US20060041931A1 - Service level assurance system and method for wired and wireless broadband networks - Google Patents

Service level assurance system and method for wired and wireless broadband networks Download PDF

Info

Publication number
US20060041931A1
US20060041931A1 US11/089,238 US8923805A US2006041931A1 US 20060041931 A1 US20060041931 A1 US 20060041931A1 US 8923805 A US8923805 A US 8923805A US 2006041931 A1 US2006041931 A1 US 2006041931A1
Authority
US
United States
Prior art keywords
client
network
user device
server
spi
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/089,238
Inventor
Robert Boxall
Vojislav Samsalovic
Biju Nair
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Smith Micro Software Inc
Original Assignee
PCTel Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by PCTel Inc filed Critical PCTel Inc
Priority to US11/089,238 priority Critical patent/US20060041931A1/en
Assigned to PCTEL, INC. reassignment PCTEL, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BOXALL, ROBERT, NAIR, BIJU, SAMSALOVIC, VOJISLAV
Publication of US20060041931A1 publication Critical patent/US20060041931A1/en
Assigned to PCTEL, INC. reassignment PCTEL, INC. CORRECTIVE COVERSHEET TO CORRECT ASSIGNMENT PREVIOUSLY RECORDED ON REEL 016950, FRAME 0623. Assignors: BOXALL, ROBERT, NAIR, BIJU, SAMSALOVIC, VOJISLAV
Assigned to SMITH MICRO SOFTWARE, INC. reassignment SMITH MICRO SOFTWARE, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: PCTEL, INC.
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0813Configuration setting characterised by the conditions triggering a change of settings
    • H04L41/082Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/40Bus networks
    • H04L12/403Bus networks with centralised control, e.g. polling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • H04L41/5061Network service management, e.g. ensuring proper service fulfilment according to agreements characterised by the interaction between service providers and their network customers, e.g. customer relationship management
    • H04L41/5067Customer-centric QoS measurements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • H04L41/5061Network service management, e.g. ensuring proper service fulfilment according to agreements characterised by the interaction between service providers and their network customers, e.g. customer relationship management
    • H04L41/507Filtering out customers affected by service problems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/091Measuring contribution of individual network components to actual service level
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/12Network monitoring probes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/162Implementing security features at a particular protocol layer at the data link layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/04Protocols specially adapted for terminals or networks with limited capabilities; specially adapted for terminal portability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/34Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters 
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/52Network services specially adapted for the location of the user terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/062Pre-authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • H04L41/5003Managing SLA; Interaction between SLA and QoS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • H04L41/5003Managing SLA; Interaction between SLA and QoS
    • H04L41/5009Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/10Flow control between communication endpoints
    • H04W28/14Flow control between communication endpoints using intermediate storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/18Information format or content conversion, e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup

