of a HOUSEHOLDmay connect to both networks simultaneously. In an environment that hasboth networks in use, it is assumed that at least one device in a systemis connected to both as a bridging device, thus providing bridgingservices between wired/wireless networks for others. The zone player 306in FIG. 3A is shown to be connected to both networks, for example, theconnectivity to the network 312 is based on Ethernet while theconnectivity to other devices 302, 304 and 308 is based on Wireless.

Establishing a rudimentary communication path. In reference to FIG. 3A,a zone player is not yet a member of a HOUSEHOLD. It is assumed that thezone player is to be added to become a member of the HOUSEHOLD by acable or wireless. When the zone player is initially turned on, itexecutes an embedded module that is configured to establish arudimentary communication path with another device (network-enabled).The rudimentary communication path facilitates the automaticconfiguration of the zone player via the another device. Thiscommunication path may operate over wireless and/or Ethernet protocols,as the zone player may be connected to one or both. In operation, thecommunication path does not cause negative effects on other devices inthe vicinity and can reach all other members of the HOUSEHOLD (both CP'sand ZP's) if there are any. It should also be noted that thecommunication path does not have to be direct between two devices andmay be bridged by one or more other devices. Because the communicationpath is only used for initial device configuration, it does not requiresignificant performance or sophisticated functionality. There are atleast two elements to establish the communication path: channelselection and packet exchange.

Channel Selection. The selection of an appropriate (RF) transmissionchannel or simply channel is primarily an exercise in two constraints:finding a channel that is quiet from a protocol (e.g., 802.11)viewpoint, i.e., minimal conflicting wireless traffic, and finding achannel that is quiet from an RF viewpoint, i.e., minimal noise fromother signals. Both of these tests may be applied because typically ahome environment may have other RF (e.g., 2.4 GHz) traffic orpotentially other wireless access points. It is generally desirable touse a channel that is free from other RF interference. In any case, itis always desirable to avoid other wireless traffic.

Channel selection is typically accomplished with a scanning technique,namely the device listens on each channel for a period of time, lookingfor the presence of wireless beacons and other RF signals. In oneembodiment, devices that are configured have a preferred channel for theHOUSEHOLD, devices that are not configured have a pre-defined (default)channel or channels that they rendezvous on. For example, 802.11b/gchannel 1 could be pre-configured as the default channel. Alternatively,multiple channels, with a well-known frequency hopping sequence, couldbe used by the devices (this would require an aperiodic frequency changeinterval).

Many hardware configurations only support reception/transmission on asingle channel at a given time. Also there are configured andunconfigured devices that may use different channels for the bootstrapconfiguration and standard network operations (post-configurationcommunications). According to one embodiment, it is necessary toforcibly put the devices in a “configuration” mode, whereby they use theappropriate channels for communication.

Packet Exchange. To enable communication between devices that are notpart of the same HOUSEHOLD, a packet exchange network infrastructure isdeveloped. Probing messages are sent in such a way that they traverseboth the Ethernet and wireless networks, reaching any connected devices.Devices that are already in a HOUSEHOLD constitute a networkinfrastructure that can be used to exchange unicast andmulticast/broadcast network frames between the devices. A device that isnot yet in the HOUSEHOLD has a much more limited networking capabilityand can only receive data from devices to which it is directly wired,and unencrypted messages broadcast to all wireless networks operating ina particular channel of the RF spectrum.

In general, an IP address of a new device is not known to any members ofthe HOUSEHOLD. If the device is purely wireless, it may not have an IPaddress at all, or it may have an automatically assigned IP address thatis inaccessible to other devices with IP addresses respectively assignedby a DHCP server. To allow devices that are not members of the HOUSEHOLDto join the HOUSEHOLD, a transport may be constructed that can get dataone “hop” beyond the HOUSEHOLD network infrastructure.

In one embodiment, packets of data are broadcasted among the members ofthe HOUSEHOLD. The packets of data comprise a mixture of “probe”datagrams and standard IP broadcast. For example, the 802.11 “probe”datagrams are used for the inherent ability to cross wireless networkboundaries. In other words, the “probe” datagrams can be received by alllisteners (i.e., other devices) on the channel, even those that are notconfigured with an SSID, because they are sent to the broadcast BSS(e.g., FF:FF:FF:FF:FF:FF) to which all devices may be configured tolisten. A standard IP broadcast is used on the wired network segmentsand the HOUSEHOLD network infrastructure to enable a PC-based controllerto participate while running with standard user privileges (which allowaccess only to IP-based network services). Used together as describedbelow, the combination of the “probe” datagrams and IP broadcastprovides for a broadcast datagram transport that allows even devicesthat have not had any networking parameters configured to communicate.

