Mobile wireless broadband network interface card (mwbnic) and k-net

ABSTRACT

A Mobile Wireless Broadband Network Interface Card (MWBNIC) for networking electronic devices on a wireless broadband spectrum. The MWBNIC is built into electronic devices as a connecting modem or plugged in via external device ports such as USB. A microprocessor chip attached to a circuit board with a network packet controller coupled to a dedicated cache memory utilized to temporarily store the last N data packets from a node for networking WIFI maintains packet continuity. The network comes with protocols that control packet processing. The MWBNIC embedded packet control protocol (PCP) pushes, pops, compares and deletes packets from cache when a device is in motion. The PCP is connected to a mechanism for determining bandwidth on nodes, another mechanism for switching frequency to that of the next K-Node to connect to and a pre-determined connectivity data set that directly connects the modem in motion are means for networking broadband spectrum.

This patent application claims the benefits of provisional applicationnumber U.S. 62/913,360. It was originally filed as a provisionalapplication on Oct. 31 2016 with a letter explaining circumstances thatsurrounded it. It was filed as a PCT on Oct. 31 2017 and was assignedthe number PCT/US17/59329. It was re-filed on 21 Dec. 2018 as a PCT andaccorded a serial Number PCT/US2018/067218 under the title Rep MobileWireless Broadband Network Interface Card (MWBNIC) & K-Net.PCT/US2018/067218 was not revivable because office communication was notreceived from the RO.

FIELD OF INVENTION

The present invention relates to networking of wireless devices overbroadband spectrum including Wi-Fi. In particular, the inventionprovides a Mobile Wireless Broadband Network Interface Card (MWBNIC)with packet control methods and three protocols for maintaining packetorder and continuity for devices in motion and stationary on a network.The network is comprised of the Gwahanza Locol Area Network Managerwhich runs the Network Control Protocol (NCP), a special router known asK-Node which runs the Card Control Protocol (CCP) and servers allconnected by high speed transmission wires such as fiber optics. Thethird protocol, the Packet Control Protocol (PCP) runs from the mobilewireless broadband network interface card that is installed in devicesor plugged in device external ports. The protocols facilitatesauthentication, node switching while in motion and data transmission onthe network. A Net Extender which is part of the network acts like anindependent K-Node providing access to other devices.

BACKGROUND OF THE INVENTION

There are many network cards on the market today that provides wirelessconnectivity. Those cards are inserted into laptops or desktop computersfor use when in localized areas. They connect to one wireless accesspoint to get service within a limited radius. They cannot network datafrom two sources and maintain connectivity while in motion.

Cellular phones have mobility over long distances but they operate onnarrow bandwidth spectrums that have limited data transfer capacities.Bigger devices such as televisions in motion cannot function with thecellular narrow band to provide real time service.

Signal propagation in the current network cards and cellular products iscomparable to a tree with falling leaves where several people can standunder the tree with baskets and collect the leaves (signal).

The present invention introduces the Mobile Wireless Broadband NetworkInterface Card (MWBNIC) that connects to more than one wireless datasources (K-Nodes) simultaneously and network the data. It maintains datapacket order and continuity when a device is in motion and switchingfrom one wireless data source to another. This allows a device with thiscard to move a long distance connecting from one wireless broadbandK-Node to another without losing connectivity. The wireless K-Nodes maybe viewed as access points.

In one implementation, the MWBNIC connects automatically to differentnodes each through a different frequency filter establishing more thanone simultaneous connections while in another implementation, the deviceis instructed to connect to a particular node. A connection codeprovided to both the device in motion and the node enhances security.Data flow, network range check, and signal strength check takes placeconcurrently.

As a system, the card comes with a special wireless router, the K-Nodeconnected by high speed wires to a Local Area Network Manager known asGwahanza which also connects to servers by high speed wires.

Unlike the current wireless cards and cellular products that do notprotect data signal, the broadband card in this invention receivestargeted data from the Gwahanza Local Area Network Manager. One cannotstation a non-authorized access point to lure the card into connectingto it because the card must provide a connection code appended to theconnection request along with the device identity to the Gwahanza LocalArea Network Manager before it is authenticated.

The connection code which originates from the Gwahanza changes at everyconnection so one cannot duplicate it. When the connection code isgenerated by the Gwahanza and provided to the MWBNIC, it is also savedon the server under the identity of that MWBNIC. A connection request bythe MWBNIC is sent with the connection code appended to it forcomparison with the one retrieved from the server. This creates a verysecure wireless network. The next K-Node to connect to compares theconnection request submitted by the device to the connection requestsubmitted by the Gwahanza Local Area Network Manager and authenticatesthe device to switch to the K-Node. The Gwahanza set forth determinesthe next node for a MWBNIC to connect to based on wavelength at whichthe wireless K-Node is communicating. Wave length lamda (□) andfrequency (f) relates according to the formula □=c/f where c is thespeed of light.

The MWBNIC which networks data from more than one source receives datapackets from multiple nodes via at least one input port. It saves thedata packets from each node instantaneously utilizing at least one datastructure preferably a stack. A few packets are written to each datastructure each time. The N data packets are simultaneously deleted fromthe oldest data structure. Alternatively, this is cached in the randomaccess memory.

Only the last N packets are preserved each time for comparison to datacoming from a new wireless K-Node. The previous N data packets aredeleted as new ones come in to replace them.

Data is divided into two main categories namely networking and userdevice service data. The user service data is subdivided into categoriesspecifying the types of data being transmitted. Packets in each categoryare received at different frequencies which are assigned specificcommunication ports. This allows for all services to flow simultaneouslywithout interference.

The MWBNIC is built into many electronic devices as a modem. Theseincludes mobile phones, tablets, laptop computers, automobiles, homelevisions, car televisions, cameras, navigation devices and any otherthat requires wireless networking to access broadband spectrum such asWi-Fi. This enables a user to watch live television or video conferenceon wi-fi while in motion. It is also built as a plug and play modeminserted into external device ports to deliver service.

SUMMARY OF THE INVENTION

The present invention is a system that combines a Mobile WirelessBroadband Network Interface Card (MWBNIC) and a wireless network onwhich it runs. The MWBNIC networks moving devices over broadbandspectrum. The system comes with three protocols for maintaining packetorder and continuity for devices in motion and stationary on a network.The network is comprised of the Gwahanza Local Area Network Managerwhich runs the Network Control Protocol (NCP), a special router known asK-Node which runs the Card Control Protocol (CCP) and servers allconnected by high speed transmission wires such as fiber optics. Thethird protocol, the Packet Control Protocol (PCP) runs from the mobilewireless broadband network interface card that is installed in devicesor plugged in device's external ports. The protocols facilitatesauthentication, node switching while in motion and data transmission onthe network. A Net Extender which is part of the network acts like anindependent K-Node providing access to other devices. The devicesinclude but not limited to televisions, tablets, phones, computers,cars, home and office accessories.

The type of request field in the TCP header was incorporated to includeconnections with different retransmit rates after unsuccessfultransmission. Under this invention however, we use type of request togive precedence to some devices over others that may not have criticalneed for connection. A self driving automobile for example is given ahigher priority over a phone seeking connection when there is abandwidth issue.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates a circuit board of the Mobile Wireless BroadbandNetwork Interface Card (MWBNIC) of an embodiment of the presentinvention. The design allows both broadband and narrow bandwidth toprovide data.

FIG. 2 is a variation of FIG. 1 . It shows how data packets flow in atdifferent frequencies and gets filtered from each of the three filtersseparately. Each filter processes a specific range of frequencies thatare transmitted by a node emitting connection data at those particularfrequencies.

FIG. 3 . Is another variation of FIG. 1 . It shows how data packets atvarious frequencies gets into the MWBNIC card through one filter thatallows only the authorized frequencies. The unauthorized frequencies areignored.

FIG. 4 describes version 1 of the packet control protocol (PCP)algorithm in a flow chart format. The PCP controls data packets in thecard and maintains connectivity between wireless K-Nodes on any givenlocal area networks. The card is built into devices but in some cases,it is plugged in via external ports.

FIG. 5 Shows a second version of the packet control protocol (PCP)algorithm in a flow chart format. FIG. 5 differs from FIG. 4 in thatFIG. 5 provides three options for switching a device that is getting outof range of the currently connected node. One is based on connectionfrequency, the second on signal strength which is read directly by thecard from the K-Nodes and the last option is based on distance whichprovides the next node to connect to from pre-determined values storedon the card or read from the Gwahanza LAN manager. The mobile wirelessbroadband network interface card reads pre-determined and tabulatedpositions data which provides it with the next node to connect to basedon its calculated distance and coordinates

FIG. 6 is a representation of a data structure in a tabular form. Thedata structure could be a harsh table, list or other that stores easilyaccessible data. It is used in conjunction with the algorithm of FIG. 5. In one implementation, data resides on the device and in anotherimplementation, data is retrieved from the Gwahanza network manager orserver on the network.