Definitions

  • the present invention relates generally to systems and methods for network management, and more particularly relates to systems and methods for monitoring and managing the quality of service of a broadband service offering.
  • SLA Service Level Assurance
  • broadband providers typically continuous monitor and attempt to improve the quality of their service offerings.
  • Various methods are used for determining quality of service, all of which typically involve monitoring various network parameters. Among the network parameters that are typically monitored are: number of connect attempts, connection location (hot spot, dial up node, Ethernet node), signal strength, data rates (effective as well as available), connection duration, and so on.
  • a system and method are provided for tracking and reporting the performance of a network.
  • a client or a user device can access the network through a wired connection or wireless access points.
  • the client maintains a log or track the events that occur during the log-on attempts as well as the communication sessions as well as other data related to the network performance.
  • During the communication session data can be transferred between the client and a network device, such as the central server or a database, in the network, regardless of whether the network device is trusted and secure or not secure.
  • FIG. 1 illustrates in block diagram form the interoperation of the present invention with a service provider's network operations center;.
  • FIG. 2 illustrates in block diagram form an exemplary CCS architecture in accordance with the present invention
  • FIG. 3 illustrates in time line form an exemplary SPI client-server transaction where the SPI server is in the network provider's “Whitespace”;
  • FIG. 4 illustrates in block diagram form an exemplary SPI client-server transaction where the SPI server is not in the network provider's “Whitespace”;
  • FIG. 5 illustrates a simple message exchange sequence between the SPI client and the SPI server
  • FIG. 6 illustrates a message exchange between the SPI client and the SPI server involving authentication
  • FIG. 7A-7D illustrate an authentication sequence in an exemplary implementation of the present invention.
  • FIG. 8 is a flow chart for the process of authenticating a client.
  • the network management system (NMS) 100 of the present invention interacts with one or more devices 110 A-n (sometimes collectively referred to hereinafter as “devices 110 ”), which have been suitably configured to provide quality of service information to the NMS 100 .
  • the NMS 100 in turn communicates with the network operation center (NOC) 120 , which is not part of the invention and is typically resident at the premises of a network service provider.
  • NOC network operation center
  • Devices 110 A-n include computers having thereon a “roaming client” functionality, which includes Service Provider Interface (SPI) functionality, or a PDA, a Cell phone, a camera, an MP3 device, or any other network connected device or appliance capable with SPI functionality, that is, capable of contacting the NMS 100 and then executing appropriate commands received back from the NMS 100 including responding to queries with appropriate status information.
  • a “roaming client” functionality which includes Service Provider Interface (SPI) functionality, or a PDA, a Cell phone, a camera, an MP3 device, or any other network connected device or appliance capable with SPI functionality, that is, capable of contacting the NMS 100 and then executing appropriate commands received back from the NMS 100 including responding to queries with appropriate status information.
  • SPI Service Provider Interface
  • the NMS 100 includes, in an exemplary arrangement, three functional components, designated in FIG. 1 as a Central Configuration Server (CCS) 130 , a SPI 140 , and a Service Level Assurance (SLA) module 150 .
  • CCS Central Configuration Server
  • SPI Service Level Assurance
  • the exchange between an SPI-enabled device 110 and the SLA module 150 begins when an SPI-enabled device 110 provides information such as, for example, ID, location, IP address, and/or other relevant information.
  • the SLA module 150 queries, via the SPI 140 and CCS 150 , the appropriate SPI enabled devices 110 A-n, which in turn responds to the queries and provide appropriate information concerning location, connect attempts, failures, signal strength, available and effective data rates, and any other status or location information which the carrier deems appropriate.
  • the SPI 140 gathers the responses from the SPI-enables devices 110 A-n and, if necessary, formats the information for forwarding to the NOC.
  • the NOC includes appropriate functionality to accumulate the data from the SPI-enabled devices 110 A-n, and generate appropriate reports for management of the network resources. It will be appreciated that the foregoing approach has the advantage of allowing communication between the SLA module 150 and compatible, SPI-enabled devices 110 even if the SPI-enabled devices 110 are behind a firewall, because the protocol is text-based and is carried over standard HTTP(S) ports, typically ports 80 and 443 .
  • the present invention enables the client or device 110 to communicate with the NOC.
  • the functionality provided by the present invention also allows the NOC to communicate, through the NMS 100 , back to the SPI enabled devices 110 .
  • the NOC may desire to instruct the client or device 110 to perform various functions, for example launching a browser or other application, or directing users to a particular web page.
  • the operation may also include a push of content to the end user, or an upload or download of files, for example software upgrades, from a desired location, which may be either pre-arranged or specified on the fly.
  • One particular instance of redirecting a client device 110 may be to enable further communications. For example, if an account is not active, the NOC may direct the SPI-enabled device 110 to a provisional URL or other web page so that that user can obtain an account or otherwise establish credentials.
  • One aspect of the invention is the client-side functionality, represented generally at 110 A-n by the roaming client module or software indicated at 110 A-B, which includes SPI enablement, and by which network connectivity is achieved for a variety of SPI-enabled devices 110 A-n as described above.
  • the SPI capabilities incorporated into the roaming client and other SPI-enabled devices 110 include: aggregation of disparate wireless networks under one service umbrella; prioritization of wireless networks; support for seamless roaming between networks, including Wi-Fi and GPRS; support for automatic authentication between networks that have complex and non standard mechanisms for user authentication and administration; access Point Location database; and, automatic and remote update of network attributes, location database, and Roaming Client software updates. It will be appreciated by those skilled in the art that the SPI could easily be expanded to include other capabilities.
  • the SPI-enabled roaming client module 110 further includes several features that are remotely updateable and/or upgradeable, including the executable software, location finder database, roaming partner data, carrier/PCOEM/enterprise preferences, user interface skins, and hardware drivers.
  • the CCS 130 allows carriers, PC-OEMs, and Enterprises to manage the storage and flow of updates and upgrades to clients from a single location, and can further provide reporting and tools to manage the ability to push new data to clients.
  • the CCS 130 operates to provide version control, code management, and flow control for all updateable features within the Roaming Client software.
  • the CCS 130 allows management and manipulation of “Hotspot” location database information, roaming partner database information, and the gated upload capabilities for these databases.
  • the CCS 130 also allows the carrier, PCOEM, or Enterprise to manage versioned software files, such as executable files of the Roaming Client application and user interface skins.
  • the CCS 130 can be used in conjunction with the Roaming Client to update other files on a user's PC that are not directly related to the roaming client application, such as device drivers.
  • the CCS 130 also negotiates download parameters, such as bandwidth, frequency, and duration of downloads with each client, based on rules that are predetermined by the carrier, PCOEM, Enterprise, or configured by the end user.
  • the CCS 130 may be thought of as a secure, web-based administrative console, which provides the capability for updating the various pre-defined and provider-specific parameters for the Roaming Client.
  • the CCS 130 allows management and manipulation of “Hotspot” location database information, roaming partner database information, and the gated upload capabilities for these databases. Together, the combination of the CCS 130 with the user connectivity tool of the Roaming Client provides a dynamic wireless access management solution.
  • the CCS 130 may be architected based on the J2EE framework. In at least such an implementation, the CCS 130 need not use a middle tier or business tier, and therefore need not include an Enterprise Java Beans server.
  • the CCS 130 functionality may reside on a personal computer or a Sun SPARC workstation, or similar computing platform, and any suitable operating system such as Windows, Linux or Solaris.
  • Typical software requirements for such an exemplary arrangement include compatibility with a Java Servelet specification, for example version 2.3, and a JSP application such as version 1.2, as well as with a suitable database server, for example Microsoft SQL Server 2000 or similar. It may also be desirable to include compatibility with JDK 1.4.1 or later, at least for application servers.
  • the CCS architecture 200 includes an operating system layer 210 that communicates with the selected operating system (not shown), which in the illustrated example is Windows 2000 Advanced Server.
  • a web application server 220 which may for example be based on the J2EE standard and certified on Jakarta Tomcat, layers atop the OS layer 210 , as does a database module 230 , which may, for example, be compliant with SQL 2000 and certified on MS SQL Server. Layered atop the application server module 220 and database module 230 are various modules for managing connections via different protocols. Thus, for example, Wi-Fi connection data is managed at 240 , GPRS connection data is managed at 250 , Location Finder data is managed at 260 , and Custom Application data is managed at 270 .
  • the SPI 140 operates to provide the device 110 access to a network, such as through an access point (AP) located at a hotspot.
  • AP access point
  • WiFi hotspots a Service Provider typically has hundreds if not thousands of different locations that a user can connect to. These locations may be maintained by the service provider or provided by a roaming agreement with another provider.
  • a user arrives at a location, connects to the network, and then launches their WEB browser.
  • the user attempts to get to the Internet, but is then captured and redirected by the local network administration server (NAS) device, whereupon the user is requested to authenticate or sign up and pay for service.
  • NAS network administration server
  • the SPI protocol allows additional steps to be performed.
  • the basic goal of the SPI protocol is to allow the Roaming Client the ability to communicate to the service provider before and after login into a local hotspot. This client/server communication allows a service provider to perform various checks on the client, and push back different actions for the client to execute depending on the Roaming Clients state.
  • the SPI 140 provides a client/server communications protocol, and can be implemented on any web server that supports such a protocol.
  • the SPI protocol allows a trusted web server to execute actions on the devices 110 .
  • the SPI protocol may, for example, be an XML-based messaging protocol that uses HTTPS as the primary transport for secure communications between the client and server.
  • the SPI 140 and CCS 130 interact in that the CCS 130 is the mechanism that allows a provider to modify specific parameters on the client, while the SPI protocol is the mechanism that allows specific actions to be executed on the client, for example, login and authentication in some embodiments. Such actions may use parameters that are pushed to the client via the CCS interface.
  • a provider deploys a hotspot and deploys a server that supports the SPI protocol.
  • a user associates with the hotspot and physically establishes a connection between the client machine and the hotspot.
  • Wi-Fi there is a notion of physical “connection” to a hotspot although the user has not authenticated.
  • the Roaming Client is considered to be in the “Connected” state (although not yet authenticated).
  • the Roaming Client can initiate communication to the provider's SPI server to inform the server about its current state and other attributes associated with the client.
  • the Roaming Client will only initiate SPI transactions to servers that are considered “trusted”, or in the providers “White List”. This will allow the provider to send back to the Client pre-authentication actions to be executed. After authentication, the client will again post its INFO status to the SPI server, allowing post-authentication actions to be executed by the client. Finally, when the client disconnects, final messages can be executed related to disconnection from the network.
  • Examples of pre-authentication actions that a client may execute using SPI 140 include, but are not limited to, provisioning a new user, pushing surcharge information to a client, requesting statistics from the client, and prompting a user for a password.
  • Post-authentication actions includes pushing the time remaining, pushing advertising, pushing a custom skin, and pushing a message.
  • Examples of disconnect actions includes sending log-off data, such as a thank you or other message, and sending usage statistics. It will be appreciated that such actions can be provided to the NOC in accordance with the present invention to provide dynamic monitoring and data gathering.
  • the SPI protocol is shown in an exemplary arrangement, wherein the SPI protocol is primarily based on two message packages: INFO and ACTION.
  • the INFO or information message communicates from the client to the SPI server the client's current status.
  • The, ACTION message communicates from the server to the client an action that the SPI server wants the client to execute.