In general, the probe datagrams comprise a number of elements tofacilitate the configuration of other devices to join the HOUSEHOLD. Inone embodiment, each of the elements carries up to 255 bytes of data. Anelement contains data payload for each message used by the bootstrapprocedure to invite others to join the HOUSEHOLD. This element isrepeated as many times as necessary to carry the complete message. Inone embodiment, the IP broadcast datagrams contain the same data payloadas the normal IP data payload.

Messages relating to the bootstrap procedure may be forwarded beyond theboundaries of an existing HOUSEHOLD network infrastructure (includingproperly configured wireless devices, and the wired network). Similarly,messages originating outside of the HOUSEHOLD network infrastructure maybe forwarded into the infrastructure. This forwarding procedure may beaccomplished in a mixed wireless/wired network environment withoutintroducing a broadcast storm. A broadcast storm is a state in which amessage that has been broadcast across a network results in moreresponses than necessary, and each response results in even moreresponses in a snowball effect, subsequently resulting in a networkmeltdown. In one embodiment, the network is carefully configured toprevent such a broadcast storm or any illegal broadcast messages. Toaccomplish this, two flags are included in the message body, forexample, “SENT_AS_PROBE” and “SENT_AS_IP_BROADCAST”. When a devicereceives a “probe” message, assumed using “Sonos Netstart” SSID (or thebroadcast BSS, as with all probe requests), it forwards the message asan IP broadcast message (after setting the “SENT_AS_IP_BROADCAST” flag)if the SENT_AS_IP_BROADCAST flag is not already set. Similarly, when itreceives an IP broadcast with a UDP payload address to an appropriateport (e.g., port number 6969), it forwards the message as a “probe”datagram (after setting the “SENT_AS_PROBE” flag) if that flag is notalready set. This allows messages related to the packet exchange both toenter and to exit the HOUSEHOLD network infrastructure without causing abroadcast storm.

Using this method of broadcast communication, packets can be sentbetween any member of the HOUSEHOLD and a device to join the HOUSEHOLDon both Ethernet and wireless networks. The device to join the HOUSEHOLDmay be brand new and previously configured with a different network(e.g., a device with a stale configuration in a different household). Inaddition, if used sparingly, these broadcast messages do not interferewith the normal operation of the network or attached devices. As aresult, a communication path on an agreed channel has been establishedbetween two devices.

Device Discovery. To minimize impact on existing networks and to improveconfiguration security, the system requires a user to manually activatethe auto-configuration process. This is accomplished by a specificaction on each device that is being added to the network. For example,if the user is installing a brand new HOUSEHOLD, containing one CP andtwo ZP's, the activation process may be manually activated on each by,for example, powering off and on, pushing a reset button or pushing twoor more specific buttons simultaneously. In one embodiment, the CP or ZPis simply powered up by the user, which activates the pre-installedmodule to start the bootstrap procedure.

For a ZP:

-   -   If the device is unconfigured (e.g., factory default settings),        it will immediately go into a “sleep” mode where it is awaiting        an activation command.    -   If the device has been previously configured, it will attempt to        contact other members of its HOUSEHOLD network.

There are situations in which a ZP is orphaned, namely it is previouslyconfigured (e.g., perhaps, with another Ad-hoc network) and now is to beadded to the HOUSEHOLD (e.g., the ZP is obtained from a previous owner).In the case of an orphan scenario, the ZP may patiently attempt tocontact its original network. It can be perceived that this operationwill be unsuccessful but otherwise harmless. Even in this configuredstate, the device can participate in the rudimentary broadcastcommunication processes described above.

For the CP:

-   -   If the device is unconfigured (e.g., factory default settings),        it will present the user with a description of how to start the        configuration process.    -   If the device is configured, it will attempt to contact other        members of its HOUSEHOLD network.

The CP may also be an orphaned device, in which case it performssimilarly to that of the ZP.

In both cases, correctly configured devices will establish networkcommunications and make themselves available for normal operation. Alldevices, including those previously configured, will enter an“activation state” when the user indicates that this is desired. At thispoint, the configuration process can begin.

Device Configuration. The configuration is carried out by exchangingdata between two devices that are not necessarily directly connected.This procedure is carried over a rudimentary communication path asdescribed previously. The sequence of exchanging the data is initiatedby the user or some other process, for example, activating a resetbutton, to trigger the “activation” or configuration mode on theinvolved devices. Each device executes this sequence, and then exits theactivation mode. FIG. 3B shows an embodiment that involves a process offive exchanges of data.

