Language selection

Search

Patent 2384162 Summary

Third-party information liability

Some of the information on this Web page has been provided by external sources. The Government of Canada is not responsible for the accuracy, reliability or currency of the information supplied by external sources. Users wishing to rely upon this information should consult directly with the source of the information. Content provided by external sources is not subject to official languages, privacy and accessibility requirements.

Claims and Abstract availability

Any discrepancies in the text and image of the Claims and Abstract are due to differing posting times. Text of the Claims and Abstract are posted:

  • At the time the application is open to public inspection;
  • At the time of issue of the patent (grant).
(12) Patent: (11) CA 2384162
(54) English Title: METHODS FOR EFFICIENT EARLY PROTOCOL DETECTION
(54) French Title: PROCEDES DE DETECTION RAPIDE D'UN PROTOCOLE
Status: Expired and beyond the Period of Reversal
Bibliographic Data
(51) International Patent Classification (IPC):
  • H04W 28/06 (2009.01)
  • H04L 12/28 (2006.01)
  • H04L 69/324 (2022.01)
(72) Inventors :
  • ABROL, NISCHAL (United States of America)
  • LIOY, MARCELLO (United States of America)
(73) Owners :
  • QUALCOMM INCORPORATED
(71) Applicants :
  • QUALCOMM INCORPORATED (United States of America)
(74) Agent: SMART & BIGGAR LP
(74) Associate agent:
(45) Issued: 2011-01-04
(86) PCT Filing Date: 2000-09-07
(87) Open to Public Inspection: 2001-03-15
Examination requested: 2005-09-01
Availability of licence: N/A
Dedicated to the Public: N/A
(25) Language of filing: English

Patent Cooperation Treaty (PCT): Yes
(86) PCT Filing Number: PCT/US2000/024623
(87) International Publication Number: WO 2001019027
(85) National Entry: 2002-03-06

(30) Application Priority Data:
Application No. Country/Territory Date
09/392,342 (United States of America) 1999-09-08

Abstracts

English Abstract


A method and system that detects protocol and configuration messages in a PPP
packet without having to unframe the entire packet. The method includes a
communication device (MT2) that receives a plurality data frames (S306),
wherein the communication device is capable of ascertaining the beginning of
an information portion (S305) within the received frames. The communications
device detects whether the information portion contains configuration
information, such as protocol and configuration messages of a predetermined
type. In a first embodiment, the detection is achieved by the communication
device unescaping (S315) the contents of a plurality of bytes and determining
(S325, S330, S335) whether the escaped bytes contains the desired
configuration information. In a second embodiment, the communication device
determines whether the contents of a particular byte contain the desired
configuration information, in escaped or unescaped form, and the communication
device continues to sequentially process the bytes within the information
portion until the bytes typically containing the desired configuration
information are processed.


French Abstract

L'invention concerne un procédé et un système de détection de protocole et de messages de configuration dans un paquet PPP ne nécessitant pas le retrait du cadre de l'ensemble du paquet. Le procédé comprend un dispositif de communication (MT2) qui reçoit une pluralité de trames de données (S306) et qui est conçu pour contrôler le début d'une portion (S305) d'informations dans les trames reçues. Le dispositif de communication détermine si la portion d'informations contient des informations de configuration, telles que le protocole et les messages de configuration de type prédéterminé. Dans un premier mode de réalisation, le dispositif de communication effectue la détection en retenant (S315) le contenu d'une pluralité d'octets et en déterminant (S325, S330, S335) si les octets échappés contiennent les informations de configuration désirées. Dans un second mode de réalisation, le dispositif de communication détermine si le contenu d'un octet particulier présente les informations de configuration désirées, sous une forme échappée ou retenue, le dispositif poursuit alors le traitement des octets par séquences dans ladite portion d'informations jusqu'à ce que les octets contenant généralement les informations de configuration désirées soient traités.

Claims

Note: Claims are shown in the official language in which they were submitted.


18
CLAIMS
1. A method for early detection of configuration information of a
predetermined type, said method comprising:
receiving, on a communication device, a plurality of framed data
packets, each of said framed data packets containing an information portion;
detecting, on said communication device, a beginning of said
information portion within one of said framed data packets; and
determining, on said communication device, whether said
information portion contains said configuration information of a
predetermined type,
wherein said communication device unframes said one of said
framed data packets when said information portion contains said
configuration information of a predetermined type.
2. The method of Claim 1, wherein said detecting includes
scanning said plurality of said framed data packets and establishing said
beginning of said information portion for one of said framed data packets by
identifying a frame-demarcating character.
3. The method of Claim 2, wherein said detecting includes,
unescaping, on said communication device, contents of a
predetermined number of bytes within said information portion, and
determining, on said communication device, whether said contents
of said unescaped predetermined number of bytes includes predetermined
characters,
wherein said communication device unescapes contents of additional
consecutive bytes, succeeding said predetermined number of bytes, when
said contents of said unescaped predetermined number of bytes includes said
predetermined characters, and
wherein said communication device determines whether contents of
said unescaped predetermined number of bytes and contents of additional

19
consecutive bytes contain said configuration information of a
predetermined type.
4. The method of Claim 2, wherein said detecting includes,
determining, on said communication device, whether contents of a
particular byte or bytes of said information portion contains information of a
type associated with said particular byte, and
determining, on said communication device, whether said contents
of said particular byte contains said configuration information of a
predetermined type,
wherein said communication device progresses to a subsequent stage
when said contents of said particular byte lacks said configuration
information of a predetermined type and said configuration information of
a predetermined type is disposed in a byte position subsequent to said
particular byte.
5. The method of Claim 4, wherein said progresses to a
subsequent stage further includes,
examining, on said communications device, contents of at least one
succeeding byte of said information portion, said succeeding byte being
subsequent to said particular byte, and
determining, on said communication device, whether contents of
said succeeding byte contains information of a type associated with said
succeeding byte, and
determining, on said communication device, whether said contents
of said succeeding byte contains said configuration information of a
predetermined type,
wherein said communication device sequentially examines
successive bytes of said information portion until contents of said
succeeding byte contains said configuration information of a predetermined
type.