  • an INFO message may comprise, for example, ⁇ status> the current state of the client ⁇ /status> ⁇ username>username ⁇ /username> ⁇ password>password of user ⁇ /password> ⁇ error> reported error code ⁇ /error> ⁇ provider> the name of the service provider ⁇ /provider> ⁇ location>Geographic location of basestation ⁇ /location> ⁇ sessionid> session id generated ⁇ /sessionid> ⁇ ip> ip address of users device ⁇ /ip> ⁇ mac> MAC address of users adapter ⁇ /mac> ⁇ bssid>access point mac address ⁇ /bssid> ⁇ linkspeed>reported link speed from basestation ⁇ /linkspeed> ⁇ rssi>reported signal strength from basestation ⁇ /rssi> ⁇ hwvendor>hardware vendor of basestation ⁇ /hwvendor> ⁇ driverversion>software driver version ⁇ /driverversion> ⁇ hostname>basestation host name ⁇ /host
  • the Roaming Client initiates communication with the SPI Protocol Server.
  • the SPI server will be a web server deployed to communicate with and manage SPI enabled devices, such as the Roaming Client or other devices 110 .
  • the SPI Server is a functionality, which may reside on a dedicated hardware server, or may coexist with other software functions on one or more hardware servers, each of which may be a PC, a workstation, or similar computer processing device.
  • the SPI message 600 describes an idealized login scenario for a user who has an already-existing subscription and has successfully logged in at a particular carrier's hotspot and completed the upload successfully.
  • the transactions described in this section happen in an automated fashion when the client or MMD arrives at a hotspot hosted by a wireless service provider, the following sequence happens with no or limited user interaction.
  • Client Request 602 the user attempts to go to a particular website, for example www.mystorage.mywireless.com/myaccount, using an SPI component embedded in the MMD.
  • NAS Response 604 the NAS responds with a redirect because the MMD is not authenticated.
  • Client Request 606 which is the INFO portion of the SPI enable client device communication with the NMS ( FIG. 5 )
  • SPI Server Response 608 the SPI server responds with an Action message as required by the protocol definition.
  • the SPI server sends an Action message to the client, in this case “login” action, which also contains a URL to the authentication server in the form of a parameter name/value pair in the login message.
  • the client parses the action message and then responds with a POST request to the authentication server URL providing the user name and password or a single unique device code embedded in the device.
  • the authentication server responds with a successful login message.
  • the client sends a start upload request.
  • the server responds with a start upload command sending the upload location URL as a parameter.
  • the client MMD parses the location URL and begins upload to that location.
  • the server responds with an affirmative on upload complete.
  • FIGS. 7A-7D A further example of authentication is shown in FIGS. 7A-7D , with an attempt to connect to an Acme Company server.
  • the user connects to Acme's wireless network through Acme's AP.
  • the user makes a request to a URL outside of Acme's “white list” of “free” servers.
  • the request passes through to the Acme's Network Access Server (NAS), which verifies whether the user has been authenticated.
  • NAS Network Access Server
  • CCS attributes initially pushed to the SPI-enabled device are used by the SPI device as the parameters for connecting to the network.
  • the Roaming Client 110 will use parameters pushed to it from CCS during client updates for authentication purposes.
  • HTTP headers provided by the network may be used to provide the SPI device with operating parameters.
  • the Roaming Client can also parse attributes from the network in real time.
  • a provider may use an authentication API that specifies attribute values utilizing http headers.
  • Acme's NAS responds back to the client's original request with an UNAUTHORIZED response with custom HTTP headers.
  • the custom HTTP headers could have also been returned after the client connected to the URL in the redirect request. Regardless of how the headers are provided, these headers will then be utilized in the next step of the authentication process, shown in FIG. 7B .
  • the client parses the information from the NAS response, then initiates an http request to the SPI server to report the client's status as part of the INFO package message.
  • the SPI server URL was previously provided by the CCS in a Client update Configuration.
  • the INFO package below represents the message that the client will send to the SPI server in this example.
  • the SPI server then responds with an Action message appropriate for the client's current state, as well as other variables in the INFO message package, as shown in FIG. 7C .
  • the SPI server responds with an Action message to prompt the user for credentials, execute a login, then send an INFO message package back to the SPI server.
  • each action will be executed in the order received.
  • the client then executes the actions specified by the SPI server.
  • the client prompts the user for username and password (credentials), and then executes the “login” action directive.
  • username and password a specific action is sent by the Acme's SPI server to direct the client to prompt the user to input the username and password: ⁇ action>promptCredentials ⁇ /action>.
  • the client When the client receives the ⁇ action>logon ⁇ /action> directive, it posts the credential information to the URL provided by the NAS (see above) or use the value pushed down to the client by the CCS. In either case, the authentication method that is implemented must be able to utilize this value when the login method is executed.
  • the provider has implemented a custom authentication method on the client using the Authentication API. The authentication method utilizes the custom parameter AcmeWirelessLogin-URL, which was provided by the NAS device previously, see FIG. 7B .
  • the login action is executed, and the credentials are sent to the authentication server URL.
  • the Authentication server then completes the transaction with an authentication response to the client.
  • the process of authentication of a client begins at step 800 .
  • the client initiates a communication session with an access point device or an access point interface (API) and attempts to access the Internet.
  • the API determines, based on communication with the service provider's authentication server and the associated database, if the client is an authenticated client. If so, then at step 806 the client is allowed to access the desired URL. If not, then at step 808 the client is directed to an SPI resident on a NMS. It will be apparent to one of skill in the art that the SPI may be operating on its own server and not as part of the NMS and hence be a stand alone server.
  • the SPI of the NMS queries the client for information and the client provides the relevant information for authentication.
  • the SPI of the NMS pushes an ACTION to the client for automatic sign-on and the URL necessary for the communication session.
  • the process continues at step 806 until the client initiates termination of the communication session.
  • the SPI of the NMS receives the termination request and determines if the termination and logoff process should be initiated. If not, then the process remains at step 814 until it is time to initiate the termination process.
  • the SPI of the NMS pushes a termination ACTION to the client. The client terminates the session and disconnects from the AP.
  • the INFO message can be configured to provide to the NMS 100 ( FIG. 1 ) a variety of information suitable for monitoring and management of a network.
  • the client can be configured to maintain an event log containing a record of various events, which can be uploaded to the NOC 120 through the NMS 100 upon request.
  • Table 1 shows, for an exemplary arrangement only, a combined list of the types of information which can be either delivered as part of the INFO message, or maintained in an event log and uploaded upon request:
  • Parameter Name Description XML Syntax Example status
  • the Status attribute ⁇ status>loggedin ⁇ /status> provides information about the client to the server side logic and to allow the server to determine a set of actions that should be performed by the client.
  • the possible states that are supported in the status element are listed in “Table 2: Supported Status Attributes” below.
  • username Username information ⁇ username>someuser ⁇ /username> allows access to the user's account and displaying of appropriate content for user account status. If not provided, the server assumes this is a new customer.
  • a link may be provided allowing existing users to enter existing username/password manually.
  • realm The realm attribute as ⁇ realm>@provider.com ⁇ /realm> entered by the user or inserted by the client that represents the realm the user is authenticating to.
  • password Password information is ⁇ password>somepass ⁇ /password> required for accessing user's account. If not provided, the server should prepopulate username field and prompt user to enter password before being able to access account info.
  • error Error codes provide ⁇ error>0 ⁇ /error> additional information Error Codes Vary with about the client status access mode. and why that condition occurred. Error codes are relative to the technology that is currently being used: Wi-Fi error codes are generated by the local AP based on API method i.e.
  • WISPr GPRS error codes are generated either by the dial in RAS server or the GPRS network. Modem error codes are generated by the dial in RAS.
  • provider Provider identifier passed ⁇ provider>CarrierXYZ ⁇ /provider> by the local NAS.
  • location Location identifier passed ⁇ location>wp_700 ⁇ /location> by the local NAS.
  • sessionid Session identifier passed ⁇ sessionid>12345 ⁇ /sessionid> by the local NAS. In some instances the session id may be generated by RADIUS. Session id will be collected if present, although many providers may not generate a session id.
  • securitytype The type of security used ⁇ securitytype>EAP- in the authentication of TTLS ⁇ /securitytype> the user to the network. Possible values: Empty Field WEP-Open WEP-Closed EAP-TTLS EAP-TLS EAP-PEAP EAP-LEAP EAP-TKIP EAP-PSK ip Current IP address of the ⁇ ip>192.168.11.1 ⁇ /ip> client machine. mac MAC address assigned to ⁇ mac>AA-BB-CC-DD-EE-FF ⁇ /mac> the client machine.
  • bssid The base station (Access ⁇ bssid>AA-BB-CC-DD-EE-FF ⁇ /bssid> Point) id linkspeed The reported link speed in ⁇ linkspeed>11000000 ⁇ /linkspeed> bps. i.e. 11 Mbps Wi-Fi connections is reported as 11000000. 56 Kbps modem connection is reported as 56000. rssi The reported signal ⁇ rssi> ⁇ 48 ⁇ /rssi> strength as reported by the adapter in dBm. hwvendor The adapter vendor as ⁇ hwvendor>acme_ap ⁇ /hwvendor> reported by the adapter.
  • driverversion The driver version as ⁇ driverversion>1.2.43.2 ⁇ /driverversion> reported by the adapter.
  • hostname The reported hostname of ⁇ hostname>acme_wireless the AP ⁇ /hostname> popid POP user identifier ⁇ popid> ⁇ /popid> information. This field Dial Connection only contains the unique user id the provider assigns to each user.
  • bdial Blind dial is set to ‘N’ for ⁇ bdial>Y ⁇ /bdial> No Blind dial or ‘Y’ to indicate a Blind dial. This information is supported in Analog, ISDN, DoPA and PIAFS access modes. BDIAL will be set to ‘N’ by default.
  • clientversion Version of the client. ⁇ clientversion>1.3.2.1234 ⁇ /clientversion> Format: w.x.y.z w Major Software version loccode It indicates the Country ⁇ loccode>44+207 ⁇ /loccode> code and Area code.
  • clientid Unique client identifier ⁇ clientid>1234567890 ⁇ /clientid> provided by the client.
  • devtype The device type used for ⁇ devtype>wifi ⁇ /devtype> accessing the network. Possible modes are: wifi, gprs, isdn, dsl, cable, phs, ethernet, modem. phonenumber Full Phone number string ⁇ phonenumber>011+44+ used for the connection. 207+12345678 ⁇ /phonenumber> The Phone number used for the connection in case of Analog, ISDN, PHS access modes shall be provided.
  • overphone An alternate override ⁇ phonenumber>011+44+ phone number that is 207+12345678 ⁇ /phonenumber> used as in for Analog, ISDN, PHS access modes. os Operating system on ⁇ os> ⁇ /os> which the client is installed.
  • one exemplary implementation implements only the following data in the INFO message, and leaves the remaining data for an event log: status, username, password, realm, error, provider, location, session, IP, MAC, bssid, linkspeed, rssi, hwvendor, driverversion, hostname, eventhistory, clientid, and clientversion.
  • loggedin Client has successfully ⁇ status>loggedin ⁇ /status> performed Login operations using Login API.
  • loginfailed Client has attempted ⁇ status>loginfailed ⁇ /status> Login operations, but the login has failed due to an error or some other known or unknown problems.
  • loggedout Client has successfully ⁇ status>loggedout ⁇ /status> performed Logout operations using Login API.
  • logoutfailed Client has attempted ⁇ status>logoutfailed ⁇ /status> Logout operations, but the logout has failed due to an error or some other known or unknown problems.
  • disconnecting Client has logged off and ⁇ status>disconnecting is about to physically ⁇ /status> disconnect from the network. This status will only be applicable in instances where the client still has network visibility although not authenticated.
  • Various custom parameters can be used for management or authentication actions on the Roaming Client.
  • either of two methods can be used to update or manage attributes on the client.
  • a CCS can push attribute values to the client when the client contacts the server for updates. It will be appreciated that, in the alternative, the CCS may simply cause a second server to push the values, or the CCS may be comprised of multiple servers.
  • WISPr authentication may be used.
  • the network provider can send custom HTTP headers to SPI-enabled devices, and the devices can parse the headers to identify the appropriate parameters. Examples of such includes login URL, location ID information, provider name, and so on.
  • An example of a custom HTTP header is shown below: HTTP/1.0 404 UNAUTHORIZED Server: MC SSG/0.0.0 (Linux) Location: http://www.acme.come/index.htm MacAddr:AA-BB-CC-DD-EE-FF&IpAddr:192.168.11.1 ...
  • the present invention provides a powerful, flexible, scalable method and system for monitoring and maintaining wired and wireless networks, including providing metrics for meeting SLA requirements, QoS requirements, or other network parameters.