FIG. 7 shows a network referred to as the K-Net. It is comprised ofwireless K-Nodes coupled to Gwahanza Local Area Network Managers bywires (not shown). Gwahanzas are in turn connected to servers (notshown) by wires. The figure also shows Net Extenders, MBWNIC card baseddevice and an antenna that harvests free television channels from theair into the K-Net.

FIG. 8 is a sectional representation of the network to which the MobileWireless Broadband Network Interface Card connects. Each wireless K-Nodeis directly connected to the Gwahanza Local Area Network Manager bywire.

FIG. 9 represents algorithm of the Card Control Protocol which runs onthe K-Node to process data traffic between devices and the Gwahanzamanager.

FIG. 10 is the algorithm of the Network Control Protocol. It runs on theGwahanza Local Area Network Manager to verify and authenticate devices.

DETAILED DESCRIPTION OF THE INVENTION

As used herein, K-Node in this specification refers to a specialwireless router that provides network connection to a device whether inmotion or stationary. The K-Node is connected to the network managernamed Gwahanza by wires. Gwahanza which is the Local Area Network (LAN)Manager is connected to servers by high speed wires such as fiberoptics.

K-Net refers to the system that combines the network and devices thatconnects to it over broadband spectrum. K-Net, which is a broadbandnetwork is comprised of special wireless routers known as K-Nodes andnet extenders. The net extenders which are built with a booster toamplify signal, wirelessly connects to K-Nodes and provides service toother devices remotely. The K-Nodes connects to the Gwahanza Local AreaNetwork Manager by wire and the Gwahanza connects to servers by wires.

The K-Net further comprises of application monitors, repeaters,authentication servers, Internal DNS servers (IDNS), IP allocationservers, firewalls, Gateway to the internet all connected by wires suchas fiber optics that delivers high speed data transmission. Acombination of all these with the three protocols makes the networkfunction.

The Wireless Broadband Network Interface Card is built with at least oneexternal port that connects to cable including fiber optics and Ethernetwhere data is transmitted as electronic pulse over the cable whenplugged to an outlet.

FIG. 2 and FIG. 3 slightly differs from FIG. 1 . The features in FIG. 2and FIG. 3 that differs from FIG. 1 are the only one's explained.

The mobile wireless broadband network interface card of the currentinvention is built into and installable in multiple auxiliary devicesincluding mobile phones, tablets, laptop computers, televisions,navigation devices and vehicles as a connecting modem that networks onbroadband wireless or WIFI nodes. A plug and play version of the modemis build for external ports such as USB.

FIG. 1 Is a diagram of the critical embodiments of the presentinvention. It represents a Mobile Wireless Broadband Network InterfaceCard (MWBNIC) for networking electronic devices and broadband nodes todeliver data. It comprises of a circuit board and a wireless radioantenna for wirelessly interfacing with the special wireless broadbandrouters known as K-Nodes that are connected to the Gwahanza LAN managersand servers by wires.

The User, memory and power Interface 1, is the input of the initialcommands such as power on that sends signals to the processor 2 toexecute and initiate connectivity and data flow. The modulator 3,converts the digital commands from the processor 2, into analog signalfor transmission wirelessly to a K-Node (not shown). The WirelessBroadband Network Interface Card modem converts outgoing digital datainto a form that is transmittable over the airwaves. The K-Node convertsit back to digital and then electrical signal and submitted to theGwahanza LAN Manager via wire.

The frequency up or down converter 5, ensures the frequency in use atthe node is the same as the transmission frequency within the card. Themodulated data signal is then merged with the transmission wave. The RFfilter 6, ensures transmission takes place without extraneous signal.

The duplex broadband filter 7 coupled to the wireless radio antenna, isa two way filter that ensures outgoing data is what it is meant to beand the incoming data is at the right frequency or frequency range. Theoutgoing data signals 8, are wirelessly transmitted to a K-Node (notshown). The filter is dual mode meaning it filters narrow band below 2.4GHz and broad band 2.4 GHz-5.x GHz, Microwaves and Infrared utilized oneat a time. Amplifiers 4, 14 are utilized to enhance incoming andoutgoing signal.

The MWBNIC embedded packet control protocol (PCP) pushes, pops, comparesand deletes packets from cache when a device is in motion. The PCP isconnected to a mechanism for determining bandwidth on nodes, anothermechanism for switching frequency to that of the next K-node and apre-determined connectivity data set that directly connects devices inmotion. These are means for networking. The Gwanhanza data set isdownloaded to devices.

Part 13 filters narrow bands 10 out and narrow bands 11 in. Narrow bandincludes cellular signals. Either the broadband part 7 is active or thenarrow band part 13 but not both at the same time. The incomingbroadband signal 9 from a wireless K-Node and all other signals passthrough the antenna 12 coupled to the duplex filters.

A demodulator 15, is utilized to convert incoming signal into digitalfor processing. The data packets transmitted to the wireless broadbandNetwork Interface card are received via at least one input port andconverted to digital format for use by the device in which it isinstalled

The Network Packet Controller 16, with an embedded Packet ControlProtocol manages connectivity and data transmission within the MobileWireless Broadband Network Interface Card. It executes from the networkpacket controller in the MWBNIC and identifies data packets by packet IDwherein, the next packet selected for processing has an id of a highermagnitude than the packet from the previous K-Node.

The Network Packet Controller is coupled to a processor and dedicatedcache 17 temporarily stores networking and service data when a device isin use. Networking data is all stored in data structures such as stacksin the cache. Service data is stored on stacks, in queues and other datastructures that provide first-in first-out order. The last few N datapackets on the last stack of one K-Node (special router) is utilized forcomparison to ensure packet order and data continuity when networkingdata from two different K-Nodes. Networked data delivered to electronicdevices in motion or stationed via the MWBNIC includes narrow andbroadband spectrums.

The networking data packets transmitted to the wireless broadbandNetwork Interface card are received via at least one input port andconverted to digital format for use by the device in which it isinstalled.

The Wireless Broadband Network Interface Card converts outgoing digitaldata into a form that is transmittable over the airwaves and this formincludes radio waves, microwaves and infrared.

The converters and filters 18, ensures outgoing and incoming signal frominput/output is filtered and converted to analogue or digital as needed.A plurality of data ports 19 coupled to the processor, modulator anddemodulator through the network packet controller allows for interactionwith the networked devices.

In the primary implementation method, the Gwahanza Local Area NetworkManager connected to the wireless K-Nodes (special routers) by physicalwires such as fiber optics controls connectivity and K-Node switching.In the secondary method, the Mobile Wireless Broadband Network InterfaceCard controls its own connections and switching of nodes.

When implemented to control network connectivity and switching of nodesindependently, the Mobile Wireless Broadband Network Interface Card isembedded with a mechanism for determining signal strength of nodes inrange. This is coupled to the network packet controller and processorfor switching nodes and maintaining data continuity.

In another implementation, every other K-Node operates at differentfrequencies from that of the neighboring K-Node. Networking data packetsof the wireless broadband network interface card are received from everyother node at specific frequencies. The card easily finds the nextK-Node to connect to based on frequency at which the K-Nodecommunicates. The frequency up or down converter coupled to the networkpacket controller accomplishes the task of switching to frequency of thenext K-Node to be connected to. The process is automated. The spectrumwhose frequencies are utilized includes radio waves, microwaves andinfrared. One or more filters are utilized to establish more than onesimultaneous connection.

The software that runs the card contains a table or log with all K-Nodeand Gwahanza locations in each sub Wide Area Network (SWAN) and theirpre-determined values of coordinates or positions for each shortdistance such as one meter or less. The values provide the next K-Nodeto connect to based on a device's distance and coordinates. The table ofnodes is automatically updated.

The Gwahanza which manages connected devices, instructs devices with theMWBNIC to connect to specific K-Nodes as they move from one location toanother. The K-Node to connect to next depends on signal strengthrelative to direction of motion of the device. Communication frequencyof the K-Node is utilized by the Gwahanza in making the K-Node selectionin one implementation.

The log or table in the card is kept on the Gwahanza Local Area NetworkManager but at a much wider level covering a very large area of LANs.

To calculate position and coordinates of a device relative to K-Nodes,the algorithm in both the Packet Control Protocol and Network ControlProtocol utilize time to leave (TTL) from the connecting device andarrival time (AT) to obtain the signal travel time by subtractingAT−TTL. It multiples this by the signal speed to obtain the devicedistance from each K-Node in the vicinity. The Gwahanza LAN manager orthe MWBNIC utilize the pre-calculated and tabulated data in a log tospecify which next K-Node to connect to.