20
6. The method of Claim 5, wherein said contents of said particular
byte and said contents of said succeeding byte includes escaped information.
7. The method of Claim 5, wherein said contents of said particular
byte and said contents of said succeeding byte includes unescaped
information.
8. A system for early detection of configuration information of a
predetermined type, said system comprising:
a terminal device for transmitting and receiving a plurality of framed
data packets, each of said framed data packets containing an information
portion; and
a communication device coupled to said terminal device,
wherein said communication device detects a beginning of said
information portion within one of said framed data packets and determines
whether said information portion contains said configuration information
of a predetermined type, and
wherein said communication device unframes said one of said
framed data packets when said information portion contains said
configuration information of a predetermined type.
9. The system of Claim 8, wherein said detecting by said
communication device includes scanning said plurality of said framed data
packets and establishing said beginning of said information portion for one
of said framed data packets by identifying a frame-demarcating character.
10. The system of Claim 9, wherein said detecting by said
communication device includes,
unescaping contents of a predetermined number of bytes within said
information portion, and
determining whether said contents of said unescaped predetermined
number of bytes includes predetermined characters,

21
wherein said communication device unescapes contents of additional
consecutive bytes, succeeding said predetermined number of bytes, when
said contents of said unescaped predetermined number of bytes includes said
predetermined characters, and
wherein said communication device determines whether contents of
said unescaped predetermined number of bytes and contents of additional
consecutive bytes contain said configuration information of a
predetermined type.
11. The system of Claim 9, wherein said detecting by said
communication device includes,
determining whether contents of a particular byte or bytes of said
information portion contains information of a type associated with said
particular byte or bytes, and
determining whether said contents of said particular byte or bytes
contains said configuration information of a predetermined type,
wherein said communication device progresses to a subsequent stage
when said contents of said particular byte or bytes lacks said configuration
information of a predetermined type and said configuration information of
a predetermined type is disposed in a byte position subsequent to said
particular byte or bytes.
12. The system of Claim 11, wherein said communication device
progressing to a subsequent stage further includes,
examining contents of at least one succeeding byte of said information
portion, said succeeding byte being subsequent to said particular byte, and
determining whether contents of said succeeding byte contains
information of a type associated with said succeeding byte and whether said
contents of said succeeding byte contains said configuration information of a
predetermined type,
wherein said communication device sequentially examines
successive bytes of said information portion until contents of said

22
succeeding byte contains said configuration information of a predetermined
type.
13. The method of Claim 12, wherein said contents of said
particular byte and said contents of said succeeding byte includes escaped
information.

Description

Note: Descriptions are shown in the official language in which they were submitted.


CA 02384162 2002-03-06
WO 01/19027 PCT/US00/24623
1
METHODS FOR EFFICIENT EARLY PROTOCOL DETECTION
BACKGROUND OF THE INVENTION
I. Field of the Invention
This invention generally relates to the field of wireless
communications. More particularly, the present invention relates to a
novel method and system for performing early protocol and configuration
message detection without having to unframe entire PPP packets.
II. Description of Related Art
Recent innovations in wireless communication and computer-related
technologies, as well as the unprecedented growth of Internet subscribers,
have paved the way for mobile computing. In fact, the popularity of mobile
computing has placed greater demands on the current Internet
infrastructure to provide mobile users with more support. A cruaal part of
meeting these demands andproviding users with the necessary support is the
use of Code Division Multiple Access (CDMA) technology in wireless
communication systems.
CDMA is a digital radio-frequency (RF) channelization technique
defined in the Telecommunications Industry Association/Electronics
Industries Association Interim Standard-95 (TIA/EIA IS-95), entitled "MOBILE
STATION-BASE STATION COMPATIBILITY STANDARD FOR DUAL
MODE W IDEBAND SPREAD SPECTRUM CELLULAR SYSTEM", published
in July 1993 and herein incorporated by reference. W ireless communication
systems employing this technology assign a unique code to communication
signals andspread these communication signals across a common (wideband)
spread spectrum bandwidth. As long as the receiving apparatus in a CDMA
system has the correct code, it can successfully detect and select its
rnmmunication signal from the other signals concurrently transmitted over
the same frequency band The use of CDMA produces an increase in system

CA 02384162 2002-03-06
WO 01/19027 PCT/US00/24623
2
traffic capacity, improves overall call quality andnoise reduction, and
provides
a reliable transport mechanism for data service traffic.
FIG. 1 illustrates the basic elements of such a wireless data
communication system 100. Artisans of ordinary skill will readily appreciate
that these elements, or their interfaces, may be modified, augmented, or
subjected to various standards known in the art, without limiting their
scope or function. System 100 allows a mobile terminal equipment, TE2
device 102 (e.g., the terminal equipment such as laptop or palmtop
computer) to communicate with an Interworking Function (IWF) 108.
System 100 includes a wireless communication device, MT2 device 104 (e.g.,
wireless telephone), and a Base Station/Mobile Switching Center (BS/MSC)
106. The IWF 108 serves as a gateway between the wireless network and
other networks, such as the Public Switched Telephone Network or wireline
packet data networks providing Internet- or Intranet-based access.
As shown in FIG. 1, the IWF 108 is coupled to the BS/MSC 106, via
the L interface. Often the IWF 108 will be co-located with the BS/MSC 106.
The TE2 device 102 is electronically coupled to the MT2 device 104 via the
Rm interface. The MT2 device 104 communicates with the BS/MSC 106 via
the wireless interface Un,. The TE2 device 102 and the MT2 device 104 may
be integrated into a single unit or may be separated out, as in the case of an
installed mobile phone unit in which a laptop is the TE2 device 102 and the
transceiver is the MT2 device 104. It is important to note that, as indicated
by FIG. 2, the combination of the TE2 device 102 and the MT2 device 104,
whether integrated or separate, is generally referred to as a mobile station
(MS) 103.
Other support is made possible by applying various well-known
protocols to control, manage, or otherwise facilitate different aspects of
wireless communications. For example, the life-blood of the Internet
infrastructure, the Internet Protocol (IP), has been incorporated in wireless
communications to accommodate packet-oriented services. The IP protocol
specifies the addressing and routing of packets (datagrams) between host
computers and is defined in Request For Comment 791 (RFC 791) entitled,
"INTERNET PROTOCOL DARPA INTERNET PROGRAM PROTOCOL