Abstract

A system and method are provided for tracking and reporting the performance of a network. A client or a user device can access the network through a wired connection or wireless access points. The client maintains a log or track the events that occur during the log-on attempts as well as the communication sessions as well as other data related to the network performance. During the communication session data can be transferred between the client and a network device, such as the central server or a database, in the network, regardless of whether the network device is trusted and secure or not secure.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application claims the benefit of U.S. Provisional Application No. 60/555,812, filed Mar. 23,2004 (Atty. Dkt.: 069509-0308954)entitled “Service Level Assurance System and Method for Wired and Wireless Broadband Networks” and U.S. Provisional Application No. 60/555,988, filed Mar. 23, 2004 (Atty. Dkt.: 069509-0308956) entitled “Method and System for Automatic Data Transfer on a Network-Connected Device”, both of which are incorporated herein by reference in their entirety and for all purposes.
  • The present application is related to U.S. Provisional Application No. 60/504,152, filed Sep. 19, 2003 (Atty. Dkt.: 069509-0306053) and entitled “Automated Updating System for Wireless Networks,” commonly owned by the present assignee, which is incorporated herein by reference in its entirety and for all purposes.
  • BACKGROUND
  • 1. Field of the Invention
  • The present invention relates generally to systems and methods for network management, and more particularly relates to systems and methods for monitoring and managing the quality of service of a broadband service offering.
  • There are many devices capable of connecting to a data network, be it wired or wireless. The networks that support connections to these devices are typically broadband networks, whether wired or wireless. Carriers providing such services are often required to commit to specified levels of service for their customers. These commitments are sometimes referred to as Service Level Assurance (SLA). Even in the absence of a SLA commitment, broadband providers typically continuous monitor and attempt to improve the quality of their service offerings. Various methods are used for determining quality of service, all of which typically involve monitoring various network parameters. Among the network parameters that are typically monitored are: number of connect attempts, connection location (hot spot, dial up node, Ethernet node), signal strength, data rates (effective as well as available), connection duration, and so on.
  • Therefore, what is needed is a system and method for tracking and reporting the performance of a network that includes various broadband access points throughout the network.
  • SUMMARY
  • A system and method are provided for tracking and reporting the performance of a network. A client or a user device can access the network through a wired connection or wireless access points. The client maintains a log or track the events that occur during the log-on attempts as well as the communication sessions as well as other data related to the network performance. During the communication session data can be transferred between the client and a network device, such as the central server or a database, in the network, regardless of whether the network device is trusted and secure or not secure.
  • THE FIGURES
  • These and other aspects and features of the present invention will become apparent to those ordinarily skilled in the art upon review of the following description of specific embodiments of the invention in conjunction with the accompanying figures, wherein:
  • FIG. 1 illustrates in block diagram form the interoperation of the present invention with a service provider's network operations center;.
  • FIG. 2 illustrates in block diagram form an exemplary CCS architecture in accordance with the present invention;
  • FIG. 3 illustrates in time line form an exemplary SPI client-server transaction where the SPI server is in the network provider's “Whitespace”;
  • FIG. 4 illustrates in block diagram form an exemplary SPI client-server transaction where the SPI server is not in the network provider's “Whitespace”;
  • FIG. 5 illustrates a simple message exchange sequence between the SPI client and the SPI server;
  • FIG. 6 illustrates a message exchange between the SPI client and the SPI server involving authentication;
  • FIG. 7A-7D illustrate an authentication sequence in an exemplary implementation of the present invention; and
  • FIG. 8 is a flow chart for the process of authenticating a client.
  • DETAILED DESCRIPTION OF THE INVENTION
  • The present invention will now be described in detail with reference to the drawings, which are provided as illustrative examples of the invention so as to enable those skilled in the art to practice the invention. Notably, the figures and examples below are not meant to limit the scope of the present invention. Where certain elements of the present invention can be partially or fully implemented using known components, only those portions of such known components that are necessary for an understanding of the present invention will be described, and detailed descriptions of other portions of such known components will be omitted so as not to obscure the invention. Further, the present invention encompasses present and future known equivalents to the components referred to herein by way of illustration.
  • Referring now to FIG. 1, the general context and operation of the present invention can be appreciated. The network management system (NMS)100 of the present invention interacts with one or more devices 110A-n (sometimes collectively referred to hereinafter as “devices 110”), which have been suitably configured to provide quality of service information to the NMS 100. The NMS 100 in turn communicates with the network operation center (NOC) 120, which is not part of the invention and is typically resident at the premises of a network service provider.
  • Devices 110A-n include computers having thereon a “roaming client” functionality, which includes Service Provider Interface (SPI) functionality, or a PDA, a Cell phone, a camera, an MP3 device, or any other network connected device or appliance capable with SPI functionality, that is, capable of contacting the NMS 100 and then executing appropriate commands received back from the NMS 100 including responding to queries with appropriate status information.
  • The NMS 100 includes, in an exemplary arrangement, three functional components, designated in FIG. 1 as a Central Configuration Server (CCS) 130, a SPI 140, and a Service Level Assurance (SLA) module 150. The exchange between an SPI-enabled device 110 and the SLA module 150 begins when an SPI-enabled device 110 provides information such as, for example, ID, location, IP address, and/or other relevant information. When an SPI-enabled device 110 contacts the SLA module 150, the SLA module 150 queries, via the SPI 140 and CCS 150, the appropriate SPI enabled devices 110A-n, which in turn responds to the queries and provide appropriate information concerning location, connect attempts, failures, signal strength, available and effective data rates, and any other status or location information which the carrier deems appropriate.
  • The SPI 140 gathers the responses from the SPI-enables devices 110A-n and, if necessary, formats the information for forwarding to the NOC. In an exemplary arrangement, the NOC includes appropriate functionality to accumulate the data from the SPI-enabled devices 110A-n, and generate appropriate reports for management of the network resources. It will be appreciated that the foregoing approach has the advantage of allowing communication between the SLA module 150 and compatible, SPI-enabled devices 110 even if the SPI-enabled devices 110 are behind a firewall, because the protocol is text-based and is carried over standard HTTP(S) ports, typically ports 80 and 443.
  • From the foregoing it can be appreciated that the present invention enables the client or device 110to communicate with the NOC. In addition, the functionality provided by the present invention also allows the NOC to communicate, through the NMS 100, back to the SPI enabled devices 110. In particular, the NOC may desire to instruct the client or device 110 to perform various functions, for example launching a browser or other application, or directing users to a particular web page. The operation may also include a push of content to the end user, or an upload or download of files, for example software upgrades, from a desired location, which may be either pre-arranged or specified on the fly. One particular instance of redirecting a client device 110 may be to enable further communications. For example, if an account is not active, the NOC may direct the SPI-enabled device 110 to a provisional URL or other web page so that that user can obtain an account or otherwise establish credentials.
  • The functionality of the present invention requires a previously unachieved level of cooperation among the components of the system described herein. One aspect of the invention is the client-side functionality, represented generally at 110A-n by the roaming client module or software indicated at 110A-B, which includes SPI enablement, and by which network connectivity is achieved for a variety of SPI-enabled devices 110A-n as described above.
  • In an exemplary arrangement, the SPI capabilities incorporated into the roaming client and other SPI-enabled devices 110 include: aggregation of disparate wireless networks under one service umbrella; prioritization of wireless networks; support for seamless roaming between networks, including Wi-Fi and GPRS; support for automatic authentication between networks that have complex and non standard mechanisms for user authentication and administration; access Point Location database; and, automatic and remote update of network attributes, location database, and Roaming Client software updates. It will be appreciated by those skilled in the art that the SPI could easily be expanded to include other capabilities.
  • The SPI-enabled roaming client module 110further includes several features that are remotely updateable and/or upgradeable, including the executable software, location finder database, roaming partner data, carrier/PCOEM/enterprise preferences, user interface skins, and hardware drivers.
  • Referring next to FIG. 2, one exemplary configuration of the CCS 130 can be better appreciated. The CCS 130 allows carriers, PC-OEMs, and Enterprises to manage the storage and flow of updates and upgrades to clients from a single location, and can further provide reporting and tools to manage the ability to push new data to clients. The CCS 130 operates to provide version control, code management, and flow control for all updateable features within the Roaming Client software. In addition, the CCS 130 allows management and manipulation of “Hotspot” location database information, roaming partner database information, and the gated upload capabilities for these databases. The CCS 130 also allows the carrier, PCOEM, or Enterprise to manage versioned software files, such as executable files of the Roaming Client application and user interface skins. In addition the CCS 130 can be used in conjunction with the Roaming Client to update other files on a user's PC that are not directly related to the roaming client application, such as device drivers.
  • The CCS 130 also negotiates download parameters, such as bandwidth, frequency, and duration of downloads with each client, based on rules that are predetermined by the carrier, PCOEM, Enterprise, or configured by the end user. Stated slightly differently, the CCS 130 may be thought of as a secure, web-based administrative console, which provides the capability for updating the various pre-defined and provider-specific parameters for the Roaming Client. In addition, the CCS 130 allows management and manipulation of “Hotspot” location database information, roaming partner database information, and the gated upload capabilities for these databases. Together, the combination of the CCS 130 with the user connectivity tool of the Roaming Client provides a dynamic wireless access management solution.
  • In an exemplary implementation, the CCS 130 may be architected based on the J2EE framework. In at least such an implementation, the CCS 130 need not use a middle tier or business tier, and therefore need not include an Enterprise Java Beans server. The CCS 130 functionality may reside on a personal computer or a Sun SPARC workstation, or similar computing platform, and any suitable operating system such as Windows, Linux or Solaris. Typical software requirements for such an exemplary arrangement include compatibility with a Java Servelet specification, for example version 2.3, and a JSP application such as version 1.2, as well as with a suitable database server, for example Microsoft SQL Server 2000 or similar. It may also be desirable to include compatibility with JDK 1.4.1 or later, at least for application servers.
  • Referring again to FIG. 2, it can be appreciated that the CCS architecture 200 includes an operating system layer 210 that communicates with the selected operating system (not shown), which in the illustrated example is Windows 2000 Advanced Server. A web application server 220, which may for example be based on the J2EE standard and certified on Jakarta Tomcat, layers atop the OS layer 210, as does a database module 230, which may, for example, be compliant with SQL 2000 and certified on MS SQL Server. Layered atop the application server module 220 and database module 230 are various modules for managing connections via different protocols. Thus, for example, Wi-Fi connection data is managed at 240, GPRS connection data is managed at 250, Location Finder data is managed at 260, and Custom Application data is managed at 270.
  • The SPI 140 operates to provide the device 110access to a network, such as through an access point (AP) located at a hotspot. To put this aspect in context, a brief discussion of WiFi hotspots is helpful. In the case of WiFi hotspot deployments, a Service Provider typically has hundreds if not thousands of different locations that a user can connect to. These locations may be maintained by the service provider or provided by a roaming agreement with another provider.
  • In one typical scenario, a user arrives at a location, connects to the network, and then launches their WEB browser. The user attempts to get to the Internet, but is then captured and redirected by the local network administration server (NAS) device, whereupon the user is requested to authenticate or sign up and pay for service.
  • In the case of the Roaming Client, the SPI protocol allows additional steps to be performed. The basic goal of the SPI protocol is to allow the Roaming Client the ability to communicate to the service provider before and after login into a local hotspot. This client/server communication allows a service provider to perform various checks on the client, and push back different actions for the client to execute depending on the Roaming Clients state.
  • The SPI 140 provides a client/server communications protocol, and can be implemented on any web server that supports such a protocol. The SPI protocol allows a trusted web server to execute actions on the devices 110. In an exemplary arrangement, the SPI protocol may, for example, be an XML-based messaging protocol that uses HTTPS as the primary transport for secure communications between the client and server. The SPI 140 and CCS 130 interact in that the CCS 130 is the mechanism that allows a provider to modify specific parameters on the client, while the SPI protocol is the mechanism that allows specific actions to be executed on the client, for example, login and authentication in some embodiments. Such actions may use parameters that are pushed to the client via the CCS interface.
  • Referring now to FIGS. 3 and 4, the operation of the SPI 140 can be better appreciated from the procedure for login and authentication. In this example, a provider deploys a hotspot and deploys a server that supports the SPI protocol. A user associates with the hotspot and physically establishes a connection between the client machine and the hotspot.
  • In Wi-Fi there is a notion of physical “connection” to a hotspot although the user has not authenticated. In this case the Roaming Client is considered to be in the “Connected” state (although not yet authenticated). At this point, the Roaming Client can initiate communication to the provider's SPI server to inform the server about its current state and other attributes associated with the client.
  • As shown in FIG. 3, the Roaming Client will only initiate SPI transactions to servers that are considered “trusted”, or in the providers “White List”. This will allow the provider to send back to the Client pre-authentication actions to be executed. After authentication, the client will again post its INFO status to the SPI server, allowing post-authentication actions to be executed by the client. Finally, when the client disconnects, final messages can be executed related to disconnection from the network.
  • Examples of pre-authentication actions that a client may execute using SPI 140 include, but are not limited to, provisioning a new user, pushing surcharge information to a client, requesting statistics from the client, and prompting a user for a password. Post-authentication actions includes pushing the time remaining, pushing advertising, pushing a custom skin, and pushing a message. Examples of disconnect actions includes sending log-off data, such as a thank you or other message, and sending usage statistics. It will be appreciated that such actions can be provided to the NOC in accordance with the present invention to provide dynamic monitoring and data gathering.
  • However, if the server is not in the network provider's “White List”, as illustrated in FIG. 4, no actions can be executed by the SPI server until the client has authenticated to the network, but all appropriate actions can be taken once the client has authenticated.
  • Referring next to FIG. 5, the SPI protocol is shown in an exemplary arrangement, wherein the SPI protocol is primarily based on two message packages: INFO and ACTION. The INFO or information message communicates from the client to the SPI server the client's current status. The, ACTION message communicates from the server to the client an action that the SPI server wants the client to execute. Thus, an INFO message may comprise, for example,
    <status> the current state of the client</status>
    <username>username</username>
    <password>password of user </password>
    <error> reported error code</error>
    <provider> the name of the service provider</provider>
    <location>Geographic location of basestation </location>
    <sessionid> session id generated</sessionid>
    <ip> ip address of users device </ip>
    <mac> MAC address of users adapter</mac>
      <bssid>access point mac address</bssid>
      <linkspeed>reported link speed from basestation</linkspeed>
      <rssi>reported signal strength from basestation</rssi>
      <hwvendor>hardware vendor of basestation</hwvendor>
      <driverversion>software driver version</driverversion>
      <hostname>basestation host name</hostname>
      <wisprattribs>WISPr attributes supported</wisprattribs>
      <popid>POP Identification name</popid>
      ...
      ...
      ...(Other Parameter/Value pairs)
     </>
  • Similarly, the ACTION message may take the form
      <actions>
        <action name =”ACTION NAME”>
          <parameter name=”PARAMETER NAME”
            type=”single”>
          <value> VALUE </value>
        </parameter>
        </action>
      </actions>
    </>
  • In one exemplary arrangement, the Roaming Client initiates communication with the SPI Protocol Server. As noted previously, in such arrangements, the SPI server will be a web server deployed to communicate with and manage SPI enabled devices, such as the Roaming Client or other devices 110. It will be appreciated by those skilled in the art that the SPI Server is a functionality, which may reside on a dedicated hardware server, or may coexist with other software functions on one or more hardware servers, each of which may be a PC, a workstation, or similar computer processing device.
  • Referring now to FIG. 6, a representation of an SPI message exchange sequence 600 between a client and a server according to the present invention is shown. The SPI message 600 describes an idealized login scenario for a user who has an already-existing subscription and has successfully logged in at a particular carrier's hotspot and completed the upload successfully. As noted above, the transactions described in this section happen in an automated fashion when the client or MMD arrives at a hotspot hosted by a wireless service provider, the following sequence happens with no or limited user interaction.