In the implementation where the card decides which next K-Node toconnect to, the card reads logs and choose the next K-Node. The protocolon the Mobile Wireless Broadband Network Interface Card is upgradedperiodically as the device is moved from one area to another.

Alternatively the next K-Node is determined by calculations usingdistances between the device and node instead of logs.

The K-Net implements signal transmission as seen in the Network ControlProtocol included in this patent application under FIG. 10 . The Networkcontrol Protocol (NCP) can be installed on a server to run withoutGwahanza managers.

Incoming signals are divided into networking signals and data signals.In one implementation, wireless nodes transmit broadband networkingsignals at the same frequencies and they all come through the samefilter as seen in FIG. 1 (9). Under this implementation, the MobileWireless Broadband Network Interface Card (MWBNIC) is instructed to readand filter in specific frequencies or ranges of frequencies whileignoring any other frequencies.

The mobile wireless broadband network interface card is instructed bythe Packet Control Protocol embedded in it or by the Card ControlProtocol on the nearest Gwahanza what node to connect to next based onits position from the nearest nodes. In such a case, calculations areused to obtain relative positions. Alternatively, K-Node performancedata is read directly from log tables and utilized in the determinationof the next K-node to connect to.

If three data structures (stacks) are utilized in recording incomingdata, the writer module writes to stack one and moves onto stack twothen stack three. While writing to stack three, the delete module startsdeleting stack one. By the time the writer finish writing to stackthree, stack one is available for write. Alternatively, multithreadingis applied to write and delete to stacks concurrently.

The incoming connection signal also referred to as networking signal,comes through the Frequency Up or Down Converter which matches thefrequency of the broadcasting node to connect to. Upon establishing aconnection, data is sent to the Demodulator 15 from where carrier wavesignal is filtered out and radio data signal converted to digital formatfor processing.

Upon demodulation, the digital data packets are sent to the NetworkPacket Controller 16 coupled to the cache, modulator and demodulator tocontrol data packets in and out of the mobile wireless broadband networkinterface card. The network packet controller sends the demodulated datathrough filters and converters 18 to its destinations such as theCommunication Ports or display 19. The MWBNIC simultaneously receivesdata packets from multiple nodes/net extenders via at least one inputport and deletes the old ones while replacing them with the new packets.In order to maintain packet continuity the Network Packet Controllerinstantaneously saves the last N packets from each of the nodes that areconnected to in memory and deletes the previous N data packets. These Npackets are always the last ones and are saved in dedicated cache memory17 or elsewhere for quick access. Old packets are continually deleted.The cache memory 17 may be a dedicated chip as shown or part of therandom access memory 1 or part of the processor. Similarly, the NetworkPacket Controller (16) may be incorporated into the central processingunit 2.

The packet control protocol embedded in the network packet controllerpushes data packets onto a data structure such as a stack in cache andpops the data packets from the data structure when it is time forcomparison of packets. The packets are identified and compared by packetid. The last data packet stored in memory from the last N packets iscompared to the first data packet in a newly connected to K-Node todetermine consecutive data packet order. The last packet from a K-Nodeis set to X−1 and the first packet from the newly connected to K-Node isset to ID=X making it the current data packet.

When the last packet on the previous node is pushed onto a memory stackand compared to the first packet from the new node such that order ismaintained, the new node packets are written to that new stack. If threestacks are used at a time, stack X and X−1 are considered current. Theoldest stack X−2 is deleted to allow for new data.

FIG. 2 is a slight variation of figure one. Under this architecture,each of the three filters takes a specific frequency range that isdifferent from the other two. The Mobile Wireless Broadband Network Cardreads a frequency or frequency range into each of the three filters. Inone implementation, it activates data from the nearest node in itsdirection and this is based on signal strength.

It listens further and connects to a second node whose frequency rangematches that of the second filter.

The two nodes are connected simultaneously but they each write data toits own allocated memory space. Data from each filter is directed to itsspace because it comes from a different node. A module is also assignedto write that data and another to compare data from two wireless nodes.Threads may be utilized to accomplish some of the tasks.

In each case, the card stores the last N packets in different temporarystorages. Data packets are compared by packet ID. The packet controlprotocol pops the last packet to be pushed onto a stack or other storagetype and compares the last packet from the oldest node to the packet Idof the first packet on the new node. It sets the oldest packet with idX−1 as previous and the new one with id X as current packet.

Data packets in the mobile wireless broadband network interface card aredivided into two categories. One is the networking category that allowsa mobile device to move from one node to another or connect to multiplenodes simultaneously and maintain the data packet order and continuity.The other is the actual data intended for user device. Service datapackets in each category are received at different frequencies that areassigned specific ports. The Packet Control Protocol embedded in theMWBNIC maintains order and continuity of packets from different nodes.It compares the packet ID from a previous K-Node to the packet id of thenewly connected to K-Node wherein sets a packet with ID X−1 as previousand one with packet ID X as the current data packet.

The communication packets intended for networking devices and nodes aretransmitted at their own frequencies different from the actual datatransmitted over the network for the user device. In anotherimplementation, the networking packets are flagged and transmitted atthe same frequencies through all nodes.

Networking data packets of the wireless broadband network interface cardof are received from every other node at specific frequencies whereinthe connecting Mobile Wireless Broadband Network Interface card easilyfinds a frequency under which to connect to the next K-Node.

The three filters 7, 8 and 9 in FIG. 2 , each filters in only one or arange of networking data packets. Since every other node broadcastscommunication or networking data packets at a different frequency orrange of frequency, the nodes in range in a given direction connectsautomatically each through a different filter. The mobile wirelessbroadband network interface card does not need help of a Gwahanza LANManager to switch nodes under this implementation. Only frequency hopesaccomplishes the task of switching nodes though in anotherimplementation, the Gwahanza LAN Manager instructs the device what nodeto connect to.

Utilizing the auto connection based on frequency hops of the nodes orsignal strength, the mobile wireless broadband network interface cardreads established tabulated data with positions of all nodes for a givendirection and determine which nodes to connect to and which to drop.However, the oldest nodes drop automatically as they get out of range ofthe networking frequency. Frequency filters establishes the K-Nodes toconnect to automatically which allows for simultaneous connections.

The second category is that of the actual service data that a userdevice needs. This includes television data, videos, telephone, audioand text, navigation, video conference data and so on. Each type ofservice data received through the mobile wireless broadband networkinterface card is transmitted at specific ranges of frequencies so thatall services flow through simultaneously without interfering with eachother. A port is designated to each range of frequencies. Data packetsare identified by packet identification (PID) which PID is sequentiallyincremented and flagged for the data frame. The PID is used in writingthe last N data packets to a temporary storage memory from where theyare popped for comparison with new packets from a newly connected tonode. This temporary storage memory is a dedicated cache but it can alsobe part of the random access memory or the processor. Packet ID numbersappended to device identification also prevents signal interference whenmultiple devices are sharing the same space and frequency channels.

As showed in FIG. 7 , frequency hop refers to the alternation offrequencies on nodes that broadcast networking data packets. Thisenables automatic connection based on frequency in use. Afterestablishing a connection, the actual service data packets flow throughthe mobile wireless broadband network interface card as desired by theauxiliary device connected.

The main difference here from the implementation of FIG. 1 is that eachnode passes packets in a different filter at different connectionfrequencies. The connection frequency transmission is alternated atevery node and each filter takes a specific frequency or range offrequency to match the current node.

While frequencies of connection packets are alternated for every otherrouter, data packets for each type of data flow at the same dedicatedfrequencies throughout all the nodes. That is, if TV signals flow atfrequencies of A-C MHz on one node, it will flow through all nodes atthose frequencies. If navigation data flows at frequencies of D-G at oneK-Node, it will flow through all K-Nodes at that range of frequencies.

FIG. 3 is another variation of FIG. 1 , the architecture of FIG. 3receives and transmits signal through one filter 7. The communicationfrequency is irrelevant but that of the actual data remains the samethrough all nodes. Switching of nodes from one to another dependsentirely on signal strength 12,13,14 which is determined by a mechanismcoupled to the network packet controller and processor. A deviceconnects up to three nodes. The mobile wireless broadband networkinterface card listens to broadcasts from various nodes in range andreceives data packets from wireless K-Nodes through at least onecommunication port. It reads and determines their signal strength afterwhich connects to the one's with the strongest signal in its directionof travel.