Each of the data exchanges is referred to as a type of message: Alive,QueryNetParams, RespondNetParams, SetNetParams, and AckNetParams, eachis explained as follows:

Alive—a message indicating that a named ZP is available forconfiguration. The message includes at least a zpUUID which is aglobally unique identifier that identifies the ZP sending the message.

QueryNetParams—a request from the CP to the ZP to respond with the ZP'scurrent network configuration information. The request includes at leasta zpUUID, cpPK (the RSA public key of the CP) and tid (a uniquetransaction identifier).

RespondNetParams—a response to the QueryNetParams. It includes the ZP'snetwork configuration information (HHID, WEP key and RSA public key).For security reasons, the WEP key is encrypted using the CP's public keythat is only readable by the CP. The response includes at least azpUUID, netConfig(the ZP's current network configuration parameters),zpPK, and tid . It is should be noted that a new ZP, set to factorydefaults, shall have well-known parameter values, allowing the CP todetermine that it is unconfigured.

SetNetParams—a command message from the CP to the ZP indicating that theZP should reconfigure its network parameters. The WEP key is encryptedusing the ZP's public key, and therefore only readable by the ZP. Thecommand includes at least a zpUUID, netConfig and tid. It should benoted that netConfig includes the new configuration parameters for theZP, as determined by the CP. The ZP should save this value in itsnetwork configuration, in some cases, these parameters may match theZP's existing configuration.

AckNetParams—a response to the SetNetParams messaging. The responseindicates that the SetNetParams message was received and that thenetwork configuration contained therein has been successfully applied.The response includes at least a zpUUID and a tid.

In operation, after a user activates the configuration process (on bothZP and CP) at 351 in FIG. 3B. The CP enters a state where it is willingto accept an Alive message. The CP only remains in this state for alimited (finite) period of time. The ZP enters an activation state whereit attempts rendezvous with a CP. The ZP only remains in this state fora limited (finite) period of time. The ZP will periodically transmit anAlive message until it either receives a QueryNetParams message, orexits the activation state.

At 352, the CP receives an Alive message. If the CP is in theconfiguration mode, it will generate a new tid, and send aQueryNetParams message and send to the ZP. It should be noted that theCP may or may not have been configured at this point. In either case, itsends the QueryNetParams. At 353, if it is already in the activationstate, the ZP responds to a QueryNetParams with its current networkconfiguration. If the ZP is unconfigured (e.g., factory defaultsettings), it will return an empty HHID and WEP key. If the ZP ispreviously configured, it will return its current configuration. The ZPalso returns its public key such that the WEP key can be encrypted usingthe CP's public key.

At 354, upon receiving the ZP's current configuration information, theCP decides on a course of action. Most, but not all, of these optionsresult in a SetNetParams message being sent to the ZP. The matrix ofpossible situations:

CP already configured CP not configured ZP The CP sends a The CP setsits own already SetNetParams message config to match the ZP configuredto the ZP containing the config, and the config CP's current net config.process is terminated. ZP not The CP sends a The CP generates newconfigured SetNetParams message config parameters. The to the ZPcontaining the parameters are sent to CP's current net config. the ZP ina SetNetParams message. The CP sets its own config to these values aswell.

At 355, when the ZP receives a SetNetParams message, it reconfigures itsown HHID and WEP key to match those contained in the network packet.Accordingly, the CP determines that it generates new configurationparameters in accordance with the following:

-   -   HHID—this is provided by the user via the CP user interface or        automatically generated by the CP.    -   SSID—this is automatically generated by the CP (e.g., set to the        same value as the HHID).    -   WEP Key—this is automatically generated (e.g., using a        pseudo-random number generator, seeded with entropy collected by        the CP).    -   Channel—the CP probes the network looking for an acceptable        channel (based on a variety of criteria, which may include        traffic and interference from other sources).

Subsequent to the activation process, any devices that have beenreconfigured will attempt to establish normal network communicationsusing their new network configuration parameters. In all of the abovesteps, if the CP or ZP is not already in the activation state, receiptof any messages is ignored.

If there are multiple ZP's activated simultaneously, all of the devicescould execute this same sequence, independently of each other (the CP iscapable of multiple independent sessions). If multiple CP's areactivated, each will respond to a ZP's Alive message and will executethe sequence—the first one to deliver the SetNetParams to the ZP willconfigure it. It should be noted that in this case, the second CP willnever get an AckNetParams message (because the ZP has exited theactivate state). This will cause a transaction timeout in the second CP,at which point it will typically inform the user of the error, or retrythe entire sequence. Should it retry the entire sequence, it will notreprogram the ZP (as described above that the effect of an unconfiguredCP talking to a configured ZP).

Security. To ensure that the communication among the members in aHOUSEHOLD by wireless means is secure, there are multiple issues in theauto-configuration that are resolved in the present invention.