CA 02384162 2002-03-06
WO 01/19027 PCT/US00/24623
3
SPECIFICATION," published September 1981, and herein incorporated by
reference.
The IP protocol is a network layer protocol that encapsulates data into
IP packets for transmission. Addressing information is affixed to the header
of the packet. IP headers (e.g., IP version 4) contain 32-bit addresses that
identify the sending and receiving hosts. These addresses are used by
intermediate routers to select a path through the network for the packet
towards its ultimate destination at the intended address. Thus, the Il'
protocol allows packets originating at any Internet node in the world to be
routed to any other Internet node in the world, given that the originating
party knows the IP address of the destination party.
Another well-known protocol which has been incorporated in
wireless communications systems is the Point-to-Point Protocol (PPP)
protocol, which provides, inter alia, Internet access. The PPP protocol is
described in detail in Request for Comments 1661 (RFC 1661), entitled "THE
POINT-TO-POINT PROTOCOL (PPP)", published July 1994 and herein
incorporated by reference.
Essentially, the PPP protocol speafies a method for transporting multi
protocol datagrams over point-to-point links and contains three main
components: a method of encapsulating multi-protocol datagrams over
serial links; a Link Control Protocol (LCP) for establishing, testing,
configuring, and maintaining a data link connection; and a family of
Network Control Protocols (NCPs) for establishing and configuring different
network-layer protocols.
In an effort to provide a host of services on wireless communication
systems, various standards have been developed to accommodate the
wireless data transmission between the TE2 device 102 and the IWF 108. For
example, the TIA/EIA IS-707.5 standard, entitled "DATA SERVICE
OPTIONS FOR WIDEBAND SPREAD SPECTRUM SYSTEMS: PACKET
DATA SERVICES," published February 1998, and herein incorporated by
reference, defines requirements for support of packet data transmission
capability on TIA/EIA IS-95 systems and speafies a suite of packet data bearer
services. Similarly, the TIA/EIA IS-707-A.5 standard, entitled "DATA

CA 02384162 2002-03-06
WO 01/19027 PCT/US00/24623
4
SERVICE OPTIONS FOR SPREAD SPECTRUM SYSTEMS: PACKET DATA
SERVICES," and the TIA/EIA IS-707-A.9 standard, entitled "DATA SERVICE
OPTIONS FOR SPREAD SPECTRUM SYSTEMS: HIGH-SPEED PACKET
DATA SERVICES," both published in March 1999 and incorporated by
reference, also define requirements for packet data transmission support on
TIA/EIA IS-95 systems.
These standards provide that certain packet data service options that
may be used to communicate between the TE2 device 102 and IWF 108 via
BS/MSC 106. In doing so, IS-707.5 introduces the Network Model, which
details the packet data protocol requirements for the Rn, interface, Um
interface, and the L interface. Under this model, two separate PPP links are
provided at the data link layer: a first PPP link (PPPR) provides the data
link
layer between the TE2 device 102 and the MT2 device 104 (i.e., across the Rm
interface), and a second PPP link (PPPU), independent of the first, provides
the data link layer between the MT2 device 104 and the IWF 108 (i.e., across
the Um and L interfaces).
The separate and independent PPP links help support "transparent
mobility"; that is, the TE2 device 102 should experience seamless and
transparent service, regardless of time and its current IWF 108 point-of-
attachment. As such, the TE2 device 102 should not be affected by location
changes. For example, the TE2 device 102 should not be affected from PPP
renegotiations occurring on the Um link, such as when MT2 device 104
attempts to attach to a different IWF 108. Thus, the Network Model operates
to isolate the PPPR link from the PPPU link in order to prevent changes on
the Um link from affecting the Rm link. In other words, the PPPU link can be
renegotiated without forcing the PPPR link to be renegotiated.
FIG. 2 illustrates the protocol stacks in each entity of the IS-707.5
Network Model. At the far left of FIG. 2 is a protocol stack, shown in
conventional vertical format, depicting the protocol layers running on the
TE2 device 102 (e.g., the mobile terminal, laptop or palmtop computer). The
TE2 device 104 protocol stack is illustrated as being logically connected to
the
MT2 device 104 protocol stack over the Rm interface. The MT2 device 104, is
illustrated as being logically connected to the BS/MSC 106 protocol stack