  • At Client Request 602, the user attempts to go to a particular website, for example www.mystorage.mywireless.com/myaccount, using an SPI component embedded in the MMD. At NAS Response 604, the NAS responds with a redirect because the MMD is not authenticated. At Client Request 606, which is the INFO portion of the SPI enable client device communication with the NMS (FIG. 5), the SPI client component embedded in the MMD makes a request to the SPI server with its current INFO. In this example, State =Connected, but not logged in. At SPI Server Response 608, the SPI server responds with an Action message as required by the protocol definition. Because the client device state is not “Logged In,” the SPI server sends an Action message to the client, in this case “login” action, which also contains a URL to the authentication server in the form of a parameter name/value pair in the login message. At Client Request 610, the client parses the action message and then responds with a POST request to the authentication server URL providing the user name and password or a single unique device code embedded in the device. At Authentication Server Response 612, the authentication server responds with a successful login message. At 614, the client sends a start upload request. At 616, the server responds with a start upload command sending the upload location URL as a parameter. At 618, the client MMD parses the location URL and begins upload to that location. At 620, the server responds with an affirmative on upload complete.
  • A further example of authentication is shown in FIGS. 7A-7D, with an attempt to connect to an Acme Company server. Referring first to FIG. 7A, the user connects to Acme's wireless network through Acme's AP. The user makes a request to a URL outside of Acme's “white list” of “free” servers. The request passes through to the Acme's Network Access Server (NAS), which verifies whether the user has been authenticated. The next step could occur through alternative processes. In one exemplary arrangement, CCS attributes initially pushed to the SPI-enabled device are used by the SPI device as the parameters for connecting to the network. For example, the Roaming Client 110will use parameters pushed to it from CCS during client updates for authentication purposes.
  • In an alternative arrangement, HTTP headers provided by the network (the provider's NOC, for example) may be used to provide the SPI device with operating parameters. The Roaming Client can also parse attributes from the network in real time. In some cases a provider may use an authentication API that specifies attribute values utilizing http headers.
  • For purposes of the present example, Acme's NAS responds back to the client's original request with an UNAUTHORIZED response with custom HTTP headers. The custom HTTP headers could have also been returned after the client connected to the URL in the redirect request. Regardless of how the headers are provided, these headers will then be utilized in the next step of the authentication process, shown in FIG. 7B.
  • In FIG. 7B, the client parses the information from the NAS response, then initiates an http request to the SPI server to report the client's status as part of the INFO package message. The SPI server URL was previously provided by the CCS in a Client update Configuration. The INFO package below represents the message that the client will send to the SPI server in this example.
    <Seque version - “1.0”>
      Status>Connected/status>
      <username></username>
      <password></password>
      <error></error>
      <provider>Acme Wireless</provider>
      <location>location1</location>
      <sessionid></sessionid>
      <1p>192.168.11.1</ip>
      <mac>AA-BB-CC-DD-EE-FF</mac>
  • It should be noted that some parameters are populated with information, which may be provided, for example, by the NAS in the prior step.
  • The SPI server then responds with an Action message appropriate for the client's current state, as well as other variables in the INFO message package, as shown in FIG. 7C. In this example, the SPI server responds with an Action message to prompt the user for credentials, execute a login, then send an INFO message package back to the SPI server. In the exemplary arrangement shown in FIGS. 7A-7D, each action will be executed in the order received.
  • Referring next to FIG. 7D, the client then executes the actions specified by the SPI server. The client prompts the user for username and password (credentials), and then executes the “login” action directive. In the case of username and password, a specific action is sent by the Acme's SPI server to direct the client to prompt the user to input the username and password: <action>promptCredentials</action>.
  • When the client receives the <action>logon</action> directive, it posts the credential information to the URL provided by the NAS (see above) or use the value pushed down to the client by the CCS. In either case, the authentication method that is implemented must be able to utilize this value when the login method is executed. In a typical arrangement, the provider has implemented a custom authentication method on the client using the Authentication API. The authentication method utilizes the custom parameter AcmeWirelessLogin-URL, which was provided by the NAS device previously, see FIG. 7B.
  • The login action is executed, and the credentials are sent to the authentication server URL. The Authentication server then completes the transaction with an authentication response to the client.
  • Referring now to FIG. 8, the process of authentication of a client begins at step 800. At step 802, the client initiates a communication session with an access point device or an access point interface (API) and attempts to access the Internet. At step 804, the API determines, based on communication with the service provider's authentication server and the associated database, if the client is an authenticated client. If so, then at step 806 the client is allowed to access the desired URL. If not, then at step 808 the client is directed to an SPI resident on a NMS. It will be apparent to one of skill in the art that the SPI may be operating on its own server and not as part of the NMS and hence be a stand alone server. At step 810, the SPI of the NMS queries the client for information and the client provides the relevant information for authentication. At step 812, the SPI of the NMS pushes an ACTION to the client for automatic sign-on and the URL necessary for the communication session. The process continues at step 806 until the client initiates termination of the communication session. At step 814, the SPI of the NMS receives the termination request and determines if the termination and logoff process should be initiated. If not, then the process remains at step 814 until it is time to initiate the termination process. When it is time to initiate the termination, at step 816, the SPI of the NMS pushes a termination ACTION to the client. The client terminates the session and disconnects from the AP.
  • The INFO message can be configured to provide to the NMS 100 (FIG. 1) a variety of information suitable for monitoring and management of a network. Alternatively, and in some embodiments a presently preferred arrangement, the client can be configured to maintain an event log containing a record of various events, which can be uploaded to the NOC 120 through the NMS 100 upon request.
  • Table 1, below, shows, for an exemplary arrangement only, a combined list of the types of information which can be either delivered as part of the INFO message, or maintained in an event log and uploaded upon request:
    Parameter
    Name Description XML Syntax Example
    status The Status attribute <status>loggedin</status>
    provides information
    about the client to the
    server side logic and to
    allow the server to
    determine a set of actions
    that should be performed
    by the client.
    The possible states that
    are supported in the
    status element are listed
    in “Table 2: Supported
    Status Attributes” below.
    username Username information <username>someuser</username>
    allows access to the user's
    account and displaying of
    appropriate content for
    user account status. If not
    provided, the server
    assumes this is a new
    customer. However, a link
    may be provided allowing
    existing users to enter
    existing
    username/password
    manually.
    realm The realm attribute as <realm>@provider.com</realm>
    entered by the user or
    inserted by the client that
    represents the realm the
    user is authenticating to.
    password Password information is <password>somepass</password>
    required for accessing
    user's account. If not
    provided, the server
    should prepopulate
    username field and
    prompt user to enter
    password before being
    able to access account
    info.
    error Error codes provide <error>0</error>
    additional information Error Codes Vary with
    about the client status access mode.
    and why that condition
    occurred. Error codes are
    relative to the technology
    that is currently being
    used:
    Wi-Fi error codes are
    generated by the local AP
    based on API method i.e.
    WISPr.
    GPRS error codes are
    generated either by the
    dial in RAS server or the
    GPRS network.
    Modem error codes are
    generated by the dial in
    RAS.
    provider Provider identifier passed <provider>CarrierXYZ</provider>
    by the local NAS.
    location Location identifier passed <location>wp_700</location>
    by the local NAS.
    sessionid Session identifier passed <sessionid>12345</sessionid>
    by the local NAS. In some
    instances the session id
    may be generated by
    RADIUS. Session id will
    be collected if present,
    although many providers
    may not generate a
    session id.
    securitytype The type of security used <securitytype>EAP-
    in the authentication of TTLS</securitytype>
    the user to the network.
    Possible values:
    Empty Field
    WEP-Open
    WEP-Closed
    EAP-TTLS
    EAP-TLS
    EAP-PEAP
    EAP-LEAP
    EAP-TKIP
    EAP-PSK
    ip Current IP address of the <ip>192.168.11.1</ip>
    client machine.
    mac MAC address assigned to <mac>AA-BB-CC-DD-EE-FF</mac>
    the client machine.
    bssid The base station (Access <bssid>AA-BB-CC-DD-EE-FF</bssid>
    Point) id
    linkspeed The reported link speed in <linkspeed>11000000</linkspeed>
    bps.
    i.e. 11 Mbps Wi-Fi
    connections is reported as
    11000000. 56 Kbps
    modem connection is
    reported as 56000.
    rssi The reported signal <rssi>−48</rssi>
    strength as reported by
    the adapter in dBm.
    hwvendor The adapter vendor as <hwvendor>acme_ap</hwvendor>
    reported by the adapter.
    driverversion The driver version as <driverversion>1.2.43.2</driverversion>
    reported by the adapter.
    hostname The reported hostname of <hostname>acme_wireless
    the AP </hostname>
    popid POP user identifier <popid></popid>
    information. This field Dial Connection only
    contains the unique user
    id the provider assigns to
    each user.
    hispid Home ISP id. <hispid></hispid>
    hispsubid Home sub ISP id <hissubid></hissubid>
    connecttime Timestamp when users <accesstime>2207520000
    establish the connection </accesstime>
    in milliseconds since
    midnight Jan. 1, 1970
    GMT
    authtime Timestamp when the user <authtime>2207520000</authtime>
    authenticates to the
    network in milliseconds
    since midnight Jan. 1,
    1970 GMT
    logofftime Timestamp when the user <logofftime>2207520000</logofftime>
    logs out of the network in
    milliseconds since
    midnight Jan. 1, 1970
    GMT
    disconnecttime Timestamp when the user <disconnecttime>2207520000
    is disconnected from the </disconnecttime>
    network in milliseconds
    since midnight Jan. 1,
    1970 GMT
    sessionduration Total connection time <duration>Seconds</duration>
    between authentication
    and logout.
    setup Setup time. Total time in <setup>Connection setup
    milliseconds between time in
    connect time and milliseconds</setup>
    authentication to the
    network. (authtime -
    connecttime).
    bdial Blind dial is set to ‘N’ for <bdial>Y</bdial>
    No Blind dial or ‘Y’ to
    indicate a Blind dial. This
    information is supported
    in Analog, ISDN, DoPA
    and PIAFS access modes.
    BDIAL will be set to ‘N’ by
    default.
    clientversion Version of the client. <clientversion>1.3.2.1234
    </clientversion>
    Format: w.x.y.z
    w = Major Software
    version
    loccode It indicates the Country <loccode>44+207</loccode>
    code and Area code.
    clientid Unique client identifier <clientid>1234567890</clientid>
    provided by the client.
    devtype The device type used for <devtype>wifi</devtype>
    accessing the network.
    Possible modes are: wifi,
    gprs, isdn, dsl, cable, phs,
    ethernet, modem.
    phonenumber Full Phone number string <phonenumber>011+44+
    used for the connection. 207+12345678</phonenumber>
    The Phone number used
    for the connection in case
    of Analog, ISDN, PHS
    access modes shall be
    provided.
    overphone An alternate override <phonenumber>011+44+
    phone number that is 207+12345678</phonenumber>
    used as in for Analog,
    ISDN, PHS access modes.
    os Operating system on <os></os>
    which the client is
    installed.
  • Of the foregoing, one exemplary implementation implements only the following data in the INFO message, and leaves the remaining data for an event log: status, username, password, realm, error, provider, location, session, IP, MAC, bssid, linkspeed, rssi, hwvendor, driverversion, hostname, eventhistory, clientid, and clientversion. In some implementations, it may be desirable not to populate one or more of the foregoing data fields in the INFO message.
    TABLE 2
    Supported Status attributes. (See Table 1: INFO message
    <status> parameter).
    Status Name Description XML Syntax
    connected Client is connected to a <status>connected</status>
    wireless network.
    loggedin Client has successfully <status>loggedin</status>
    performed Login
    operations using Login
    API.
    loginfailed Client has attempted <status>loginfailed</status>
    Login operations, but the
    login has failed due to an
    error or some other
    known or unknown
    problems.
    loggedout Client has successfully <status>loggedout</status>
    performed Logout
    operations using Login
    API.
    logoutfailed Client has attempted <status>logoutfailed</status>
    Logout operations, but
    the logout has failed due
    to an error or some other
    known or unknown
    problems.
    disconnecting Client has logged off and <status>disconnecting
    is about to physically </status>
    disconnect from the
    network. This status will
    only be applicable in
    instances where the client
    still has network
    visibility although
    not authenticated.
  • The form of the SPI Server “ACTION” messages is described above. An example of the actions which the SPI server may instruct the client to execute is shown in Table 3, below:
    TABLE 3
    ACTIONS
    Name Parameters XML Syntax Example
    launchMiniBrowser Url width <action name=”launchMiniBrowser”>
    height <parameter name=”url”
    status type=”single”>
    statusnote <value>https://www.someurl.com</
    value>
    </parameter>
    <parameter name=”width”
    type=”single”>
    <value>320</value>
    </parameter>
    <parameter name=”height”
    type=”single”>
    <value>240</value>
    </parameter>
    <parameter name=”status”
    type=”single”>
    <value>Please wait for page to
    load</value>
    </parameter>
    <parameter name=”statusnote”
    type=”single”>
    <value>It may take up to 45 seconds
    to load page<value>
    </parameter>
    </action>
    closeMiniBrowser <action name=”closeMiniBrowser”/>
    login attempts <action name=”login”>
    <parameter name=”attempts
    type=”single”>
    <value>3</value>
    </parameter>
    </action>
    logout <action name=”logout”/>
    setUserInfo username <action name=”setUserInfo”>
    accountURL <parameter name=”username”
    type=”single”>
    <value>johndoe</value>
    </parameter>
    <parameter name=”accountURL”
    type=”single”>
    <value>htt//accounts.mc.com?id=johndoe
    </value>
    </parameter>
    </action>
    promptPassword username <action name=”promptPassword”>
    <parameter name=”username”
    type=”single”>
    <value>johndoe</value>
    </parameter>
    </action>
    showDialog message <action name=”showDialog”>
    width <parameter name=”message”
    height type=”single”>
    <value>CarrierXYZ
    Message...</value>
    </parameter>
    <parameter name=”width”
    type=”single”>
    <value>250</value>
    </parameter>
    <parameter name=”height”
    type=”single”>
    <value>350</value>
    </parameter>
    </action>
    LaunchDefaultBrowser url <action
    name=”launchDefaultBrowser”>
    <parameter name=”url”
    type=”single”>
    <value>http://www.carrierXYZ.com
    </value>
    </parameter>
    </action>
    sendInformation url <action name=”sendInformation”>
    method <parameter name=”url”
    parameter1 type=”single”>
    parameter2 <value>http://someurl.com</value>
    . </parameter>
    . <parameter name=”method”
    . type=”single”>
    parameterN <value>POST</value>
    </parameter>
    <parameter name=”username”
    type=”single”>
    <value>%username%</value>
    </parameter>
    <parameter name=”returnURL”
    type=”single”>
    <value>http://wifi.qpass.com?id=johndoe
    </value>
    </parameter>
    </action>
    connect <action name=”connect”/>
    disconnect <action name=”disconnect”/>
    sendStatusInfo <action name=”sendStatusInfo”/>
    setTimer sessionTime <action name=“setTimer”>
    <parameter name=“sessionTime”
    type=“single”>
    <value>85448</value>
    </parameter>
    </action>
    downloadFile forceOverwrite <action name=“downloadFile”>
    remote <parameter name=“forceOverwrite”
    local type=“single”>
    <value>yes</value>
    </parameter>
    <parameter name=“remote”
    type=“single”>
    <value>http://www.pctel.com/mySkin
    .skx</value>
    </parameter>
    <parameter name=“local”
    type=“single”>
    <value>foo.skx</value>
    </parameter>
    </action>
    loadSkin file <action name=“loadSkin”>
    <parameter name=“file”
    type=“single”>
    <value>foo.skx</value>
    </parameter>
    </action>
    licenseAdjustment adjustmentDays <action name=“licenseAdjustment”>
    adjustmentType <parameter
    name=“adjustmentDays”
    type=“single”>
    <value>10</value>
    </parameter>
    <parameter
    name=“adjustmentType”
    type=“single”>
    <value>relative</value>
    </parameter>
    </action>
    showMessage message <action name=“showMessage”>
    url (optional) <parameter name=“message”
    browserType type=“single”>
    id <value>click here</value>
    </parameter>
    <parameter name=“url”
    type=“single”>
    <value>http://www.pctel.com</value
    >
    </parameter>
    <parameter name=“browserType”
    type=“single”>
    <value>default</value>
    </parameter>
    <parameter name=“id”
    type=“single”>
    <value>ApiMessage</value>
    </parameter>
    </ACTION>
  • Various custom parameters can be used for management or authentication actions on the Roaming Client. Typically either of two methods can be used to update or manage attributes on the client. In a first approach, a CCS can push attribute values to the client when the client contacts the server for updates. It will be appreciated that, in the alternative, the CCS may simply cause a second server to push the values, or the CCS may be comprised of multiple servers. In at least some arrangements, WISPr authentication may be used.
  • In a second approach, the network provider can send custom HTTP headers to SPI-enabled devices, and the devices can parse the headers to identify the appropriate parameters. Examples of such includes login URL, location ID information, provider name, and so on. An example of a custom HTTP header is shown below:
    HTTP/1.0 404 UNAUTHORIZED
    Server: MC SSG/0.0.0 (Linux)
    Location: http://www.acme.come/index.htm
    MacAddr:AA-BB-CC-DD-EE-FF&IpAddr:192.168.11.1
    ...
    <!-Location-Name=AcmeWireless>
    <!-Location-ID=Location1>
    <!-error=0>
    <!-Login-URL=https://login1.AcmeWireless.com/Login>
    <HTML>
    ...
  • From the foregoing it can be appreciated that the present invention provides a powerful, flexible, scalable method and system for monitoring and maintaining wired and wireless networks, including providing metrics for meeting SLA requirements, QoS requirements, or other network parameters.
  • Although the present invention has been particularly described with reference to embodiments thereof, it should be readily apparent to those of ordinary skill in the art that various changes, modifications and substitutes are intended within the form and details thereof, without departing from the spirit and scope of the invention. Accordingly, it will be appreciated that in numerous instances some features of the invention will be employed without a corresponding use of other features. Further, those skilled in the art will understand that variations can be made in the number and arrangement of components illustrated in the above figures. It is intended that the scope of the appended claims include such changes and modifications.