-   -   1. Typically, the broadcasting messages in packet exchange are        unencrypted. However, it is undesirable to transmit sensitive        information such as WEP keys over wireless medium without        encryption. As described below, public key cryptography is used        to ensure that WEP keys are distributed in a secured manner.    -   2. Because the network configuration process is automated and        the data is transmitted over the network, it is desirable to        ensure that the process is not started without the approval of        the user. Specifically, it must not be possible for a malicious        wireless device to surreptitiously program one of the devices.        Accordingly, the auto-configuration process is started manually        by a user on all devices.    -   3. When one of the connected devices is removed from the        HOUSEHOLD, it can no longer access to the network. This is        accomplished with a mechanism on each device that resets it to        factory default configuration (e.g., erases WEP keys and other        private information).    -   4. It must be possible for the user to validate that they have        correctly configured the right devices and that no other devices        have been joined to the network. In one embodiment, this is        accomplished with a validation/status user interface on the        Control Point.

Use of Public Key Cryptography. The configuration process uses publickey cryptography to exchange WEP keys and other information which mustnot be visible to any party sniffing the network. In one embodiment,this is accomplished in the following manner:

-   -   1. There is a designated (e.g., Sonos) certificate authority        (CA), an entity that can issue signed public key certificates.    -   2. Each CP and ZP is factory configured with a unique        certificate, public and private key, in a format that supports        the RSA algorithm. The certificate is signed and issued by the        designated CA, and includes a hash of the MAC address of a        device.    -   3. CP and ZP exchange public keys and WEP keys are encrypted        using the public key. In certain circumstances, the devices        compare the MAC in received packets with that in the certificate        to add an additional layer of security.

FIG. 4A shows a flowchart or process 400 according to one embodiment ofthe present invention. The process 400 may be implemented in hardware,software or a combination of both as a method, a system or a process. Inone embodiment, the process 400 is implemented for a handheld controlleror a computing device. To facilitate the understanding of the process400, the description herein is based on a handheld controller, such asthe controller 308 of FIG. 3A, which shall not be considered as thelimitations to the present invention.

Typically, a handheld controller (or HH) is equipped with a mechanism toallow a user to reset itself. In some implementation, the reset issimply done when the controller is powered up. At 402, it is assumedthat the controller is powered up. The process 400 goes to 404 todetermine whether the controller is configured. By configuration, itmeans that the controller is ready for communication with other devices(e.g., zone players) that may or may not be on a network, preferably awireless network. In the context of FIG. 3A, it means that the handhelddevice 308 is ready to communicate with each or all of the devices 302,304, and 306 (assuming that the devices 302, 304, and 306 have not beenconfigured yet).

It is assumed that the controller is configured, the process 400 goes to406 where it determines whether the device is a controller or acomputer. As described above, the device may be a controller, a personalcomputer or other type of device, although it has been assumed to be acontroller. Nevertheless, in this embodiment, a step is provided todetermine exactly what it is, because a controller and a computer mayprovide a different display or graphic environment. If the device isindeed a controller, the process 400 goes to 408, wherein the controllershows a proper screen for a user to proceed with the control of the zoneplayers or replay of certain audios via one or more zone players. If thedevice is a computer, the computer is typically loaded with a modulethat is now executed to display an environment (e.g., a graphic userinterface or GUI) that allows a user to perform many tasks that may bedone on the handheld controller in addition to other tasks that may beassisted by a pointing device (e.g., a mouse) or a keyboard.

In any case, it is assumed that the device is a controller. Referringback to 404, it is now assumed that the device is not configured, theprocess 400 goes to 412 to determine if a user has activated theautomatic configuration process. In one embodiment, the controller goesto “sleep” mode after a predefined time should there be no activation ofthe configuration process. When the user activates the configurationprocess, the process 400 goes 414 to determine whether the controlleritself is coupled to an access point of a network, at least a member ofthe HOUSEHOLD (e.g., one zone player) is coupled thereto or an Ad-Hocnetwork. Typically, a GUI is provided for a handheld or a computer.Accordingly, a display with a relevant message is displayed. After it iscertain that either the controller itself or a zone player is coupled toa network, a user may press “OK” in the displayed GUI.

At 418, should the user desire to start the automatic configurationprocess now, the user activates the process manually. In one embodiment,there are two buttons, labeled respectively as “VOL” and “Mute”. Whenthese two buttons are pressed at the same time, the automaticconfiguration process starts. The process 400 goes to 420 to determinewhether a valid response is received from a zone player. If not, after acertain time 422, the process 400 goes back to 418 to reactivate theprocess or 414 via 424 to remind the user to ensure that the requiredconnection is placed.