CA 02384162 2002-03-06
WO 01/19027 PCT/US00/24623
over the U", interface. The BS/MSC 106 protocol stack is, in turn, shown as
being logically connected to the IWF 108 protocol stack over the L interface.
By way of example, the protocols depicted in FIG. 2, operate as follows:
the PPPR protocol 208 on the TE2 102 device encodes packets from the upper
5 layer protocols 204, and the network layer IP protocol 206. The PPPR
protocol
208 then transmits the packets across the Rm interface using the TIA/EIA 232-
F protocol 210 to the TIA/EIA-232-F-compatible port on the MT2 device 104
running the TIA/EIA 232-F protocol 212. The TIA/EIA-232-F standard is
defined in "INTERFACE BETWEEN DATA TERMINAL EQUIPMENT AND
DATA CIRCUIT-TERMINATING EQUIPMENT EMPLOYING SERIAL
BINARY DATA INTERCHANGE", published in October 1997 and herein
incorporated by reference. It is to be understood that other standards or
protocols known to artisans of ordinary skill in the art may be used to define
the transmission across the Rm interface. For example, other applicable Rm
interface standards include, the "UNIVERSAL SERIAL BUS (USB)
SPECIFICATION, Revision 1.1", published in September 1998, and the
"BLUETOOTH SPECIFICATION VERSION 1.0A CORE, published in July
1999, both incorporated by reference.
The TIA/EIA 232-F protocol 212 on the MT2 device 104 receives the
packets from the TE2 device 102 and passes them to the PPPR protocol 213.
As stated above, the PPPR protocol 213 unframes the packets encapsulated in
the PPP frames and typically, when a data connection is up, the protocol 213
transfers the packets to PPPU protocol 217. Protocol 217 essentially re-frames
the packets for transmission to a PPPU peer located in the IWF 108. The
Radio Link Protocol (RLP) 216 and IS-95 protocol 214, both of which are well
known in the art, are used to transmit the packet-encapsulated PPP frames to
the BS/MSC 106 over the Um interface. The RLP protocol 216 is defined in
the IS-707.2 standard, entitled "DATA SERVICE OPTIONS FOR WIDEBAND
SPREAD SPECTRUM SYSTEMS: RADIO LINK PROTOCOL", published i n
February 1998 and herein incorporated by reference, as well as the IS-707-A.2
standard, entitled "DATA SERVICE OPTIONS FOR SPREAD SPECTRUM
SYSTEMS: RADIO LINK PROTOCOL", published in March 1999 and also
incorporated by reference.

CA 02384162 2002-03-06
WO 01/19027 PCT/US00/24623
6
A corresponding RLP protocol 220 and IS-95 protocol 222 in the
BS/MSC 106 transfer the packets to the relay layer protocol 224 for
transmission across the L interface to the relay layer protocol 224 on the IWF
108. The PPPU protocol 232 then unframes the received packets and transfers
them to the network layer protocol IP 230, which in turn passes them to the
upper layer protocols 228 or forwards them to the Internet.
As stated above, the PPPR protocol 213 transfers the packets to the PPPU
protocol 217 when a data link connection is established. RFC 1661 provides
that Link Control Protocol (LCP) packets must be exchanged and negotiated
over each PPP link (i.e., PPPR and PPPU) in order to establish, configure, and
test the data link connection. As such, these LCP packets comprise
Configure-Request, Configure-Ack, Configure-Nak, Protocol-Reject, and
Configure-Reject messages to negotiate various options and operate as
follows: the Configure-Request packet is used to negotiate configuration
options. The Configuration-Ack packet is only transmitted if every
configuration option in a received Configuration-Request packet is
recognizable and all values are acceptable. The Configure-Nak packet is sent
when the requested configuration options in a Configuration-Request packet
are recognizable but contain values that are not acceptable and the
Configure-Nak Options field is filled with the unacceptable Configure
Request configuration options and suggested values that will work. The
Configure-Reject packet is sent when the requested configuration options i n
a Configure-Request includes configuration options that are not understood
by the receiver and the Configure-Reject Options field contains the
unrecognized Configure-Request configuration options.
Once the LCP packets are exchanged, the link options negotiated, and
the data link connection established, a network layer connection must be
established between the TE2 device 102 and the IWF 108. Such a connection
is achieved through protocols 206, 212, 218, 230, which include, for example,
the IP protocol. The negotiating, configuring, enabling, and disabling of the
IP protocol on both ends of the PPP links is provided by the Internet Protocol
Control Protocol (IPCP). IPCP is a part of a family of Network Control
Protocols (NCPs) included in the PPP protocol and is described in Request for

CA 02384162 2002-03-06
WO 01/19027 PCT/US00/24623
7
Comment (RFC) 1332, "THE PPP INTERNET PROTOCOL CONTROL
PROTOCOL (IPCP)", published in May 1992 and herein incorporated by
reference.
The Il'CP protocol uses the same configuration option negotiation
mechanism as the LCP protocol and, much like the LCP protocol, Il'CP
negotiations occur separately for both the Rm interface and the Um interface.
As described in RFC 1661, the Configuration-Ack packet contains a list of the
options, which the Sender is acknowledging. The MT2 device 104 monitors
the received and transmitted Configuration-Ack packets over the Rm and Um
interfaces and stores the value of each option in a storage device, such as a
computer memory. All configuration options have default values, defined
by RFC 1661, which are used when the corresponding configuration option
is not negotiated. It is to be noted that the configuration option default
values may be defined by other RFCs, such as, for example, RFC 1877 entitled
"PPP Internet Protocol Control Protocol Extensions for Name Server
Addresses" published in December 1995 and incorporated by reference.
As stated above with respect to the Network Model, the PPPU link can
be renegotiated without forcing the PPPR link to be renegotiated. To
maintain such isolation between the Rm and Um interfaces, the MT2 device
104 generally unframes and reframes received PPP packets. Unless packets
received by the MT2 device 104 are to be passed to an executing upper layer
protocol within the MT2 device 104, the PPP packets are unframed only to be
refrained for subsequent transmission to a PPP peer protocol. This
unframing/reframing occurs even when the packets require no further
processing in the MT2 device 104. For example, when a call is initially
brought up, the LCP and IPCP mechanisms can negotiate to establish
identical configuration options for both the Um and Rm interfaces. As long as
the configuration options remain identical, all of the PPP data packets (as
opposed to the configuration packets) could "pass through", from one
interface to the other, without the MT2 device 104 unframing/reframing the
packets. Clearly, in cases where the configuration options remain identical,
the MT2 device 104 performs too many unnecessary PPP packet