The MWBNIC receives signal from the nodes with a time to live attributein the TCP header. It obtains the time it takes the signal to arrive bysubtracting time to leave from arrival time (T=AT−TTL). Multiplying Twith signal speed provides device distance from the node. If connectedto three nodes, three arbitrary circles are drawn with device distanceas the radius. The intersection of those circles provide the coordinatesof the device (X,Y). Alternatively, straight lines are drawn betweenpairs of nodes through the device position generating multipletriangles. The triangles are geometrically utilized to determine anydistance required from the nodes. These methods of determining devicecoordinates and distances are utilized in other devices that we design.

Signal travel time is multiplied by signal speed to get device distancefrom the K-Nodes connected to. The distances are then utilized to obtainany other data needed such as device coordinates.

The Mobile Wireless Broadband Network Interface Card is assigned ahardware MAC address by which it is identified on the network inaddition to its Internet Protocol Address.

Another computation from change of position gives the second position ofthe device with new coordinates (X-x,Y-y) which tells the direction ofmotion by looking at which node's distance is increasing or decreasing.

Direction of motion in turn is utilized to determine which nodes toconnect to next.

The K-Note broadcasts its presence.

When sending a connection request, the mobile wireless broadband networkinterface card submits its identifying information and type of devicerequesting for connection to multiple wireless K-nodes in range. Itconnects to the nodes with the strongest signal strength until a newnode with greater strength is encountered in its direction of travel.After authenticating to the new node, the previous node with the leaststrength is dropped. It receives data packets from wireless K-Nodesthrough at least one communication port and determines the strongestsignal strength to connection to.

The mobile wireless broadband network interface card connects to thenodes with the strongest signal strength until a new node with greaterstrength is encountered in its direction of travel dropping the one withthe least strength after authenticating to the new node. This isreferred to as auto connect.

The original usage of the priority processing field in the TCP header isto prioritize devices with different retransmission times in case atransmission was unsuccessful. In this network, we utilize that field toprioritize devices with critical need to connect over others. Under thisusage, a vehicle on a road may have higher priority over a phone deviceso the network lets the vehicle connect first. Though we use theoriginal field in the TCP header for compatibility with currentnetworks, we alternatively place it anywhere else in the TCP header orin the connecting Internet Address (IP).

A protocol for controlling networking data packets and actual datatransferred within a device is developed and named Packet ControlProtocol (PCP). It resides in the Mobile Wireless Broadband NetworkInterface Card (MWBNIC). The Packet Control Protocol in the MWBNIC iscoupled to a mechanism for determining bandwidth or signal strength onK-Nodes. It also determines positions of the card relative to the nearbyK-Nodes at any time.

The card reads K-Node transmission frequency. Utilizing either signalstrength or communication frequency of a particular K-Node, the MWBNICselects which K-Node to connect to without help from the Gwahanzamanager. It periodically downloads a routing table with nodes in thearea where it is located.

The mobile wireless broadband network interface card is instructed bythe Gwahanza LAN Manager to connect to a next K-Node based on itsposition from the nearest nodes wherein pre-determined data is utilizedto connect. Pre-determined data includes location of each K-Node andGwahanza LAN Manager and any positions between them and signal strengthat each location.

Another protocol named Network or Card Control Protocol (CCP) isdesigned to control activities between the MWBNIC and the wirelessK-Nodes The CCP resides in the K-Nodes.

The algorithm of FIG. 4 represents the Card Control Protocol (CCP) forcontrolling connectivity of moving devices and data flow on one or morenodes (K-Nodes/net extenders) without losing signal continuity.Utilizing this algorithm, frequency at which a node transmits connectionpackets plays a role in switching from one wireless router or netextender to the next.

Implementation of the Card Control Protocol depicted by FIG. 4 enablesthe Gwahanza LAN manager or server dictate which node (wirelessrouter/net extender) the mobile wireless broadband network interfacecard (MWBNIC) connects to. The MWBNIC does not decide which node toconnect to or drop in that implementation.

While in motion, the MWBNIC is instructed each time there is a need forchange of node and it connects to a new node. These nodes arepre-configured to broadcast connection signal at specific frequencieswhich are easily picked up by the Frequency Up or Down converter. Fordata continuity to take place, the MWBNIC has to be connected to atleast two nodes simultaneously.

At power on 1, the Mobile Wireless Broadband Network Interface Cardreads signal broadcast from nodes. It sends a request to connect to thenodes. The request which is in form of digital commands, is converted toanalog signal 2, by the modulator for transmission. The request includesdevice ID, type and location if known. The signal is amplified 3, andorganized into frames 4, which are merged with transmission waves at thefrequency up/down converter 5. This is coupled to the modulator fromwhere the signal is sent one frame at a time through the filter 6 to theantenna for transmission as radio waves.

The network system comes with two network protocols namely Card ControlProtocol (CCP) that runs from the K-Nodes and the Network ControlProtocol (NCP) that runs from the Gwahanza Local Area Network Manager orserver. The system comes with a third protocol namely the Packet ControlProtocol (PCP) that runs from the connecting device. The protocols worktogether to establish a connection.

When a node receives frames 7, the signal is forwarded to the GwahanzaLAN manager or server for verifying device ID and type of device. It isauthenticated upon verification.

Once connected 8, the packet control protocol (PCP) which executes fromthe Mobile Wireless Broadband Network Interface Card as seen in FIG. 1 ,records all the data required including frequency and K-Node ID 9. Thecombined system of protocol and Gwahanza LAN manager records N datapackets for each type of service the user accesses at any given time.After the first N packets, the subsequent packets become the last Npackets.

As for the last N packets of data stored at any given instance 10, adata structure such as a stack is used. Two or three stacks accomplishthis task for each data type. If the system utilizes N to represent 15data packets, we can use 3 stacks and write 5 packets to each stack.Once the first stack is full and at least one packet is written to thesecond stack, a delete method or function is called to clear the firststack with the 5 data packets. By the time the second stack is full, thefirst one is emptied and that is written to again. The process ofwriting and deleting the packets on stacks continue until there is nomore data flowing in. Other data structures, files or databases could beused but a stack is much faster because it is a last on first outstructure. The last packet to be written is always on top and it is thefirst one to be read off for comparison with a packet from a new node.Threads may be utilized to multitask.

If there is a new node in range to connect to 11 and instructed by theGwahanza LAN manager or server to connect to it, connect to the new node12.

As the device change positions 13, it discards the old N data packetsand replace them with the last N new ones on each node's temp storage.The device simultaneously connects to two or three nodes but sometimesit connects to only one K-Node when there are not enough nodes in range.

Algorithm of the Packet Control Protocol temporarily stores the last Ndata packets from a connected K-Node at anytime and deletes the previousN data packets from the dedicated memory. This is done to free upmemory.

Each data type is allocated its own memory to save the N packets. If thedevice is connected and different data types such as television, phoneand navigation signals are inflowing, as well as network instructionsfor switching nodes (K-Nodes/net extenders), there can be four differentgroups of memory allocations. If three stacks are used to store the lastN data packets for each type of data, the instructions for switchingnodes are allocated different memory areas. Television data is allocatedthree stacks, phone data is allocated three stacks and navigation datais allocated three stacks. Each data type has its own module that writesto its stacks so one data type does not interfere with writing on otherstacks. Multiple threads run concurrently to have many tasksaccomplished simultaneously.

If the device with a built in or connected Mobile Wireless BroadbandNetwork Interface Card (MWBNIC) is getting out of range 14, it connectsto a new node 15.

When data packets start flowing from a new node (K-Node/net extender),the last packet to be stored on the stack is popped from the temporarystorage 16, and compared to the first data packet from the new node 17.

If the current packet from the new node has ID of X and the packed ontop of the last stack to be written has ID of X−1, 18, then packet withID X−1 is set as the last packet and the new packed with ID X is set asthe current packet. The data stream continues to flow as if all packetscame from the same node.

After establishing data continuity from the old node and the new node,the old node 19, is dropped and its stacks emptied. If the device isstill in motion 20, the algorithm loops back to step 13 and continuedownwards else stay on the same nodes 21.

Every Gwahanza LAN manager has updated connection data of all nodes inthe Sub Wide Area Network (SWAN) and currently connected user devices onthe Local Area Network. However, it could as well store identities oflocal devices. When a user device from a different SWAN connects to aGwahanza manager that does not have its information because it islocated in a different WAN, verification and authentication takes placefrom the authentication servers.

All functions of the Network Packet Controller are alternatively placedin the microprocessor. Similarly, verification and authentication of theMWBNIC that takes place at the Gwahanza LAN manager could take place atthe K-Node level or at the authentication servers.