In one embodiment, a handheld controller is configured to facilitate anew zone player to execute a household join process to join theHOUSEHOLD upon an appropriate channel. The channel may be agreed uponbetween the controller and the zone player as follows:

-   -   1) when a reset or two buttons are pushed on the ZonePlayer to        ‘activate’ the household join process, it starts a scan through        the available wireless channels, sending the “Alive” datagram        for each channel in turn. Sometimes, it cycles through the        channels several times;    -   2) as soon as the ZonePlayer receives a QueryNetParams request        address to itself, it stops the channel cycling; and    -   3) The ZonePlayer remains locked on whatever channel it has        stopped cycling until a successful sequence ending in the        configuration of the ZonePlayer (at which point it uses the        specified channel), or a timeout expires (at which point it        returns to its original channel or resumes cycling through        channels and sending alive messages if the overall timeout for        the activation process has not expired).

Although the Zone Player performs the channel cycling, the controllermay also be configured to perform the channel cycling as well. However,when the controller is, for example, a personal computer, the ZonePlayer is typically configured to cycle through the available channels.

In any case, when a valid response is received from the zone player, theprocess 400 determines whether the zone player provides its own networkname (e.g., HHID) at 426. If the zone player does not have an HHID,which means that the zone player is to be added into a wireless networknamed after an HHID provided by the device, the process 400 goes to 428to instruct the zone player to join the wireless network. If the zoneplayer does have an HHID, which means that the device itself is to beadded into the wireless network named after the HHID provided by thezone player, the process 400 goes to 430 to exit.

The automatic configuration process, as described above, is executed.After it is completed, a message or an indication of completion isdisplayed. After the user acknowledges at 434, the user is offered toname the zone player, for example, “Dinning” which means that the zoneplayer is in the dinning room. Subsequently, the process 400 goes to406.

For completeness, FIG. 4B shows a flowchart or process 450 that may bealso implemented in hardware, software or a combination of both as amethod, a system or a process. In one embodiment, the process 450 isimplemented for a zone player. To facilitate the understanding of theprocess 450, the description herein is based on a zone player, such asthe player 302 of FIG. 3A, which shall not be considered as thelimitations to the present invention.

When a zone player is powered up, the process 450 determines whether thezone player is already registered or configured at 452. There aresituations in which the zone player just obtained by a user is alreadyconfigured, for example, the zone player is a used one (i.e., previouslyconfigured). If it is indeed configured, the process 450 goes to 454where an indication of “registered” is shown. If the zone player isnever configured, the process 450 goes to 456 to indicate such. It isassumed that the zone player works normally at 458 (e.g., through aninternal checkup).

At 460, a user activates the automatic configuration process by, forexample, pressing two buttons, labeled respectively as “VOL” and “Mute”,at the same time. The automatic configuration process starts by sendingout an Alive message at 462 as described above. At 464, the zone playerawaits a response. If no response is received within or beyond apredefined time, the process 450 goes to 466 or 458 to continue waitingfor a response or restart the process. It is assumed that there is aresponse, and the automatic configuration process continues as shown inFIG. 3B without failure, the process goes to 468 where the zone playeris now part of the wireless network named after an HHID received eitherfrom a configured device or provided by itself.

There are numerous functions, benefits and advantages in the presentinvention. One of them is that the present invention provides techniquesfor automatically configuring parameters of a device to be coupled to anAd-hoc network, where the Ad-hoc network forming by a group of devicescan be wireless, wired or a combination of both. By way of the presentinvention, a system including a set of zone players and one or morecontrollers operates correctly and does not interfere with any existingnetwork. Other functions, benefits and advantages can be appreciatedfrom the detailed description provided above.

The present invention has been described in sufficient details with acertain degree of particularity. It is understood to those skilled inthe art that the present disclosure of embodiments has been made by wayof examples only and that numerous changes in the arrangement andcombination of parts may be resorted without departing from the spiritand scope of the invention as claimed. Accordingly, the scope of thepresent invention is defined by the appended claims rather than theforegoing description of embodiments.