Claims (10)

1. A method of detecting and managing network performance, the method comprising the steps of:
initiating a communication session between a user device and a management server;
recording data at the user device related to the performance of the network; and
querying the user device for data related to the performance of the network.
2. The method of claim 1, wherein the communication session is a wireless communication session based on an interface protocol.
3. The method of claim 1 further comprising the steps of:
transmitting data from the user device to an access point device, which in turn delivers the data to an authentication server; and
authenticating the user device based on the data provided.
4. The method of claim 3 wherein the step of transmitting comprises the steps of:
transmitting an address associated with the authentication server; and
querying the user device for identity information, which information is automatically provided by the user device in response to the query.
5. The method of claim 1 further comprising the step of formatting the data from the user device for delivery to a central location for analysis in order to determine the performance of the network.
6. A system for monitoring the performance of a wireless network having a plurality of access points, the system comprising:
a plurality of clients, wherein each client is adapted to detect the presence of the network available at the access point and initiate a wireless communication session with one access point;
a central server in communication with each of the plurality of access points such that when each client is authenticated by the central server and logged onto the network and each client can be queried by the central server for information related to the performance of the network.
7. The system of claim 6 wherein each client and the central server include a service provider enablement component.
8. The system of claim 6 wherein each client includes a roaming client component that can be updated from the central server when the client is logged onto the network.
9. The system of claim 8 further comprising a configuration server for management of client features and policies as well as software updates that are pushed to any client during the communication session.
10. A method for evaluation of the performance of a wireless network comprising a plurality of access points each in communication with a network server, the method comprising the steps of:
initiating a wireless communication session between a user device and one access point of the plurality of access points;
determining if the user device is an authenticated user device;
redirecting the user device to an authentication server, such that the authentication server initiates an authentication process and requests information form the user device for authentication of the user device; and
querying the user device for data related to the performance of the network.
US11/089,238 2004-03-23 2005-03-23 Service level assurance system and method for wired and wireless broadband networks Abandoned US20060041931A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/089,238 US20060041931A1 (en) 2004-03-23 2005-03-23 Service level assurance system and method for wired and wireless broadband networks

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US55581204P 2004-03-23 2004-03-23
US55598804P 2004-03-23 2004-03-23
US11/089,238 US20060041931A1 (en) 2004-03-23 2005-03-23 Service level assurance system and method for wired and wireless broadband networks

Publications (1)

Publication Number Publication Date
US20060041931A1 true US20060041931A1 (en) 2006-02-23

Family

ID=35064377

Family Applications (2)

Application Number Title Priority Date Filing Date
US11/089,238 Abandoned US20060041931A1 (en) 2004-03-23 2005-03-23 Service level assurance system and method for wired and wireless broadband networks
US11/088,500 Active 2029-07-28 US8325625B2 (en) 2004-03-23 2005-03-23 Method and system for automatic data transfer on a network-connected device

Family Applications After (1)

Application Number Title Priority Date Filing Date
US11/088,500 Active 2029-07-28 US8325625B2 (en) 2004-03-23 2005-03-23 Method and system for automatic data transfer on a network-connected device

Country Status (4)

Country Link
US (2) US20060041931A1 (en)
EP (2) EP1761866A4 (en)
KR (2) KR20060135910A (en)
WO (2) WO2005094463A2 (en)