The algorithm of FIG. 5 depicts a different version of the packetcontrol protocol (PCP) that lets the mobile wireless broadband networkinterface card (MWBNIC) find its own node (K-Node/Net Extender) toconnect to. One of the differences between this version and the versionof FIG. 4 is that the MWBNIC connects to the wireless nodes withoutbeing instructed which to connect to.

The Packet Control Protocol in the Mobile Wireless Broadband NetworkInterface Card (MWBNIC) is connected to a mechanism for determiningbandwidth on nodes. It also determines positions of the card relative tothe nearby K-Nodes at any given time. Additionally, the card readsK-Node transmit frequency. Utilizing this data, the MWBNIC selects whichK-Node to connect to next without instructions from the Gwahanza LANmanager. It utilizes three different methods as follows.

The MWBNIC goes through steps 1-13 of the FIG. 4 algorithm. When thedevice is getting out of range of the currently connected to node 14, itproceeds to connect to a new node based on the method of choice 15, 17or 19.

The Packet Control Protocol is characterized by different memorylocations and modules for each data type that is delivered during devicehop from one K-Node to another.

If the implementation is one that depends on nodes changing transmissionfrequencies of communication packets, 15, a frequency change is detectedand matched in the device to switch to a new node. The deviceestablishes connection with the new node at the new frequency 16.

If the implementation is one that depends on signal strength to switchfrom a node to another, 17, the mobile wireless broadband networkinterface card reads signal strengths of all nodes in range and selectsthe best three to connect to 18. To ensure they are the right nodes toconnect to, the device finds its own direction and selects nodes thatare in that direction. Methods of determining device distance fromnodes, coordinates (x,y) and direction are established under thealgorithm of FIG. 3 .

In another implementation, the device depends on pre calculated andestablished values to choose nodes to connect to 19. Based on deviceposition (x,y), the device looks up routers with established connectionrange that is tabulate and it connects to those routers. Thepre-calculated and tabulated data saved in memory of the MWBNIC isupdated periodically to read positions of nodes and distances of itslocation relative to the nodes.

A device can also calculate its distance from the nodes and use thedistance to determine which nodes to connect to 20.

Methods of determining device distance from nodes, coordinates (x,y) anddirection are established under the algorithm of FIG. 3 .

The MWBNIC calculates its position and direction of motion. Itcalculates this from location of each node from three different nodes.Using its coordinate (x,y,z) and particularly the x value as the endpoint from the center of the node and distance x between them, it drawsan arbitrary circle around each of the nodes. The intersection ofcircles provides coordinates of the device.

In all the three methods above 14, 15, 16 or 14, 17, 18 or 14, 19, 20,the mobile wireless broadband network interface card (MWBNIC) devicelooks for the nodes and connects by itself without being instructed. Itreads broadcasted signals from the nodes and connect to one or morenodes at the same time.

When data packets start flowing from a new K-Node/net extender, the lastpacket to be stored on the stack is popped from the temporary storage21, and compared to the first data packet from the new node 22.

If the current packet from the new node has ID of X and the packed ontop of the last stack to be written has ID of X−1, 23, then packet withID X−1 is set as the last packet and the new packed with ID X is set asthe current packet. The data stream continues to flow as if all packetscame from the same node. The data port set as current or active fordevice data utilize a data structure that is first-in first-out such asa queue. A stack which is a last-in last-out, stores secondary data forcomparison. Two, three or more stacks are utilized to store data from asecondary K-Node that is about to become the next K-Node.

Service data of each kind is assigned to a specific port which port isassociated with specific frequency ranges. One device can run multipleapplications without interference from each other.

After networking, an application opened on a device submits a requeststating the type of service needed. The Network Control Protocol in theGwahanza LAN manager assigns an application port for both the device andGwahanza connection. If the device happens to be in motion, the portstays constant until the device is disconnected. When switching datasources (K-Nodes), the port and other connection info is forwarded tothe new K-Node. With reference to the connecting device, the portconnects at a specific range of frequencies to avoid interference fromother applications running on the same device. Alternatively, a new portis issued at each new connection.

After establishing data continuity from the old node and the new node,the old node 24, is dropped and its stacks emptied. If the device isstill in motion 25, the algorithm loops back to step 13 and continuedownwards else stay on the same nodes 26.

To check if the MWBNIC is still in motion, two variables are declared.Current distance and new distance and are both set to zero. Currentdistance is calculated and set to actual distance. After a change ofposition, the new distance is calculated and assigned to the newdistance variable. This is done for all connections to nodes. Thedirection that decreases most distance between the device and nodebecomes current direction that is N, NNE, NE, EN, EEN, E.

FIG. 6 is a representation of a data structure in a tabular form. Thedata structure could be a harsh table, list or other that allows quickdata access in the random memory. It is used in conjunction with thealgorithm of FIG. 5 . In one implementation, data resides on the userdevice (MWBNIC) and in another implementation; data is retrieved fromthe Gwahanza local area network manager or server on the network. Thetabular form shows a gateway to the internet, 1 that a device isconnected to. Utilizing routing tables, the gateway easily identifiesthe Wide Area Network (WAN) 2 where the user device is located. Tofurther narrow the search, identification (ID) of the Gwahanza LANmanager 3 on which the Network Control Protocol resides is used. Thisnarrows the search to only the nodes that are connected to that GwahanzaLAN manager. After locating the Gwahanza on which the user is located,the algorithm reads the actual node the user device is connected tosince a log of nodes is kept on the Gwahanza LAN manager when a deviceis in motion. Distance of the node 8 is used with two other distancesfrom two other nodes to determine coordinates of the device. Utilizingdevice coordinates and direction, the algorithm reads the next node toconnect to from the tabular data. Not shown in the attributes is thespeed of the MWBNIC.

Alternatively, the packet control protocol algorithm calculatesdistances from three nodes and its direction of travel then drawarbitrary circles whose intersection provides the (x, y) coordinates ofthe device. At any given device coordinate, the algorithm reads the nextnode, 7, to connect to in that direction from the table by comparing tothe coordinate, 5 in FIG. 6 . Not showed is the average speed of thedevice which is also tabulated. It is obtained from distance covereddivided by elapsed time St=D/t.

In the setup of FIG. 6 , switching a wireless router to connect to thenext one depends on real time calculated values by the device orpre-calculated and tabulated values that are stored and accessed. Thepre-calculated values may reside on the server and accessed remotely. Inanother implementation, these values resides on the device such thatthey are just called upon to direct the device on which node to connectto and which direction to take based on current device coordinates.

These pre-calculated values include all positions of nodes and GwahanzaLAN managers. They also include coordinates of all the positions inbetween the nodes in increments of one meter or less. To obtain theselengths, the algorithm utilizes positions of nodes relative to longitudeand latitudes in the vicinity of Gwahanza LAN managers. Degrees areconverted into distances and tabulated. Distances and angles of thenodes are utilized in conjunction with device speed and signal speedhence direction is calculated.

FIG. 7 . Shows a network of wireless nodes 1, coupled to Gwahanza LANmanagers, 2 by wires not shown. Gwahanzas are in turn connected toservers (not shown) by wires. The figure also shows Net Extenders 4,which are user devices that resides in homes or offices to providenetwork extension. The net extenders broadcast their presence to devicesthat run the packet control protocol. Those devices can connect to netextenders wirelessly. The network extender also has physical outputports that are connected to by Ethernet, Fiber and USB devices totransfer data. Subscribed Net Extenders are used from anywhere they canget access to the network. Number 3, is a picture of a device with abuilt in mobile wireless broadband network interface card (MWBNIC) toaccess service. The MWBNIC has versions that are pluggable into portssuch as USB to provide connectivity to other devices on a broadbandspectrum. Functions of the Gwahanza LAN manager, 2, are transferred to aserver if the wireless nodes are found to have reasonable ranges.

F1, F2, F3, F4 and F5 shown above the various nodes lies in a categoryof frequencies utilized to connect mobile wireless broadband networkinterface cards to nodes. These frequencies are different from thefrequencies at which service data flows. The network frequencies areinterchanged at every node so that neighboring nodes do not broadcast atthe same frequencies to attract the same device at the same time. Thishelps the device to automatically connect to the nearest frequency inrange. The implementation of FIG. 2 which provides more than one filterwhereby each filters only one frequency or range of frequency enablestwo or three nodes to be connected at the same time.

In the network of FIG. 7 , flat antennas, 5, are coupled to Gwahanza LANmanagers to harvest free television channels in the air. The signal isdemodulated to digital for television consumption. These channelsbecomes accessible to all devices that have this MWBNIC built in orplugged in via a communication port such as USB or Firewire. Thetelevision signals are collected and distributed in real time and savedas well for later distribution. Like all other services, the televisionservice has its category of frequencies that allows all types of data toflow simultaneously without interference each other. The WirelessBroadband Network Interface Card is built with at least one externalport that connects to wires including fiber optics.