We claim:
 1. A computing device comprising: a user interface; a networkinterface; at least one processor; a non-transitory computer-readablemedium; and program instructions stored on the non-transitorycomputer-readable medium that are executable by the at least oneprocessor such that the computing device is configured to: whileconnected to a secure wireless network for exchanging digital datapackets that is defined by one or more network devices: receive, via agraphical user interface (GUI) associated with an application forcontrolling one or more playback devices, user input indicating a userselection of a playback device to be set up for operation on the securewireless network; and receive a first set of one or more messagescollectively indicating that the playback device is available for setup;after receiving the user input and receiving the first set of one ormore messages, transmit a response to the first set of one or moremessages that facilitates establishing an initial communication pathwith the playback device, wherein the initial communication path withthe playback device does not traverse any of the one or more networkdevices; transmit, to the playback device via the initial communicationpath, a second set of one or more messages collectively comprisingnetwork configuration parameters for the secure wireless network,wherein the network configuration parameters comprise an identifier ofthe secure wireless network and security information for the securewireless network; after transmitting the second set of one or moremessages collectively comprising the network configuration parameters,detect an indication that the playback device has connected to thesecure wireless network; and after detecting the indication, transitionfrom communicating with the playback device via the initialcommunication path to communicating with the playback device via thesecure wireless network.
 2. The computing device of claim 1, wherein theprogram instructions that are executable by the at least one processorsuch that the computing device is configured to detect the indicationcomprise program instructions that are executable by the at least oneprocessor such that the computing device is configured to receive, fromthe playback device via the initial communication path, a third set ofone or more messages collectively indicating that the playback devicehas successfully received the network configuration parameters.
 3. Thecomputing device of claim 1, wherein the playback device comprises afirst playback device of a new networked audio system.
 4. The computingdevice of claim 1, wherein the playback device comprises an additionalplayback device to an existing networked audio system.
 5. The computingdevice of claim 1, further comprising program instructions stored on thenon-transitory computer-readable medium that are executable by the atleast one processor such that the computing device is configured to:after transitioning to communicating with the playback device via thesecure wireless network, transmit a command to the playback devicerelated to playback of audio content.
 6. The computing device of claim5, wherein the command comprises a command to retrieve audio content forplayback from an audio source that is accessible via a communicationpath that includes the secure wireless network.
 7. The computing deviceof claim 1, wherein the computing device is programmed to run a softwareapplication for controlling a networked audio system, and wherein theuser input is received via the software application.
 8. The computingdevice of claim 1, further comprising program instructions stored on thenon-transitory computer-readable medium that are executable by the atleast one processor such that the computing device is configured to:before transmitting the second set of one or more messages collectivelycomprising the network configuration parameters, obtain the networkconfiguration parameters.
 9. The computing device of claim 8, whereinthe program instructions that are executable by the at least oneprocessor such that the computing device is configured to obtain thenetwork configuration parameters comprise program instructions that areexecutable by the at least one processor such that the computing deviceis configured to retrieve the current network configuration parametersof the computing device.
 10. The computing device of claim 1, whereinthe second set of one or more messages comprise a command for theplayback device to adopt the network configuration parameters.
 11. Thecomputing device of claim 1, wherein the program instructions that areexecutable by the at least one processor such that the computing deviceis configured to receive the user input comprise program instructionsthat are executable by the at least one processor such that thecomputing device is configured to receive the user input either beforeor after the first set of one or more messages is received.
 12. Thecomputing device of claim 1, further comprising program instructionsstored on the non-transitory computer-readable medium that areexecutable by the at least one processor such that the computing deviceis configured to: after transitioning to communicating with the playbackdevice via the secure wireless network, transmit a command to theplayback device to form a group with at least one additional playbackdevice of a networked audio system such that the playback device isconfigured to play back audio content in synchrony with the at least oneadditional playback device.
 13. The computing device of claim 12,wherein the playback device and the at least one additional playbackdevice are associated with a common networked-audio-system identifier.14. The computing device of claim 13, wherein the computing device isassociated with the common networked-audio-system identifier.
 15. Thecomputing device of claim 12, further comprising program instructionsstored on the non-transitory computer-readable medium that areexecutable by the at least one processor such that the computing deviceis configured to: after transitioning to communicating with the playbackdevice via the secure wireless network, transmit a command to adjust avolume of the group of playback devices.
 16. The computing device ofclaim 1, wherein, after detecting the indication that the playbackdevice has connected to the secure wireless network, the playback deviceis included in the one or more network devices that define the securewireless network.
 17. The computing device of claim 1, furthercomprising program instructions stored on the non-transitorycomputer-readable medium that are executable by the at least oneprocessor such that the computing device is configured to: receive, viathe application for controlling one or more playback devices, a userinput defining a networked-audio-system identifier; and after detectingthe indication that the playback device has connected to the securewireless network, cause the playback device to be associated with thenetworked-audio-system identifier.