CA 02384162 2002-03-06
WO 01/19027 PCT/US00/24623
8
unframing/reframing operations. Such operations adversely affect the
processing resources and throughput latency of the MT2 device 104.
However, if the configuration options change, they must be
renegotiated, which militates in favor of unframing/reframing the PPP
packets. For example, by virtue of the fact that the MT2 device 104 is mobile,
it is capable of moving to an area that is served by an IWF 108 that is
different from the original IWF 108. When this happens, the MT2 device
104 will be "handed off" to the new IWF 108 for service. This handoff
requires the renegotiation of particular LCP and Il'CP configuration options
over the Um interface as well as the intervention of the MT2 device 104. If
the packets containing the configuration option messages (e.g., Configure-
Request, Configure-Ack, Configure-Nak, etc.) were simply "passed through",
without unframing or examining the contents of the packets, the packets
would force the end-to-end resynchronization of the entire link which
would terminate the independence of the Rm and Um links.
Therefore, what is needed is a novel and efficient method and system
capable of early protocol and configuration message detection without
having to unframe a PPP packet.
SUMMARY OF THE INVENTION
The present invention addresses the need identified above by
providing a method and system that detects protocol and configuration
messages in a PPP packet without having to unframe the entire packet.
Methods and systems consistent with the principles of the present
invention as embodied and broadly described herein include a
communication device that receives a plurality data frames, wherein the
communication device is capable of ascertaining the beginning of an
information portion within the received frames. The communications
device detects whether the information portion contains configuration
information, such as protocol and configuration messages of a
predetermined type. In a first embodiment, the detection is achieved by the
communication device unescaping the contents of a plurality of bytes and

CA 02384162 2002-03-06
WO 01/19027 PCT/US00/24623
9
determining whether the escaped bytes contains the desired configuration
information. In a second embodiment, the communication device
determines whether the contents of a particular byte contain the desired
configuration information, in escaped or unescaped form, and the
communication device continues to sequentially process the bytes within
the information portion until the bytes typically containing the desired
configuration information are processed or it is determined that the
information does not exist.
BRIEF DESCRIPTION OF THE DRAWINGS
The accompanying drawings, which are incorporated in and
constitute a part of this Specification, illustrate an embodiment of the
invention and, together with the description, explain the objects,
advantages, and principles of the invention. In the drawings:
FIG. 1 is a high level block diagram depicting various elements of a
wireless communication system.
FIG. 2 schematically describes the protocol stacks of a wireless
communication system.
FIG. 3 is a flow-chart diagrams describing a first embodiment of the
invention.
FIGS. 4A, 4B are flow-chart diagrams describing a second embodiment
of the invention.
FIG. 5 describes the general format of a packet encapsulated in a PPP
frame.
DETAILED DESCRIPTION OF THE PREFERRED
EMBODIMENTS
The following detailed description of the embodiments of the present
invention refers to the accompanying drawings that illustrate these. Other
embodiments are possible and modifications may be made to the
embodiments without departing from the spirit and scope of the invention.

CA 02384162 2002-03-06
WO 01/19027 PCT/US00/24623
Therefore, the following detailed description is not meant to limit the
invention. Rather the scope of the invention is defined by the appended
claims.
It will be apparent to one of ordinary skill in the art that an
5 embodiment of the present invention, as described below, may be realized i n
a variety of implementations, including the software, firmware, and
hardware of the entities illustrated in the figures (i.e., TE2 device 102, MT2
device 104, BS/MSC 106 and IWF 108). The actual software code or control
hardware used to implement the present invention is not limiting of the
10 present invention. Thus, the operation and behavior of the present
invention will be described without specific reference to the actual software
code or hardware components. Such non-specific references are acceptable
because it is clearly understood that a person of ordinary skill in the art
would be able to design software and control hardware to implement the
embodiment of the present invention based on the description herein.
Because the embodiments described herein operate on PPP packets
encapsulated in HDLC frames, FIG. 5 illustrates the various attributes of
such packets. The beginning (and end) of the frame is demarcated by a 1-byte
framing flag represented by the hexadecimal character "7E". The following
two bytes indicate the protocol address and control field which, for standard
PPP packets, are typically designated as the hexadecimal characters "FF" and
"03", respectively. The next two bytes indicate the protocol type, such as,
for
example, the LCP protocol, denoted by the hexadecimal characters "CO" and
"21"; the IPCP protocol, indicated by the hexadecimal characters "80" and
"21"; or the Van Jacobson protocol compressed state, indicated by the
hexadecimal characters "00" (which may be compressed out) and "2D". The
subsequent byte indicates the code or the configuration message, such as
Configure-Request, denoted by the hexadecimal character "01 "; Configure
Ack, indicated by the hexadecimal character "02"; or Configure-Nak,
indicated by the hexadecimal character "03".