Some of the Gwahanzas 2, of FIG. 7 are connected to line of site dishantennas 6, that receives data signals from other antennas 7 usingmicrowave radio transmission. The dish antennas connected to Gwahanzasare placed on higher ground and utilized to bridge signal across rivers,mountains or places where it is difficult to run fiber wires.

The nodes in FIG. 7 have either F1, F2, F3, F4 or F5 on them asnetworking frequencies. This is frequency hop which refers to thealternation of frequencies on nodes that broadcast networking datapackets. The purpose is to enable automatic device connection based onfrequency in use. Up to five networking frequencies are utilized becausethere can only be five nodes in each node's neighborhood. That is, everyfour nodes surrounding one node and overlaps its connection range mustbe at different frequencies. Direction of travel determines the two orthree nodes to connect to at any given time.

FIG. 8 represents a Local Area Wireless Broadband Network (LAWBN)comprised of a connected device 1 with a Mobile Wireless BroadbandNetwork Interface Card (MWBNIC) for authenticating and networking. TheMWBNIC in the mobile device 1 is connected through a wirelesstransmission 2 to a data source (K-Node) 3 a. The K-Node is connected tothe Gwahanza Local Area Network Manager 5 via a high speed data wire 2,represented by dotted lines (3 a to 5). The Local Area Network Managedby the Gwahanza is also comprised of other wireless K-Nodes 3independently connected to the Gwahanza 5 by wires 4. Each K-Node isdirectly connected to the Gwahanza with a designated wire. The wires arefiber optics or other that delivers high speed data transmission.

Prior to connecting, a device submits it's connection request whichincludes its identity. The device identity is comprised of its MACAddress, IP Address and other data such as its location (x,y,z), phonenumber. The K-Node appends its id and forwards that information to thenearest Gwahanza Local Area Network manager with attached K-Nodes 3.

The Gwahanza verifies the device identity from the servers andauthenticates the device. The device then connects through the wirelessK-Node to which it sent the connection request. The Gwahanza which ischaracterized by a Network Control Protocol provides connection portsand records the connection.

The log includes the device's current location, direction of motionrelative to the wireless K-Nodes within range, the current local areanetwork WAN, the current K-Node connected to, K-Node distance, time, thecurrent network connection port and any application ports assigned bythe Gwahanza. The Gwahanza establishes the next K-Node and adds it tothe log for swift retrieval when needed. The next K-Node changes whenthe device changes direction.

When the device is getting out of the Gwahanza's local area networkrange, the Gwahanza reads the routing table and forwards the device tothe next Ghahanza Network Manager which acts as a server. When a deviceis getting out of range of a K-Node currently connected to, the Gwahanzagenerates a connection code and appends it to the device's identity tocreate a connection request to a new K-Node. The connection requestincludes the next K-Node to connect to as the interface, the Gwahanza'sid, the device identity and the randomly generated connection code. Themodem is instructed by the Gwahanza LAN Manager what node to connect tonext utilizing frequency of the broadcasting K-Node in range or signalstrength and a connection code.

The connection request is submitted by the Gwahanza to the next K-Nodeto connect to 3 b via a wire represented by dotted lines of mixed lengthdots 6. This is from Gwahanza 5 to the wireless K-Node 3 b. That way,the next K-Node expects an incoming connection request. We notice thatthe dotted line 6 between the mobile device 1 and the K-Node 3 b isbidirectional.

The connection request submitted to the next K-Node to connect to 3 b inFIG. 8 is also sent to the connecting device 1 via the wire 2 withdotted lines and the wireless K-Node currently connected to 3 a.

Upon receiving the connection request, the connecting device 1broadcasts it to nearby K-Nodes. The K-Nodes in range peaks at theheader which includes id of the next K-Node and ignores the request whenit doesn't belong to them. Only the K-Node whose id is the same as thatone in the connection request authenticates the device. The next K-Node3 b to connect to retrieves the request it received from the Gwahanzaand compares it to the one from the connecting device then authenticatesthe device to switch to that new K-Node. This is a highly secure methodof connecting and switching nodes. Data is strictly directed to thedevice with specifics that only that device can provide to authenticate.The connection code changes for every connection request.

The Gwahanza generates a connection code that it appends to theconnecting device's identity along with the Gwahanza's id and the nextK-Node id to submit via a wire to the next K-Node as a connectionrequest for authentication. It submits the same connection request tothe connecting device via the K-Node it is currently connected towherein the device broadcasts the connection request. The connectionrequest is picked and processed by the next K-Node for authenticationand service.

A connection request sent to multiple wireless K-Nodes in range forauthentication includes device identity and the type of devicerequesting for connectivity. Service request includes type ofapplication for port designation. The service providing server orwebsite provides a service code to the device. The service code is aonetime use. Each service request gets a new code.

In another implementation, type of device field is placed in theconnecting IP address of the device. After connection, type of servicesought is associated with a communication port at specific frequencyranges.

In the implementation where the MWBNIC is in charge of selecting thenext K-Node, the next K-Node to connect to is selected based on currentrelative position of the device and its distance from the K-Node interms of signal range. Alternatively, it is selected based on wavelengthat which the K-Node interacts with devices and hence subsequentfrequency.

Whether the Gwahanza Local Area Network Manager controls the connectionsor the MWBNIC, the K-Node the device connects to is read from thepre-determined positions and signal strength logged on the MWBNIC or theGwahanza. The positions and signal strengths are also obtained bycalculations based on the available parameters.

The Mobile Wireless Broadband Network Interface Card stores temporaryconnection data from the network in its memory. The data is stored in amini database in one implementation and in another implementationconnection data is stored in a file placed in memory such as flush. Itis retrieved to physical memory prior to completing authentications andnetworking. The MWBNIC interacts with a mini database or file on thecard that stores temporary information from the network wherein datastored in this database or file is utilized to complete authenticationand a network connection.

The Packet Control Protocol software of the Mobile Wireless BroadbandNetwork Interface Card interacts with the mini database on the card thatstores temporary information from the network. The data is utilized tocomplete network connections and switching from one K-Node to another.Similarly, the software accesses the data when the data is stored in afile instead of a database.

The Gwahanza establishes a small local area network (LAN) comprised ofitself the manager, several wireless K-Nodes connected to it by highspeed wires such as fiber optics and the connecting devices.

The Gwahanzas store logs of all wireless nodes on their local areanetwork. These logs include but not limited to geo-locations of all thewireless K-Nodes and radius under which they perform well.

When a Mobile Wireless Broadband Network Interface Card requests for aconnection, or move to a new location where it is going out of range ofthe current connection, the Gwahanza reads the logs and determines whichwireless node is to sustain the MWBNIC based on its current position anddirection.

In one implementation, the Gwahanza receives signal from the MWBNIC viaa K-Node and utilize arrival time of the signal, time to live (TTL) andtime spent on the way in relation to nearby wireless nodes to calculateposition of the connecting device. However, it keeps a routing table orlog of all the K-Nodes it serves and values of signal strengthcorresponding to each location it serves.

In another implementation, the MWBNIC calculates its own position basedon the signals it receives from the nearby wireless nodes to determineits coordinates. In that case, time=time to leave (TTL)−arrival time(AT). Distance=signal speed x time. Utilizing at least three K-Nodeswith known positions, it determines its own position. It then sends itscoordinates along with other identifying data to the Gwahanza to guideits motion or guide its own destiny by connecting and disconnecting fromall the K-Nodes it goes through.

K-Nodes broadcasts their presence. The mobile wireless broadband networkinterface card receives data packets broadcasted by nodes with a time toleave attribute and utilizes arrival time to determine the signal traveltime wherein, multiplication of signal travel time with signal speedprovides node distance and hence coordinates which are utilized indetermining which node to connect to. The said Gwahanza receives deviceconnection request from a wireless node via cable and verifies thedevice by reading device records on server wherein temporary networkdata is stored on the Mobile Wireless Broadband Network Interface Card.

The Gwahanza also receives service requests from connecting devices andassigns data ports based on type of service requested wherein theNetwork Control Protocol in the Gwahanza LAN manager assigns anapplication port for both the device and Gwahanza connection

The K-Nodes showed in FIG. 8 , are built with identifiers thatdistinguish them when they transmit data to the Packet Control Protocolof the Mobile Wireless Broadband Network Interface Card. The PCP whereinestablishes connectivity by comparing the identifiers of the K-Nodes toconnect to and saving the incoming signal from those nodes to buffer forauthentication and process.