 18. The computing device of claim 1,wherein the first set of one or more messages is a single first message.19. The computing device of claim 1, wherein the second set of one ormore messages is a single second message that contains both theidentifier of the secure wireless network and the security informationfor the secure wireless network.
 20. The computing device of claim 1,wherein the security information for the secure wireless networkcomprises a security key.
 21. The computing device of claim 1, whereinthe secure wireless network comprises a local area network (LAN). 22.The computing device of claim 1, wherein the playback device furthercomprises program instructions stored on the non-transitorycomputer-readable medium that, that, when executed by the at least oneprocessor, cause the playback device to perform functions comprising:after detecting the indication that the playback device has connected tothe secure wireless network, detect an indication that the playbackdevice has joined a networked audio system that is operating on thesecure wireless network.
 23. The computing device of claim 22, whereinthe application for controlling one or more playback devices comprisessoftware for controlling the networked audio system.
 24. The computingdevice of claim 1, wherein the initial communication path with theplayback device comprises a direct communication path between thecomputing device and the playback device that does not traverse any ofthe one or more network devices.
 25. A non-transitory computer-readablemedium, wherein the non-transitory computer-readable medium isprovisioned with program instructions that, when executed by at leastone processor, cause a computing device to: while connected to a securewireless network for exchanging digital data packets that is defined byone or more network devices: receive, via a graphical user interface(GUI) associated with an application for controlling one or moreplayback devices, user input indicating a user selection of a playbackdevice to be set up for operation on the secure wireless network; andreceive a first set of one or more messages collectively indicating thatthe playback device is available for setup; after receiving the userinput and receiving the first set of one or more messages, transmit aresponse to the first set of one or more messages that facilitatesestablishing an initial communication path with the playback device,wherein the initial communication path with the playback device does nottraverse any of the one or more network devices; transmit, to theplayback device via the initial communication path, a second set of oneor more messages collectively comprising network configurationparameters for the secure wireless network, wherein the networkconfiguration parameters comprise an identifier of the secure wirelessnetwork and security information for the secure wireless network; aftertransmitting the second set of one or more messages collectivelycomprising the network configuration parameters, detect an indicationthat the playback device has connected to the secure wireless network;and after detecting the indication, transition from communicating withthe playback device via the initial communication path to communicatingwith the playback device via the secure wireless network.
 26. Thenon-transitory computer-readable medium of claim 25, wherein the programinstructions that, when executed by at least one processor, cause thecomputing device to detect the indication comprise program instructionsthat, when executed by at least one processor, cause the computingdevice to receive, from the playback device via the initialcommunication path, a third set of one or more messages collectivelyindicating that the playback device has successfully received thenetwork configuration parameters.
 27. The non-transitorycomputer-readable medium of claim 25, wherein the non-transitorycomputer-readable medium is also provisioned with program instructionsthat, when executed by at least one processor, cause the computingdevice to: before transmitting the second set of one or more messagescollectively comprising the network configuration parameters, obtain thenetwork configuration parameters.
 28. The non-transitorycomputer-readable medium of claim 25, wherein the program instructionsthat, when executed by at least one processor, cause the computingdevice receive the user input comprise program instructions that, whenexecuted by at least one processor, cause the computing device toreceive the user input either before or after the first set of one ormore messages is received.
 29. The non-transitory computer-readablemedium of claim 25, wherein the non-transitory computer-readable mediumis also provisioned with program instructions that, when executed by atleast one processor, cause the computing device to: after transitioningto communicating with the playback device via the secure wirelessnetwork, transmit a command to the playback device to form a group withat least at least one additional playback device of a networked audiosystem such that the playback device is configured to play back audiocontent in synchrony with at least the at least one additional playbackdevice.
 30. A method carried out by a computing device, the methodcomprising: while connected to a secure wireless network for exchangingdigital data packets that is defined by one or more network devices:receiving, via a graphical user interface (GUI) associated with anapplication for controlling one or more playback devices, user inputindicating a user selection of a playback device to be set up foroperation on the secure wireless network; and receiving a first set ofone or more messages collectively indicating that the playback device isavailable for setup; after receiving the user input and receiving thefirst set of one or more messages, transmitting a response to the firstset of one or more messages that facilitates establishing an initialcommunication path with the playback device, wherein the initialcommunication path with the playback device does not traverse any of theone or more network devices; transmitting, to the playback device viathe initial communication path, a second set of one or more messagescollectively comprising network configuration parameters for the securewireless network, wherein the network configuration parameters comprisean identifier of the secure wireless network and security informationfor the secure wireless network; after transmitting the second set ofone or more messages collectively comprising the network configurationparameters, detecting an indication that the playback device hasconnected to the secure wireless network; and after detecting theindication, transitioning from communicating with the playback devicevia the initial communication path to communicating with the playbackdevice via the secure wireless network.
 31. A system comprising: acomputing device configured to communicate over at least one datanetwork; and a playback device configured to communicate over at leastone data network; the computing device comprising: at least one firstprocessor; a first non-transitory computer-readable medium; and programinstructions stored on the first non-transitory computer-readable mediumthat are executable by the at least one first processor such that thecomputing device is configured to: while connected to a secure wirelessnetwork for exchanging digital data packets that is defined by one ormore network devices: receive, via a graphical user interface (GUI)associated with an application for controlling one or more playbackdevices, user input indicating a user selection of a playback device tobe set up for operation on the secure wireless network; and receive afirst set of one or more messages collectively indicating that theplayback device is available for setup; after receiving the user inputand receiving the first set of one or more messages, transmit a responseto the first set of one or more messages that facilitates establishingan initial communication path with the playback device, wherein theinitial communication path with the playback device does not traverseany of the one or more network devices; transmit, to the playback devicevia the initial communication path, a second set of one or more messagescollectively comprising network configuration parameters for the securewireless network, wherein the network configuration parameters comprisean identifier of the secure wireless network and security informationfor the secure wireless network; after transmitting the second set ofone or more messages collectively comprising the network configurationparameters, detect an indication that the playback device has connectedto the secure wireless network; and after detecting the indication,transition from communicating with the playback device via the initialcommunication path to communicating with the playback device via thesecure wireless network; the playback device comprising: at least onesecond processor; a second non-transitory computer-readable medium; andprogram instructions stored on the second non-transitorycomputer-readable medium that are executable by the at least one secondprocessor such that the playback device is configured to: transitionfrom communicating with the computing device via the initialcommunication path to communicating with the computing device via thesecure wireless network.
 32. The system of claim 31, wherein theplayback device further comprises program instructions stored on thesecond non-transitory computer-readable medium that are executable bythe at least one second processor such that the playback device isconfigured to: detect a triggering event that causes the playback deviceto enter a setup mode in which the playback device transmits the firstset of one or more messages collectively indicating that the playbackdevice is available for setup.
 33. The system of claim 32, wherein thetriggering event comprises powering on the playback device.
 34. Thesystem of claim 31, wherein the playback device further comprisesprogram instructions stored on the second non-transitorycomputer-readable medium that are executable by the at least one secondprocessor such that the playback device is configured to: aftertransitioning to communicating with the computing device via the securewireless network, receive, from the computing device, a command relatedto playback of audio content.
 35. The system of claim 34, wherein thecommand comprises a command to retrieve audio content for playback froman audio source that is accessible via a communication path thatincludes the secure wireless network, and wherein the playback devicefurther comprises program instructions stored on the secondnon-transitory computer-readable medium that are executable by the atleast one second processor such that the playback device is configuredto: based on receiving the command, retrieve the audio content from theaudio source via the communication path that includes the securewireless network.
 36. The system of claim 31, further comprising programinstructions stored on the second non-transitory computer-readablemedium that are executable by the at least one second processor suchthat the playback device is configured to: after transitioning tocommunicating with the computing device via the secure wireless network,receive, from the computing device, a command to form a group with atleast one additional playback device of a networked audio system suchthat the playback device is configured to play back audio content insynchrony with the at least one additional playback device; and based onreceiving the command to form the group, form the group with at leastone additional playback device of the networked audio system such thatthe playback device is configured to play back audio content insynchrony with the at least one additional playback device.
 37. Thesystem of claim 36, wherein the playback device and the at least oneadditional playback device are associated with a commonnetworked-audio-system identifier.
 38. The system of claim 37, whereinthe computing device is associated with the commonnetworked-audio-system identifier.
 39. The system of claim 36, furthercomprising program instructions stored on the second non-transitorycomputer-readable medium that are executable by the at least one secondprocessor such that the playback device is configured to: aftertransitioning to communicating with the computing device via the securewireless network, receive, from the computing device, a command toadjust a volume of the group of playback devices; and based on receivingthe command to adjust the volume of the group, (a) cause an adjustmentof an individual volume of the playback device and (b) transmit, to theat least one additional playback device via the secure wireless network,a command to adjust an individual volume of the at least one additionalplayback device.
 40. The system of claim 31, further comprising programinstructions stored on the second non-transitory computer-readablemedium that are executable by the at least one second processor suchthat the playback device is configured to: use the network configurationparameters received from the computing device to connect to the securewireless network, wherein, after using the network configurationparameters to connect to the secure wireless network, the playbackdevice is included in the one or more network devices that define thesecure wireless network.
 41. The system of claim 31, further comprisingprogram instructions stored on the second non-transitorycomputer-readable medium that are executable by the at least one secondprocessor such that the playback device is configured to: use thenetwork configuration parameters received from the computing device toconnect to the secure wireless network; and after connecting to thesecure wireless network, join a networked audio system that is operatingon the secure wireless network.