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060002350A1 (en) * 2004-07-02 2006-01-05 Cyrus Behroozi Access point control of client roaming
US20060018328A1 (en) * 2004-07-23 2006-01-26 Comcast Cable Holdings, Llc Method and system for powerline networking
US20070055725A1 (en) * 2005-09-07 2007-03-08 Gianluca Bernardini Method, system and computer program for providing web pages based on client state
US20070213033A1 (en) * 2006-03-10 2007-09-13 Samsung Electronics Co., Ltd. Method and apparatus for authenticating mobile terminal on handover
US20070242657A1 (en) * 2006-04-12 2007-10-18 Waisman-Diamond Martin V System and method for linking existing WI-FI access points into a single unified network
US20080130601A1 (en) * 2006-12-01 2008-06-05 Electronics And Telecommunications Research Institute Method for providing network communication service with constant quality regardless of being in wired or wireless network environment
US20090064306A1 (en) * 2007-08-27 2009-03-05 Microsoft Corporation Network access control based on program state
US20100094997A1 (en) * 2005-06-23 2010-04-15 Joey Chou Event logging techniques for broadband wireless access networks
US20100263022A1 (en) * 2008-10-13 2010-10-14 Devicescape Software, Inc. Systems and Methods for Enhanced Smartclient Support
US20110087958A1 (en) * 2009-10-14 2011-04-14 Dumitru Dan Mihai Method for extracting document data from multiple sources for display on a communication device
US20130007868A1 (en) * 2011-06-30 2013-01-03 Cable Television Laboratories, Inc. Zero sign-on authentication
US8495714B2 (en) 2011-07-20 2013-07-23 Bridgewater Systems Corp. Systems and methods for authenticating users accessing unsecured wifi access points
WO2014051774A1 (en) * 2012-09-26 2014-04-03 Intel Corporation Techniques for fractional wireless broadband usage
US8910300B2 (en) 2010-12-30 2014-12-09 Fon Wireless Limited Secure tunneling platform system and method
US20160080486A1 (en) * 2014-09-17 2016-03-17 Ca, Inc. Crowdsourcing-based detection, identification, and tracking of electronic devices
US9326138B2 (en) 2006-09-06 2016-04-26 Devicescape Software, Inc. Systems and methods for determining location over a network
US9432920B2 (en) 2006-09-06 2016-08-30 Devicescape Software, Inc. Systems and methods for network curation
US9680872B1 (en) 2014-03-25 2017-06-13 Amazon Technologies, Inc. Trusted-code generated requests
US9826102B2 (en) 2006-04-12 2017-11-21 Fon Wireless Limited Linking existing Wi-Fi access points into unified network for VoIP
US9854001B1 (en) * 2014-03-25 2017-12-26 Amazon Technologies, Inc. Transparent policies
US20220361109A1 (en) * 2021-05-10 2022-11-10 Microsoft Technology Licensing, Llc System and method for reducing power consumption

Families Citing this family (56)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080280588A1 (en) 2004-02-20 2008-11-13 Brian Roundtree User Interface Methods, Such as for Customer Self-Support on a Mobile Device
US7716489B1 (en) * 2004-09-29 2010-05-11 Rockwell Automation Technologies, Inc. Access control method for disconnected automation systems
US7314169B1 (en) * 2004-09-29 2008-01-01 Rockwell Automation Technologies, Inc. Device that issues authority for automation systems by issuing an encrypted time pass
US9275052B2 (en) * 2005-01-19 2016-03-01 Amazon Technologies, Inc. Providing annotations of a digital work
WO2007070837A2 (en) 2005-12-13 2007-06-21 Snapin Software Inc. Method for performing interactive services on a mobile device, such as time or location initiated interactive services
US7289830B2 (en) * 2005-03-18 2007-10-30 Lear Corporation System and method for vehicle module wake up in response to communication activity
TW200634627A (en) * 2005-03-31 2006-10-01 Acer Inc Method of automatically opening particular types of files
CN101248472B (en) 2005-06-24 2010-11-03 斯纳品软件公司 Local intercept methods, such as applications for providing customer assistance for training, information calls and diagnostics
US8682298B2 (en) * 2005-10-12 2014-03-25 Nuance Communications, Inc. Message intercept methods, such as for customer self-support on a mobile device
US8352449B1 (en) 2006-03-29 2013-01-08 Amazon Technologies, Inc. Reader device content indexing
US20080046435A1 (en) * 2006-08-18 2008-02-21 Microsoft Corporation Service discovery and automatic configuration
US8554830B2 (en) * 2006-09-06 2013-10-08 Devicescape Software, Inc. Systems and methods for wireless network selection
US8549588B2 (en) * 2006-09-06 2013-10-01 Devicescape Software, Inc. Systems and methods for obtaining network access
US8743778B2 (en) * 2006-09-06 2014-06-03 Devicescape Software, Inc. Systems and methods for obtaining network credentials
US9672533B1 (en) 2006-09-29 2017-06-06 Amazon Technologies, Inc. Acquisition of an item based on a catalog presentation of items
US8725565B1 (en) 2006-09-29 2014-05-13 Amazon Technologies, Inc. Expedited acquisition of a digital item following a sample presentation of the item
US7865817B2 (en) 2006-12-29 2011-01-04 Amazon Technologies, Inc. Invariant referencing in digital works
US8744414B2 (en) 2007-01-05 2014-06-03 Nuance Communications, Inc. Methods of interacting between mobile devices and voice response systems
KR100934989B1 (en) * 2007-01-31 2009-12-31 삼성전자주식회사 Content management method and apparatus
US20080243788A1 (en) * 2007-03-29 2008-10-02 Reztlaff James R Search of Multiple Content Sources on a User Device
US9665529B1 (en) 2007-03-29 2017-05-30 Amazon Technologies, Inc. Relative progress and event indicators
US7716224B2 (en) 2007-03-29 2010-05-11 Amazon Technologies, Inc. Search and indexing on a user device
US9100936B2 (en) 2007-04-12 2015-08-04 Nuance Communications, Inc. System and method for detecting mutually supported capabilities between mobile devices
US7921309B1 (en) 2007-05-21 2011-04-05 Amazon Technologies Systems and methods for determining and managing the power remaining in a handheld electronic device
US8589149B2 (en) 2008-08-05 2013-11-19 Nuance Communications, Inc. Probability-based approach to recognition of user-entered data
JP5632380B2 (en) * 2008-10-13 2014-11-26 デバイススケープ・ソフトウェア・インコーポレーテッド System and method for identifying a network
US9087032B1 (en) 2009-01-26 2015-07-21 Amazon Technologies, Inc. Aggregation of highlights
US8378979B2 (en) * 2009-01-27 2013-02-19 Amazon Technologies, Inc. Electronic device with haptic feedback
US8832584B1 (en) 2009-03-31 2014-09-09 Amazon Technologies, Inc. Questions on highlighted passages
US8452858B2 (en) * 2009-05-15 2013-05-28 Novatel Wireless, Inc. Method and apparatus for loading landing page
US8692763B1 (en) 2009-09-28 2014-04-08 John T. Kim Last screen rendering for electronic book reader
US8484661B2 (en) 2010-03-19 2013-07-09 At&T Mobility Ii Llc Agnostic execution cluster for an agnostic execution environment
US9107140B2 (en) 2010-08-13 2015-08-11 At&T Mobility Ii Llc Carrier-driven bearer path selection
US9495322B1 (en) 2010-09-21 2016-11-15 Amazon Technologies, Inc. Cover display
EP2466852A1 (en) * 2010-12-17 2012-06-20 Swisscom AG Digital content management
JP5185361B2 (en) * 2010-12-28 2013-04-17 株式会社東芝 COMMUNICATION DEVICE, HOST DEVICE, COMMUNICATION CONTROL METHOD, AND COMMUNICATION CONTROL PROGRAM
US9158741B1 (en) 2011-10-28 2015-10-13 Amazon Technologies, Inc. Indicators for navigating digital works
US9251360B2 (en) 2012-04-27 2016-02-02 Intralinks, Inc. Computerized method and system for managing secure mobile device content viewing in a networked secure collaborative exchange environment
US9253176B2 (en) * 2012-04-27 2016-02-02 Intralinks, Inc. Computerized method and system for managing secure content sharing in a networked secure collaborative exchange environment
US9553860B2 (en) 2012-04-27 2017-01-24 Intralinks, Inc. Email effectivity facility in a networked secure collaborative exchange environment
AU2013251304B2 (en) 2012-04-27 2018-12-20 Intralinks, Inc. Computerized method and system for managing networked secure collaborative exchange
KR101446319B1 (en) * 2012-11-06 2014-10-01 주식회사 씨제이헬로비전 Application Update Service Method and System
US9317522B2 (en) 2013-01-07 2016-04-19 Google Inc. Saving files from third-party systems directly to a cloud storage system
US8631325B1 (en) 2013-08-09 2014-01-14 Zoomdata, Inc. Real-time data visualization of streaming data
US20150095776A1 (en) * 2013-10-01 2015-04-02 Western Digital Technologies, Inc. Virtual manifestation of a nas or other devices and user interaction therewith
US9514327B2 (en) 2013-11-14 2016-12-06 Intralinks, Inc. Litigation support in cloud-hosted file sharing and collaboration
GB2521381A (en) * 2013-12-18 2015-06-24 Mastercard International Inc Automatic data transfer
US9648100B2 (en) 2014-03-05 2017-05-09 Commvault Systems, Inc. Cross-system storage management for transferring data across autonomous information management systems
US9613190B2 (en) 2014-04-23 2017-04-04 Intralinks, Inc. Systems and methods of secure data exchange
US9251276B1 (en) 2015-02-27 2016-02-02 Zoomdata, Inc. Prioritization of retrieval and/or processing of data
CN105045570A (en) * 2015-05-22 2015-11-11 国云科技股份有限公司 Method for configuring multiple jdk versions for multiple tomcat applications in Linux environment
US10033702B2 (en) 2015-08-05 2018-07-24 Intralinks, Inc. Systems and methods of secure data exchange
US20180114239A1 (en) * 2016-10-21 2018-04-26 Mastercard International Incorporated Methods, systems, and computer readable media for electronically determining broadband network service rates in a designated area
US9942312B1 (en) 2016-12-16 2018-04-10 Zoomdata, Inc. System and method for facilitating load reduction at a landing zone
US10298690B2 (en) 2017-01-10 2019-05-21 International Business Machines Corporation Method of proactive object transferring management
US10249295B2 (en) 2017-01-10 2019-04-02 International Business Machines Corporation Method of proactive object transferring management

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5958006A (en) * 1995-11-13 1999-09-28 Motorola, Inc. Method and apparatus for communicating summarized data
US6088588A (en) * 1997-03-25 2000-07-11 Nortel Networks Corporation Method and wireless terminal for monitoring communications and providing network with terminal operation information
US20040203684A1 (en) * 2002-09-30 2004-10-14 Nokia Corporation Terminal, device and methods for a communication network
US7185360B1 (en) * 2000-08-01 2007-02-27 Hereuare Communications, Inc. System for distributed network authentication and access control