FIG. 9 is the algorithm of the Card Control Protocol (CCP) that runs onthe K-Node. Instruction 1 receives connection requests. At instruction2, the algorithm checks if request is not from device 3. That means itis from the Gwahanza Local Area Network Manager. It stores the requestin memory 4. If at instruction 2, the request is from the device, it isforwarded to instruction 5 which checks to see if the request is aninstruction from the Gwahanza to switch to the K-Node. If theinstruction is for switching node, the step 6 retrieves what was storedin memory 7 and compares to the new request from the device 8.Instruction 9 checks to see if the two requests are identical. If therequests are not identical, the one from the device is discarded 10. Ifthe device and Gwahanza requests 11 are identical, the device isauthenticated and a K-Node switch takes place. Data stream follows 12.The protocol continues to listen to new requests 13. The protocolhandles multiple requests simultaneously utilizing threads or severaldesignated modules. It ends at instruction 14.

If however the protocol found the request at instruction 5 to be a firsttime connection request 15, it appends the id of that K-Node 16 andforwards the request to the Gwahanza Local Area Network Manager toverify device subscription with the server 17. If the device request isfound authentic 18, it is authenticated 11. Else if the device does notsubscribe to the service, the K-Node tries another time 19 beforereferring the user to customer support 20.

FIG. 10 is the algorithm for the Network Control Protocol (NCP) thatruns from the Gwahanza Local Area Network Manager. Instruction 1receives requests and checks to see if the requesting device 2 isconnected. If it is not connected 3, instruction 3 verifies the deviceidentity with the server. If the device does not subscribe 4, it isreferred to customer support 5. If the device subscribes, it is assigneda networking port 6 and authorization is sent to the requesting wirelessK-Node to authenticate 7. Instruction 8 checks if the device isconnected after authorization. If not connected, the authorization isre-submitted 9. A count is established up to N trial times. If thenumber of count reaches the maximum N, the authorization is sent to adifferent K-Node 10 and that K-Node is noted as non-functional. It ispinged and reported to tech support.

If the device with the MWBNIC is connected after authorization 11, theGwahanza LAN Manager records connection details including the currentK-Node connected to, device coordinates, motion direction, network portand time. If connected to any service applications, the applications andApp service ports are recorded. In addition system usage is updated forrouting purposes. If the connected device requests for service via anapplication 12, the Network Control Protocol in the Gwahanza LAN managerassigns an application port for both the device and Gwahanza connection.Service Port 13 is assigned to the particular service. That port is setto a designated range of frequencies to prevent interference from otherapps running on the same device. Service is provided 14. Instruction 15allows two processes namely data flow and network range check to takeplace concurrently.

One process may establish more than one simultaneous connection. Servicedata is transferred 16 while the other process is checking to ensuredevice connectivity is continuous and in proper range 17.

If the device is still in range 18, the instruction continue checking ina loop. Concurrence is executed by multiple threads, several modules orother means.

If the device happens to be in motion, the port stays constant until thedevice is disconnected. When the device gets to the minimum allowablepacket transfer rate or pre-determined range zone, instruction 19determines the next K-Node to connect to. When switching K-Nodes, theport and other connection info is forwarded to the new K-Node. Withreference to the connecting device, the port connects at a specificrange of frequencies to avoid interference from applications running onthe same device and other devices.

At instruction 21, the protocol generates a new connection code andappends it to the device identity, the id of the next K-Node to connectto, and the Gwahanza id. The device identity includes its MAC Address,IP Address and other data for identification and authentication. Thismakes up what is referred to as a connection request. The connectioncode can be provided independently. The connection code is stored untilthe next authentication.

The connection request is now submitted to a new K-Node to connect to22. If the connection request 23 is not received, a count 24 isestablished. If count gets to maximum allowed, the protocol switches toa new K-Node to connect to 25. Once the connection request is received,the Gwahanza also submits it to the connecting device 26. If theconnection request 27 is not received by the device, a count 28 isestablished. When the count of resends gets to the maximum allowed, anerror 29 is generated and device is disconnected. If the device is stillconnected 30, the protocol receives data while connected and records theconnection details 31.

Not shown are steps for packet encryption, compression, decryption andverification with server.

1. A mobile wireless broadband network interface card (MWBNIC) device for networking electronic devices and broadband nodes to deliver data comprising: a circuit board; wireless radio antennas for wirelessly interfacing with wireless broadband routers connected to Gwahanza Local Area Network Managers and servers by wires; a broadband radio filter coupled to the wireless radio antennas; at least one amplifier for enhancing outgoing and incoming signals; a modulator for converting the outgoing digital signals into analog for radio transmission; at least one processor on the circuit board; a demodulator for converting incoming signals into digital for processing; a dedicated cache memory for temporarily storing last N data packets from one of the wireless broadband routers for networking with a next one of the wireless broadband routers to be connected to, to maintain data packet continuity; a network packet controller chip coupled to the dedicated cache memory; a modulator and demodulator to control data packets in and out of the MWBNIC device; a packet control protocol software embedded in the network packet controller chip coupled to the at least one processor for networking wireless nodes and delivering data to electronic devices in motion over broadband spectrums; a mechanism for determining signal strength of nodes in range coupled to the network packet controller chip and the at least one processor for switching nodes; a frequency up or down converter coupled to the network packet controller chip for switching to a frequency of the next wireless broadband router to be connected to; a table with node locations in each WAN and pre-calculated values of coordinates for each short distance of one meter or less that are extracted for determining which nodes to switch to; an interface to a user device from where power control and other commands are sent to the at least one processor for execution; and a plurality of data ports coupled to the at least one processor and the modulator and demodulator through the network packet controller chip to allow for interaction of said devices being networked and input output.
 2. The MWBNIC device of claim 1, further comprising modules to write data to memory and compare said data wherein said modules connects to at least one broadcasting K-Node when in motion.
 3. The MWBNIC device of claim 2, wherein the memory, further comprising data structures, simultaneously receives data packets from multiple nodes with identifiers that distinguish the nodes when said nodes transmit data via at least one input port wherein said modules instantaneously saves the last N packets from each of the nodes that are connected to in memory to the data structures and deletes the previous N data packets replacing the packets with new packets.
 4. The MWBNIC device of claim 2, wherein data packets in the MWBNIC device received by a network control protocol that assigns communication or networking ports are divided into two categories of networking and user device service data, wherein said packets in each category are received at different frequencies that are assigned specific ports.
 5. The MWBNIC device of claim 4, wherein the networking data packets further comprise packet ids or identifiers that are received from every other node at specific frequencies, wherein a connecting MWBNIC device easily finds a frequency under which to connect to the next K-Node.
 6. The MWBNIC device of claim 4, wherein each type of service data received through the MWBNIC device comprises packet identification, wherein said service data flows through a designated port at specific ranges of frequencies.
 7. The MWBNIC device of claim 1, wherein the network packet controller chip coupled to the at least one processor, modulator, demodulator and external ports utilizes an embedded packet control protocol that manages connectivity and data transmission within the MWBNIC device, wherein the MWBNIC device is built into devices as an internal modem or external plug and play modem.
 8. A network packet controller chip coupled to a modulator, demodulator, at least one converter and filter in the MWBNIC device of claim 1, comprising an embedded packet control protocol, wherein the packet control protocol comprises data structures, temporarily stores a last N data packets from a connected K-Node at anytime and deletes a previous N data packets in a dedicated memory, wherein new data packets replace deleted packets for packet continuity.
 9. The network packet controller chip of claim 8 comprising different memory locations and modules, wherein the embedded packet control protocol, allocates different memory areas for each data type that is delivered during device hop from one K-Node to another, wherein said data types comprise networking and user device service data packets.
 10. The network packet controller chip of claim 9, wherein the packet control protocol is further configured to execute from the network packet controller chip in the MWBNIC device and identify data packets by packet ID, wherein the next packet selected for processing comprises an ID of a higher magnitude than the previous one.
 11. The network packet controller chip of claim 10, wherein the packet control protocol configured to maintain order and continuity of packets from different nodes and compare the packet ID from a previous K-Node to the packet ID of the newly connected to K-Node, wherein said packet control protocol sets a packet with ID X−1 as previous data packet and one with packet ID X as current data packet.
 12. The network packet controller chip of claim 11, wherein the packet control protocol further configured to push data packets onto at least one stack in cache and pop the last packet for comparison to the first data packet from a newly connected to K-Node, wherein said packet control protocol maintains packet order based on packet Id, K-Node ID and frequency.
 13. The MWBNIC device of claim 1, further configured to send a connection request to multiple wireless K-nodes in range, wherein said request comprises MWBNIC identification and other data that is transmitted to the nodes for authentication.
 14. The MWBNIC device of claim 13, wherein the mechanism for determining signal strength, receives data packets from wireless K-Nodes through at least one communication port and determines the strongest signal strength to connect to.
 15. The MWBNIC device of claim 14, further configured to connect to the nodes with the strongest signal strength until a new node with greater strength is encountered in the device's direction of travel, wherein said device drops the one with the least strength after authenticating to a new node as the device gets out of range of the K-Node's networking frequency.
 16. The MWBNIC device of claim 2, further configured to receive data packets broadcasted by nodes with a time to leave attribute and utilize arrival time to determine the signal travel time, wherein multiplication of signal travel time with signal speed provides node distances and hence coordinates of said nodes for connection.
 17. The MWBNIC device of claim 16, further configured to read pre-determined and tabulated positions data, wherein said data provides the MWBNIC device with the next node to connect to based on the node's calculated distance and coordinates.
 18. The MWBNIC device of claim 4, further configured to connect automatically to different nodes each through a different frequency filter establishing more than one simultaneous connection, wherein data flow, network range check, and signal strength check of said nodes takes place concurrently.
 19. The MWBNIC device of claim 2, further configured to be instructed by the Gwahanza Local Area Network Manager what node to connect to next, wherein frequency of the said broadcasting K-Node in range or signal strength and a connection code are utilized.
 20. The MWBNIC device of claim 19, further configured to be is instructed by the Gwahanza Local Area Network Manager to connect to a next K-Node based on the MWBNIC device's position or coordinates from the nearest nodes, wherein pre-determined and tabulated position data of said K-Nodes stored on the MWBNIC device or read from the Gwahanza is utilized to connect.
 21. The MWBNIC device of claim 5, wherein the data packets transmitted to the MWBNIC are received via at least one input port, wherein said data packets are converted to digital format for use by a device in which the MWBNIC is installed.
 22. The MWBNIC device of claim 18, wherein said MWBNIC device converts outgoing digital data into a form that is transmittable over the airwaves.
 23. The MWBNIC device of claim 3 is configured within auxiliary devices including mobile phones, tablets, laptop computers, televisions, vehicles, cameras, navigation devices and any that requires wireless networking; as a connecting modem wherein said data ports are designated for different services at specific ranges of frequencies.
 24. The MWBNIC device of claim 3 is configured to plug into external ports of devices including USB and Firewire as a plug and play modem, wherein said data packets from multiple nodes maintains connectivity and deliver services.
 25. The MWBNIC device of claim 23 is configured with at least one external port, wherein said port connects to wires including fiber optics.
 26. The network packet controller chip of claim 9, wherein the packet control protocol is configured to interact with a mini database on the MWBNIC device that stores temporary information from the network, wherein said data stored in the database is utilized to complete a network connection.
 27. The network packet controller chip of claim 9, wherein the packet control protocol is configured to interact with a file on the MWBNIC device that stores temporary information from the network, wherein the data stored in the file is utilized to complete a network connection.
 28. A method of connecting and switching a mobile device with a mobile wireless broadband network interface card (MWBNIC) device on a wireless network from one K-Node to another utilizing a Gwahanza Local Area Network manager, wherein a Network Control Protocol (NCP) that determines the mobile device's location and direction of motion relative to the wireless K-Nodes in range in conjunction with the K-Node frequencies, wherein said NCP directs the MWBNIC device to the next K-Node to connect to for service, and wherein the K-Node runs a Card Control Protocol over broadband spectrums including Wi-Fi.
 29. The method of claim 28, wherein the Gwahanza Local Area Network manager generates a connection code that said Gwahanza Local Area Network manager appends to the connecting device's identity along with the Gwahanza's ID and the next K-Node ID, wherein said NCP submits via a wire to the next K-Node a connection request for authentication.
 30. The method of claim 29, wherein said Gwahanza Local Area Network manager submits the same connection request to the connecting device via the K-Node or Net Extender said device is wirelessly connected to, wherein the device broadcasts the connection request over a Wi-Fi network and the request is picked and processed by the next K-Node or Net Extender for authentication and service.
 31. The method of claim 30, wherein the Card Control Protocol in the next K-Node or Net Extender receives a device connection request from a Gwahanza Local Area Network Manager and stores the request in memory, and receives a connection request from the MWBNIC device over a Wi-Fi network or other broadband spectrum, wherein the card control protocol compares the connection request from a Gwahanza Local Area Network Manager and stores the request in memory, and receives a connection request from the MWBNIC device over a Wi-Fi network or other broadband spectrum, wherein the card control protocol compares the connection request submitted by the device to the connection request submitted by the Gwahanza Local Area Network Manager and authenticates the device to switch to the K-Node to maintain data continuity.
 32. The method of claim 28, wherein said Gwahanza Local Area Network manager determines the next node for the MWBNIC device to connect to based on wavelength or frequency at which the wireless K-Node is communicating.
 33. The method of claim 31, wherein said Gwahanza Local Area Network manager receives the device connection request from a wireless node via a wire and verifies the device by reading device records on a server utilizing the Network Control Protocol, wherein said connection request submitted to the Gwahanza Local Area Network manager generates temporary network data which is stored on the MWBNIC device.
 34. The method of claim 33, wherein the Gwahanza Local Area Network manager receives service requests from connecting devices and assigns data ports based on type of service requested, wherein the Network Control Protocol in the Gwahanza Local Area Network manager assigns an application port for both the device and Gwahanza Local Area Network manager connection; and data packets are received at different frequencies for each service.
 35. The MWBNIC device of claim 3, wherein said Packet Control Protocol establishes connectivity by comparing the identifiers of the K-Nodes to connect to and saves the incoming signals from those nodes to buffer for authentication and process.
 36. The MWBNIC device of claim 7, further configured to concurrently write to and delete from different data structures or memory locations that temporarily store incoming data, wherein said packet control protocol, card control protocol and network control protocol, networks said modem and wireless K-Nodes.
 37. The MWBNIC device of claim 23, further configured to network devices on Wi-Fi nodes to deliver services while in motion connects from one Wi-Fi node to another, wherein said services are subdivided into categories specifying the type of data transmitted, the respective frequencies and assigned ports.
 38. The MWBNIC device of claim 23, wherein the connecting modem in the auxiliary devices is authenticated by the Gwahanza Local Area Network Manager through a K-Node or Net Extender node on a Wi-Fi network to transmit data, wherein the modem simultaneously connects to more than one wireless network node to maintain data continuity when a device is in motion and when switching from one wireless data source to another.
 39. A system comprising: protocols for maintaining packet order and continuity for devices in motion and stationary on a network by facilitating authentication, node switching while in motion, and data transmission; a Gwahanza Local Area Network Manager that runs a Network Control Protocol, a K-Node router that runs the Card Control Protocol and servers all connected by high speed transmission wires; a Net Extender that connects to Wi-Fi nodes and other broadband spectrums, wherein the Net Extender resides in homes or offices to provide network extension to other devices wirelessly or by wires; a mobile wireless broadband network interface card (MWBNIC) device built into auxiliary devices as a connecting modem that simultaneously connects to more than one wireless node on a Wi-Fi network for service and networking; a Network Packet Controller Chip with an embedded Packet Control Protocol, coupled to a processor in said MWBNIC device for networking electronic devices and broadband nodes to deliver data on broadband spectrums including Wi-Fi and cellular networks; a connection code that changes for every connection request to enhance security; and a plurality of data ports coupled to the processor, modulator and demodulator through the Network Packet Controller Chip, memory and user interfaces for requesting for services and displaying output.
 40. The system of claim 39, wherein the Net Extender further comprises physical ports that are connected to by Ethernet, Fiber, USB and other device ports to transfer data, wherein the Net Extender device is embedded with a Card Control Protocol that receives a connection request from the MWBNIC device on a Wi-Fi network and acts as an independent K-Node router providing access to the device, in addition to home or office devices including televisions, computers and accessories; on the Wi-Fi network, wherein the Net Extender wirelessly connects to K-Node routers and Gwahanza Local Area Network Manager.
 41. The system of claim 40, wherein the Card Control Protocol utilizes a connection request from the Gwahanza Local Area Network Manager stored in memory and authenticates a mobile wireless broadband network interface card in motion to switch from one node to the next Net Extender where data stream follows, wherein the Network Control Protocol embedded in the Gwahanza Local Area Network Manager determines the next Net Extender or K-Node to connect to, to maintain packet continuity.
 42. The system of claim 41, wherein the Gwahanza Local Area Network Manager stores logs of wireless nodes on local area networks including geo-locations and radii under which the nodes perform well, wherein the logs of geo-locations of the nodes and radius under which said nodes perform well determines which wireless node to connect to, to sustain the Mobile Wireless Broadband Network Interface Card data continuity based on position and direction. 