CA 02384162 2002-03-06
WO 01/19027 PCT/US00/24623
11
1. First Embodiment
FIG. 3 is a flow-chart diagram depicting a first embodiment of the
present invention. As such, FIG. 3 details the operation of the MT2 device
104 for performing early protocol and configuration message detection i n
PPP packets.
In step S305, the MT2 device 104, first scans an incoming data stream
to detect the framing flag, indicated by the hexadecimal character "7E". This
flag demarcates a frame and can, therefore, be used to indicate the beginning
and/or end of packets encapsulated in PPP frames. If the MT2 device 104 has
not detected a "7E" framing flag, it keeps scanning the incoming data, as
indicated by step S306, until it detects the flag. Once the MT2 device 104
detects the "7E" framing flag, it progresses to step 5310.
After detecting a "7E" flag, the MT2 device 104, in step S310,
determines whether the next byte is also a "7E" flag. If so, the MT2 device
104 skips that particular byte, as indicated in step S320, and returns back to
step S310 to apply the "7E" flag test to the next byte. If the next byte is
not a
"7E" flag, the MT2 device 104 progresses to step S315. It is important to note
that the incoming data stream may contain consecutive "7E" flags, as in the
case of back-to-back packets where a "7E" flag, indicating the end of a frame,
is juxtaposed to a subsequent "7E" flag, indicating the beginning of a new
frame. Steps S310 and S320 operate to filter out the framing flags, enabling
the MT2 device 104 to discern where the information portion of the framed
packet begins.
Aware that the next byte is not a "7E" flag, but an information byte,
the MT2 device 104 in step 5315, "unescapes" the next X number of bytes,
where X corresponds to the relative position of the information sought
within the framed-packet. This unescaping is performed because, as is well
known in the art, when the PPP protocol is transmitted with asynchronous,
HDLC-like framing (i.e., as per RFC 1662), the protocol employs an "escaping
technique" to mask certain characters within the information portion of a
packet that also function as special control characters. Such characters
include the aforementioned "7E" flag as well as the escape flag "7D". W h a n
these characters are encountered in the information portion of a framed-

CA 02384162 2002-03-06
WO 01/19027 PCT/US00/24623
12
packet, the escaping technique stuffs the escape flag "7D" in front of the
character and modifies the character in order to neutralize its control
function. Therefore, in seeking to detect certain protocol or configuration
information from an incoming data stream, the MT2 device 104, in step
S315, unescapes the number of bytes necessary to access the information
sought in order to uncover its true identity. After unescaping X bytes, the
MT2 device 104 proceeds to step S325.
In step S325, the MT2 device 104 determines whether the unescaped X
bytes include the standard PPP address and control field characters "FF" and
"03", respectively. Although these characters typically comprise the first and
second bytes of the information portion of a PPP packet (see, e.g., FIG. 5),
these characters may be compressed out of the packet, thereby affecting the
location of the ensuing information bytes. Therefore, the MT2 device 104
must check whether these characters are included within the unescaped
bytes of the packet in order to make the necessary adjustments later. If the
characters "FF" and "03" are not included in the unescaped bytes (i.e.,
characters "FF" and "03" are compressed out), the MT2 device 104, in step
S330, checks to see whether these bytes contain the protocol or configuration
message information being sought. If they do, then the MT2 device 104, i n
step S340, forwards the entire packet to the MT2 device 104 unframer, i n
order to unframe the packet and engage in the processing indicated by the
detected information. If the bytes do not contain the information being
sought, the MT2 device 104 sends the entire packet to the MT2 device 104
transmit portion to be forwarded across the pertinent interface, as indicated
by step S345.
Returning to step S325, if the unescaped X bytes include "FF" and
"03", the MT2 device 104, in step S335, compensates by unescaping another 2
bytes, in addition to the specified X bytes. This adjusts for the inclusion of
the "FF" and "03" characters within the X bytes. The MT2 device 104 then
submits the X + 2 unescaped bytes to step S330, where, as stated above, it
checks to see whether the unescaped bytes contain the desired information.
If they do, then the MT2 device 104, in step S340, forwards the entire packet
to the MT2 device 104 unframer. If the bytes do not contain the protocol or

CA 02384162 2002-03-06
WO 01/19027 PCT/US00/24623
13
configuration message information being sought, the MT2 device 104, in
step S345, sends the entire packet to the MT2 device 104 transmit portion to
forward the packet across the pertinent interface.
To illustrate the operation of this embodiment, suppose the early
detection of an LCP protocol packet is desired. The LCP protocol
specification is provided within the protocol information portion of a PPP-
framed packet. As indicated in FIG. 5, the protocol information is 2 bytes
long, typically occupying byte positions 3 and 4 of the information portion of
a standard PPP-framed packet. After scanning the incoming data stream and
discerning where the information bytes begin (i.e., steps 5305, S310, and
S320), the MT2 device 104 unescapes the next two bytes (i.e., X equal to 2),
as
indicated by step S315. If, in step S325, the first 2 bytes do not include the
"FF" and "03" characters, then the MT2 device 104 checks to see whether
these bytes contain the LCP information being sought. If it does, then the
MT2 device 104, in step S340, forwards the entire packet to the MT2 device
104 unframer, in order to unframe the packet and engage in the processing
required by the LCP protocol information. If the bytes do not contain the
LCP information, the MT2 device 104 sends the entire packet to the MT2
device 104 transmit portion to be forwarded across the pertinent interface, as
indicated by step 5345.
If, on the other hand, the first two bytes of the unescaped X bytes are
"FF" and "03", the MT2 device 104, in step S335, compensates by unescaping
the next 2 bytes, in addition to the first two bytes. The MT2 device 104 then
submits all four unescaped bytes to step 5330, where, as stated above, it
checks to see whether these bytes contain the LCP information being sought.
If they do, then the MT2 device 104, in step 5340, forwards the entire packet
to the MT2 device 104 unframer. If the bytes do not contain the LCP
information, the MT2 device 104, in step S345, sends the entire packet to the
MT2 device 104 transmit portion.
It is important to note that, by virtue of the embodiment described
above, all of the header information contained within the PPP-framed
packet can be detected without unframing the entire packet. For example, by
simply adjusting the X value in step 5315, this embodiment can detect such

CA 02384162 2002-03-06
WO 01/19027 PCT/US00/24623
14
PPP information as protocol information, configuration messages, packet ID,
etc.
Thus, this embodiment detects protocol and configuration messages
within a PPP packet stream without having to unframe the entire packets.
Rather, by unescaping certain bytes within the information portion of the
packets, this embodiment provides a system and method that efficiently
detects protocol and configuration messages without performing
unnecessary PPP packet unframing/reframing operations.
2. Second Embodiment
FIGS. 4A, 4B are flow-chart diagrams depicting a second embodiment
of the present invention. This embodiment detects protocol and
configuration messages contained within the information portion of a PPP-
framed packet by scanning the incoming data stream and mechanically
checking the information bytes in stages, without unframing the packets.
Given the format of the PPP-framed packets, as illustrated by FIG. 5, the
first
stage specifically detects the content of the 1-byte address field, contained
within the information portion of the packet. The second stage is directed to
detecting the contents of the 1-byte control field, which follows the address
field. Accordingly, this embodiment is capable of advancing the stages, and
detecting the contents of all information fields, until the end of the
information portion. For example, a third stage could be directed to
detecting the contents of the 2-byte protocol field, which follow the control
field. However, because of the PPP-framed packet structure and the
sequential nature of this embodiment, information contained in the later
fields of the frame, is generally detected after processing and detecting
information contained in the preceding fields.
As a representative example of this embodiment, suppose the
information sought is contained within the control field. To access this field
and detect the pertinent information from an incoming data stream, the
MT2 device 104 must first identify the beginning of the information portion
of the PPP packet and then access and detect the information in the address

CA 02384162 2002-03-06
WO 01/19027 PCT/US00/24623
field. Only after processing the address field information, is the MT2 device
104 ready to access and detect the control field information.
As such, FIG. 4A illustrates the first stage of this embodiment. In step
5405, the MT2 device 104 first scans the incoming data stream to detect the
5 framing flag "7E". After detecting the "7E" flag, the MT2 device 104, in
step
5410, determines whether the next byte is also a "7E" flag. If it is, the MT2
device 104 moves to the next byte, as indicated in step 5415, and returns back
to step S410 to apply the "7E" flag test to the next byte. If the next byte is
not a
"7E" flag, the MT2 device 104 progresses to step S420. As stated above with
10 respect to the first embodiment, steps S410 and S415 operate to filter out
the
framing flags, allowing the MT2 device 104 to identify the beginning of the
information portion of the PPP-framed packet.
Once the MT2 device 104 is able to identify the beginning information
portion, it exploits the format of PPP packets to detect the information in
15 stages. As stated above, the first stage of this embodiment is to detect
the
character "FF"
In step 5420, the MT2 device 104 checks to see whether the first
information byte is the escape character "7D". As indicated above, the
escaping technique stuffs the escape flag "7D" in front of certain characters
and masks them. If the first information byte is not "7D" (i.e., the first
information byte is not escaped), the MT2 device 104, in step 5425, checks to
see if the first information byte is the "FF" character (i.e., in unescaped
form). If it is, the MT2 device 104 proceeds to step S435. If first
information
byte is not the "FF" character, the MT2 device 104 determines, in step S426,
whether there is more information within the framed-packet to be sought,
and if there is, the MT2 device 104 moves onto the next stage in step S427. If
there is no additional desired information, the MT2 device 104, in step 5428,
sends the entire packet to the MT2 device 104 transmit portion to forward
the packet across the pertinent interface.
Returning to step S420, if the first information byte is "7D" (i.e., the
first information byte is escaped), the MT2 device 104, in step S430, checks
to
see whether the next byte is the "FF" character in the escaped format (i.e.,
hexadecimal character "DF"). If it is, the MT2 device 104 proceeds to step

CA 02384162 2002-03-06
WO 01/19027 PCT/US00/24623
16
S435. If the next byte is not the "DF" character, the MT2 device 104 proceeds
to step S426 where, as stated above, the MT2 device 104 checks to see
whether there is more desired information. If there is, the MT2 device 104
moves onto the next stage in step 5427. If there is no additional desired
information, the MT2 device 104, in step 5428, sends the entire packet to the
MT2 device 104 transmit portion to forward the packet across the pertinent
interface.
If, in step S430, the next byte is the "FF" character in the escaped
format (i.e., hexadecimal character "DF"), the MT2 device 104 proceeds to
step S435, where it checks to see whether there is more information to be
sought. If there is, the MT2 device 104 moves onto the next stage in step
S427. If there is no additional desired information, the MT2 device 104, in
step S437, forwards the entire packet to the MT2 device 104 unframer, i n
order to unframe the packet and engage in the processing indicated by the
detected information.
After completing the first stage of the embodiment (i.e., the detection
of the "FF" character in the protocol address field), the MT2 device 104 must,
consistent with the object of the representative example, endeavor to detect
the "03" character in the control field. As noted above, this detection is
referred to as the second stage detection for this embodiment and is depicted
in FIG. 4B.
Upon completing the first stage, as indicated by step 5427, the MT2
device 104, in step S440, determines, once again, whether the next byte is the
"7D" character. As stated above, this determination is used in case the
characters within the relevant information field were escaped. If the next
byte is not the "7D" character, the MT2 device 104, in step S445, determines
whether the byte is the "03" character (i.e., in unescaped format). If it is,
the
MT2 device 104 progresses to step S435 where, as previously noted, the MT2
device 104 determines whether there is additional information being
sought, and if there is the MT2 device 104 moves onto the next stage, as per
step 5427. Otherwise, the MT2 device 104, in step S428, forwards the entire
packet to the MT2 device 104 transmit portion to forward the packet across
the relevant interface.

CA 02384162 2002-03-06
WO 01/19027 PCT/US00/24623
17
Returning to step 5440, if the MT2 device 104 determines that the
following byte is the "7D" character, it checks to see, in step S450, whether
the subsequent byte is the "03" character in the escaped format (i.e.,
hexadecimal character "23"). If the subsequent byte is not the "23" character,
the MT2 device 104 proceeds to step S426, to determine whether to move
onto the next stage, as in step S427, or send the entire packet to the MT2
device 104 transmit portion to forward the packet across the pertinent
interface, as in step S428. If the subsequent byte is the "23" character, the
MT2 device 104 proceeds to step S435 where it determines whether to move
onto the next stage, as in step S427, or forward the entire packet to the MT2
device 104 unframer, as in step S437.
Thus, this embodiment detects protocol and configuration messages
within a PPP packet stream without having to unframe the packets. Rather,
this embodiment scans the incoming data stream and mechanically checks
the information bytes in stages. These stages correspond to the information
fields of the PPP-framed packets and, therefore, this embodiment detects the
desired information sequentially without performing unnecessary PPP
packet unframing/reframing operations and without ignoring messages
affecting link configurations.
The foregoing description of preferred embodiments of the present
invention provides illustration and description, but is not intended to be
exhaustive or to limit the invention to the grease form disclosed.
Modifications and variations are possible consistent with the above teachings
or maybe acquired from practice of the invention. Accordingly, the scope of
the invention is defined by the claims and their equivalents.
What is claimed is:

Representative Drawing
A single figure which represents the drawing illustrating the invention.
Administrative Status

2024-08-01:As part of the Next Generation Patents (NGP) transition, the Canadian Patents Database (CPD) now contains a more detailed Event History, which replicates the Event Log of our new back-office solution.

Please note that "Inactive:" events refers to events no longer in use in our new back-office solution.

For a clearer understanding of the status of the application/patent presented on this page, the site Disclaimer , as well as the definitions for Patent , Event History , Maintenance Fee  and Payment History  should be consulted.

Event History

Description Date
Inactive: IPC from PCS 2022-01-01
Inactive: IPC expired 2022-01-01
Inactive: IPC expired 2013-01-01
Time Limit for Reversal Expired 2012-09-07
Letter Sent 2011-09-07
Inactive: IPC deactivated 2011-07-29
Grant by Issuance 2011-01-04
Inactive: Cover page published 2011-01-03
Pre-grant 2010-10-22
Inactive: Final fee received 2010-10-22
Notice of Allowance is Issued 2010-09-02
Letter Sent 2010-09-02
Notice of Allowance is Issued 2010-09-02
Inactive: Approved for allowance (AFA) 2010-08-31
Amendment Received - Voluntary Amendment 2010-02-18
Inactive: S.30(2) Rules - Examiner requisition 2009-09-30
Inactive: IPC assigned 2009-08-05
Inactive: First IPC assigned 2009-08-05
Inactive: IPC expired 2009-01-01
Inactive: IPRP received 2007-11-14
Inactive: IPC from MCD 2006-03-12
Inactive: IPC from MCD 2006-03-12
Letter Sent 2005-09-21
Amendment Received - Voluntary Amendment 2005-09-01
Request for Examination Requirements Determined Compliant 2005-09-01
All Requirements for Examination Determined Compliant 2005-09-01
Request for Examination Received 2005-09-01
Letter Sent 2003-01-23
Inactive: Single transfer 2002-12-05
Inactive: Cover page published 2002-09-03
Inactive: Courtesy letter - Evidence 2002-09-03
Inactive: Notice - National entry - No RFE 2002-08-28
Application Received - PCT 2002-06-10
National Entry Requirements Determined Compliant 2002-03-06
Application Published (Open to Public Inspection) 2001-03-15

Abandonment History

There is no abandonment history.

Maintenance Fee

The last payment was received on 2010-06-17

Note : If the full payment has not been received on or before the date indicated, a further fee may be required which may be one of the following

  • the reinstatement fee;
  • the late payment fee; or
  • additional fee to reverse deemed expiry.

Please refer to the CIPO Patent Fees web page to see all current fee amounts.

Owners on Record

Note: Records showing the ownership history in alphabetical order.

Current Owners on Record
QUALCOMM INCORPORATED
Past Owners on Record
MARCELLO LIOY
NISCHAL ABROL
Past Owners that do not appear in the "Owners on Record" listing will appear in other documentation within the application.
Documents

To view selected files, please enter reCAPTCHA code :



To view images, click a link in the Document Description column. To download the documents, select one or more checkboxes in the first column and then click the "Download Selected in PDF format (Zip Archive)" or the "Download Selected as Single PDF" button.

List of published and non-published patent-specific documents on the CPD .

If you have any difficulty accessing content, you can call the Client Service Centre at 1-866-997-1936 or send them an e-mail at CIPO Client Service Centre.


Document
Description 
Date
(yyyy-mm-dd) 
Number of pages   Size of Image (KB) 
Representative drawing 2002-08-30 1 11
Abstract 2002-03-06 1 71
Description 2002-03-06 17 904
Claims 2002-03-06 5 178
Drawings 2002-03-06 6 110
Cover Page 2002-09-03 1 50
Claims 2005-09-01 6 200
Description 2010-02-18 20 1,036
Representative drawing 2010-12-09 1 12
Cover Page 2010-12-09 2 57
Reminder of maintenance fee due 2002-08-28 1 109
Notice of National Entry 2002-08-28 1 192
Courtesy - Certificate of registration (related document(s)) 2003-01-23 1 107
Reminder - Request for Examination 2005-05-10 1 116
Acknowledgement of Request for Examination 2005-09-21 1 177
Commissioner's Notice - Application Found Allowable 2010-09-02 1 166
Maintenance Fee Notice 2011-10-19 1 171
PCT 2002-03-06 7 375
Correspondence 2002-08-28 1 31
PCT 2002-03-06 1 36
PCT 2002-03-07 3 175
Correspondence 2010-10-22 2 59