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6088591A (en) * 1996-06-28 2000-07-11 Aironet Wireless Communications, Inc. Cellular system hand-off protocol
US5999526A (en) * 1996-11-26 1999-12-07 Lucent Technologies Inc. Method and apparatus for delivering data from an information provider using the public switched network
US6332154B2 (en) * 1998-09-11 2001-12-18 Genesys Telecommunications Laboratories, Inc. Method and apparatus for providing media-independent self-help modules within a multimedia communication-center customer interface
CA2296213C (en) * 2000-01-07 2009-04-14 Sedona Networks Corporation Distributed subscriber management
US20040003266A1 (en) * 2000-09-22 2004-01-01 Patchlink Corporation Non-invasive automatic offsite patch fingerprinting and updating system and method
JP3419391B2 (en) * 2000-10-05 2003-06-23 日本電気株式会社 LAN that allows access to authentication denied terminals under specific conditions
US7159031B1 (en) * 2001-01-26 2007-01-02 Fortinet, Inc. Remote customer management of virtual routers allocated to the customer
US6996393B2 (en) * 2001-08-31 2006-02-07 Nokia Corporation Mobile content delivery system
US20030208602A1 (en) * 2002-04-08 2003-11-06 Cisco Technology, Inc. System and method for pushing data in an internet protocol network environment
US7401133B2 (en) * 2002-04-23 2008-07-15 Secure Resolutions, Inc. Software administration in an application service provider scenario via configuration directives
US6832259B2 (en) * 2002-08-29 2004-12-14 Motorola, Inc. Dynamic adjustment of transmitted data size for a subscriber device
US20050177515A1 (en) * 2004-02-06 2005-08-11 Tatara Systems, Inc. Wi-Fi service delivery platform for retail service providers

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5958006A (en) * 1995-11-13 1999-09-28 Motorola, Inc. Method and apparatus for communicating summarized data
US6088588A (en) * 1997-03-25 2000-07-11 Nortel Networks Corporation Method and wireless terminal for monitoring communications and providing network with terminal operation information
US7185360B1 (en) * 2000-08-01 2007-02-27 Hereuare Communications, Inc. System for distributed network authentication and access control
US20040203684A1 (en) * 2002-09-30 2004-10-14 Nokia Corporation Terminal, device and methods for a communication network

Cited By (47)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060002350A1 (en) * 2004-07-02 2006-01-05 Cyrus Behroozi Access point control of client roaming
US7450552B2 (en) * 2004-07-02 2008-11-11 Tropos Networks, Inc. Access point control of client roaming
US20060018328A1 (en) * 2004-07-23 2006-01-26 Comcast Cable Holdings, Llc Method and system for powerline networking
US20100094997A1 (en) * 2005-06-23 2010-04-15 Joey Chou Event logging techniques for broadband wireless access networks
US7668905B2 (en) * 2005-09-07 2010-02-23 International Business Machines Corporation Method, system and computer program for providing web pages based on client state
US20070055725A1 (en) * 2005-09-07 2007-03-08 Gianluca Bernardini Method, system and computer program for providing web pages based on client state
US20070213033A1 (en) * 2006-03-10 2007-09-13 Samsung Electronics Co., Ltd. Method and apparatus for authenticating mobile terminal on handover
US8494487B2 (en) * 2006-03-10 2013-07-23 Samsung Electronics Co., Ltd. Method and apparatus for authenticating mobile terminal on handover
US9125170B2 (en) 2006-04-12 2015-09-01 Fon Wireless Limited Linking existing Wi-Fi access points into unified network
US20070242657A1 (en) * 2006-04-12 2007-10-18 Waisman-Diamond Martin V System and method for linking existing WI-FI access points into a single unified network
US9826102B2 (en) 2006-04-12 2017-11-21 Fon Wireless Limited Linking existing Wi-Fi access points into unified network for VoIP
US7924780B2 (en) * 2006-04-12 2011-04-12 Fon Wireless Limited System and method for linking existing Wi-Fi access points into a single unified network
US10291787B2 (en) 2006-04-12 2019-05-14 Fon Wireless Limited Unified network of Wi-Fi access points
US20110158215A1 (en) * 2006-04-12 2011-06-30 Fon Wireless Limited System and method for linking existing wi-fi access points into a single unified network
US20110182263A1 (en) * 2006-04-12 2011-07-28 Fon Wireless Limited System and method for linking existing wi-fi access points into a single unified network
US7995993B1 (en) 2006-04-12 2011-08-09 Fon Wireless Limited System and method for linking existing Wi-Fi access points into a single unified network
US8126430B2 (en) 2006-04-12 2012-02-28 Fon Wireless Limited System and method for linking existing Wi-Fi access points into a single unified network
US8306502B2 (en) 2006-04-12 2012-11-06 Fon Wireless Limited System and method for linking existing Wi-Fi access points into a single unified network
US10728396B2 (en) 2006-04-12 2020-07-28 Fon Wireless Limited Unified network of Wi-Fi access points
US9088955B2 (en) 2006-04-12 2015-07-21 Fon Wireless Limited System and method for linking existing Wi-Fi access points into a single unified network
US9913303B2 (en) 2006-09-06 2018-03-06 Devicescape Software, Inc. Systems and methods for network curation
US9326138B2 (en) 2006-09-06 2016-04-26 Devicescape Software, Inc. Systems and methods for determining location over a network
US9432920B2 (en) 2006-09-06 2016-08-30 Devicescape Software, Inc. Systems and methods for network curation
US20080130601A1 (en) * 2006-12-01 2008-06-05 Electronics And Telecommunications Research Institute Method for providing network communication service with constant quality regardless of being in wired or wireless network environment
US8590012B2 (en) * 2007-08-27 2013-11-19 Microsoft Corporation Network access control based on program state
US20090064306A1 (en) * 2007-08-27 2009-03-05 Microsoft Corporation Network access control based on program state
US20100263022A1 (en) * 2008-10-13 2010-10-14 Devicescape Software, Inc. Systems and Methods for Enhanced Smartclient Support
US9418169B2 (en) * 2009-10-14 2016-08-16 Blackberry Limited Extracting document data from multiple sources for display on a mobile communication device using HTTP request headers having XML strings therein
US20110087958A1 (en) * 2009-10-14 2011-04-14 Dumitru Dan Mihai Method for extracting document data from multiple sources for display on a communication device
US8910300B2 (en) 2010-12-30 2014-12-09 Fon Wireless Limited Secure tunneling platform system and method
US9015855B2 (en) 2010-12-30 2015-04-21 Fon Wireless Limited Secure tunneling platform system and method
US8955078B2 (en) * 2011-06-30 2015-02-10 Cable Television Laboratories, Inc. Zero sign-on authentication
US20130007868A1 (en) * 2011-06-30 2013-01-03 Cable Television Laboratories, Inc. Zero sign-on authentication
US11178130B2 (en) 2011-06-30 2021-11-16 Cable Television Laboratories, Inc. Zero sign-on authentication
US9961067B2 (en) 2011-06-30 2018-05-01 Cable Television Laboratories, Inc. Zero sign-on authentication
US8495714B2 (en) 2011-07-20 2013-07-23 Bridgewater Systems Corp. Systems and methods for authenticating users accessing unsecured wifi access points
WO2014051774A1 (en) * 2012-09-26 2014-04-03 Intel Corporation Techniques for fractional wireless broadband usage
US9397899B2 (en) 2012-09-26 2016-07-19 Intel Corporation Techniques for fractional wireless broadband usage
US9854001B1 (en) * 2014-03-25 2017-12-26 Amazon Technologies, Inc. Transparent policies
US9680872B1 (en) 2014-03-25 2017-06-13 Amazon Technologies, Inc. Trusted-code generated requests
US10511633B2 (en) 2014-03-25 2019-12-17 Amazon Technologies, Inc. Trusted-code generated requests
US10666684B2 (en) 2014-03-25 2020-05-26 Amazon Technologies, Inc. Security policies with probabilistic actions
US11489874B2 (en) 2014-03-25 2022-11-01 Amazon Technologies, Inc. Trusted-code generated requests
US11870816B1 (en) 2014-03-25 2024-01-09 Amazon Technologies, Inc. Trusted-code generated requests
US10020951B2 (en) * 2014-09-17 2018-07-10 Ca, Inc. Crowdsourcing-based detection, identification, and tracking of electronic devices
US20160080486A1 (en) * 2014-09-17 2016-03-17 Ca, Inc. Crowdsourcing-based detection, identification, and tracking of electronic devices
US20220361109A1 (en) * 2021-05-10 2022-11-10 Microsoft Technology Licensing, Llc System and method for reducing power consumption

Also Published As

Publication number Publication date
KR20070007155A (en) 2007-01-12
WO2005094464A2 (en) 2005-10-13
WO2005094463A2 (en) 2005-10-13
EP1741036A2 (en) 2007-01-10
EP1761866A4 (en) 2008-06-18
US8325625B2 (en) 2012-12-04
KR20060135910A (en) 2006-12-29
EP1761866A2 (en) 2007-03-14
WO2005094464A3 (en) 2005-11-17
WO2005094463A3 (en) 2008-08-14
US20060047830A1 (en) 2006-03-02

Similar Documents

Publication Publication Date Title
US20060041931A1 (en) Service level assurance system and method for wired and wireless broadband networks
US20050177515A1 (en) Wi-Fi service delivery platform for retail service providers
US10447533B2 (en) System and method for managing access point functionality and configuration
US8200773B2 (en) Client-side network access policies and management applications
US8234381B1 (en) Method and apparatus for accessing networks by a mobile device
US9398010B1 (en) Provisioning layer two network access for mobile devices
US9344883B2 (en) System and method for wide area wireless connectivity to the internet
US20060174127A1 (en) Network access server (NAS) discovery and associated automated authentication in heterogenous public hotspot networks
US8130635B2 (en) Network access nodes
US8111631B2 (en) Systems and methods for automatic configuration of customer premises equipments
US20070147324A1 (en) System and method for improved WiFi/WiMax retail installation management
US20060072583A1 (en) Systems and methods for monitoring and displaying performance metrics
WO2005076930A2 (en) Wi-fi service delivery platform for wholesale service providers
WO2007068992A1 (en) Support for integrated wlan hotspot clients
US20050068912A1 (en) Method and system for wirelessly providing an update to a network appliance
Cisco Configuring Accounting
CN1957347A (en) Method and system for automatic data transfer on a network-connected device
CN116471590A (en) Terminal access method, device and authentication service function network element
CN101379475A (en) Service level assurance system and method for wired and wireless broadband networks
CN116830531A (en) Providing security services via a federation-based network during roaming
Ravi Design and implementation of an SDN based authentication and separation mechanism for WiFi users

Legal Events

Date Code Title Description
AS Assignment

Owner name: PCTEL, INC., ILLINOIS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BOXALL, ROBERT;SAMSALOVIC, VOJISLAV;NAIR, BIJU;REEL/FRAME:016950/0623

Effective date: 20051007

AS Assignment

Owner name: PCTEL, INC., ILLINOIS

Free format text: CORRECTIVE COVERSHEET TO CORRECT ASSIGNMENT PREVIOUSLY RECORDED ON REEL 016950, FRAME 0623.;ASSIGNORS:BOXALL, ROBERT;SAMSALOVIC, VOJISLAV;NAIR, BIJU;REEL/FRAME:017751/0043

Effective date: 20051007

AS Assignment

Owner name: SMITH MICRO SOFTWARE, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:PCTEL, INC.;REEL/FRAME:020548/0803

Effective date: 20080104

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION