WO2008042641A2 - Relative location of a wireless node in a wireless network - Google Patents

Relative location of a wireless node in a wireless network Download PDF

Info

Publication number
WO2008042641A2
WO2008042641A2 PCT/US2007/079354 US2007079354W WO2008042641A2 WO 2008042641 A2 WO2008042641 A2 WO 2008042641A2 US 2007079354 W US2007079354 W US 2007079354W WO 2008042641 A2 WO2008042641 A2 WO 2008042641A2
Authority
WO
WIPO (PCT)
Prior art keywords
probability
wireless node
perimeter
pout
pin
Prior art date
Application number
PCT/US2007/079354
Other languages
French (fr)
Other versions
WO2008042641A3 (en
Inventor
Brian Donald Hart
Bretton Lee Douglas
Original Assignee
Cisco Technology, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cisco Technology, Inc. filed Critical Cisco Technology, Inc.
Priority to EP07843092.3A priority Critical patent/EP2055021B1/en
Publication of WO2008042641A2 publication Critical patent/WO2008042641A2/en
Publication of WO2008042641A3 publication Critical patent/WO2008042641A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W64/00Locating users or terminals or network equipment for network management purposes, e.g. mobility management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/18Network planning tools
    • H04W16/20Network planning tools for indoor coverage or short range network deployment

Definitions

  • This disclosure relates generally to wireless networks.
  • WLAN wireless LAN
  • RF Radio frequency
  • RF coverage maps are useful for assessing the area or region of sufficient WLAN service, and for use in locating wireless nodes.
  • RF coverage maps are typically derived from manual site surveys and mathematical modeling techniques, such as ray tracing. However, shadowing from nearby walls and furniture, and the multipath effects inherent to various RF environments, make high accuracy coverage maps difficult to achieve.
  • FIG. 1 illustrates example components in a wireless local area network (WLAN) system.
  • WLAN wireless local area network
  • Figure 2 illustrates an example computing system architecture that may be used to implement one or more aspects of the functionality described herein.
  • Figure 3 illustrates an example physical space having a defined perimeter.
  • Figure 4 illustrates an example method associated with determining the relative location of a wireless node.
  • Figure 5 illustrates an example method associated with computing a normalized probability surface.
  • Figure 6 illustrates an example wireless node location mechanism.
  • Figure 7 illustrates an example method associated with computing an aggregate error surface.
  • Figure 8 illustrates an example physical space having two defined perimeters and an exclusion region.
  • the location server determines whether a wireless node is located inside or outside a perimeter of a defined area (e.g., a building) based on a computed probability ratio. More specifically, in one implementation, the location server computes a probability surface corresponding to the location probability of the wireless node at various locations in a physical region based on received signal strength data associated with the wireless node. The location server then computes an aggregate probability (Pin) of the wireless node being inside a perimeter based on the probability surface, and computes an aggregate probability (Pout) of the wireless node being outside the perimeter based on the probability surface.
  • Pin aggregate probability
  • Pout aggregate probability
  • the location server then computes a probability ratio of the aggregate probabilities Pin to Pout, and determines whether the wireless node is inside or outside the perimeter based on the probability ratio.
  • the probability ratio may be biased based on a predefined policy.
  • the location server may exclude aggregate probabilities (i.e., Pin and Pout) within an exclusion region when computing the probability ratio Pout/Pin, and may modify the size of the exclusion region to bias the probability ratio.
  • FIG. 1 illustrates example components in a wireless local area network (WLAN) system.
  • the system includes a WLAN management server 20, a location server 22, and a central controller 42, a local area network (LAN) 30, a router 32, and wireless access points 50a, 50b, 50c, and 5Od (collectively referred to as wireless access points 50).
  • WLAN wireless local area network
  • LAN local area network
  • 4 6571/54025PCT 30 is implemented by a switch (or an array of switches) and/or other network devices, such as a bridge.
  • Network 52 in one implementation, generally refers to a computer network, such as a LAN, a WAN, etc., that includes one or more intermediate network devices (e.g., routers, switches, etc.), which allow for the transmission of messages between WLAN management server 20 and wireless nodes via wireless access points 50.
  • network 52 can include a variety of network segments, transmission technologies and components, such as terrestrial WAN Links, satellite links, optical fiber links, and cellular links.
  • Network 52 could also be a campus LAN.
  • LAN 30 may be a LAN, LAN segments implemented by an Ethernet switch (not shown), or an array of switches having multiple ports to which wireless access points 50 are connected.
  • the wireless access points 50 are typically connected to switch ports via Ethernet links; however, other Link layer connection protocols or communication means can be employed.
  • Figure 1 illustrates one possible network environment in which the invention may operate! however, other implementations are possible.
  • WLAN management server 20 is illustrated as being on a different LAN or LAN segment, it may be co-located with wireless access points 50.
  • the wireless access points 50 are operative to wirelessly communicate with remote wireless node devices 60a, 60b, 60c, and 6Od.
  • the wireless access points 50 implement the wireless network protocol specified in the IEEE 802.11 WLAN specification) of course, other wireless network protocols may be used.
  • the wireless access points 50 may be autonomous or so-called "fat" wireless access points, or light-weight wireless access points operating in connection with a wireless switch (not illustrated.
  • the network infrastructure may also include a Wireless LAN Solution Engine (WLSE) offered by Cisco Systems, Inc. of San Jose, California or another wireless network management system.
  • WLSE Wireless LAN Solution Engine
  • 5 6571/54025PCT also include one or more Wireless Control System (WCS) nodes operative to manage one or more wireless switches and access points.
  • WCS Wireless Control System
  • FIG. 2 illustrates an example computing system architecture, which may be used to implement a location server 22, which may be used to perform the location processes described below.
  • hardware system 200 comprises a processor 202, a cache memory 204, and one or more software applications and drivers directed to the functions described herein.
  • hardware system 200 includes a high performance input/output (I/O) bus 206 and a standard I/O bus 208.
  • I/O input/output
  • a host bridge 210 couples processor 202 to high performance I/O bus 206, whereas I/O bus bridge 212 couples the two buses 206 and 208 to each other.
  • a system memory 214 and a network/communication interface 216 couple to bus 206.
  • Hardware system 200 may further include video memory (not shown) and a display device coupled to the video memory. Mass storage 218, I/O ports 220, keyboard and pointing device 222, and display 224 couple to bus 208. Hardware system 200 may optionally include a keyboard and pointing device (not shown) coupled to bus 208.
  • video memory not shown
  • Mass storage 218, I/O ports 220, keyboard and pointing device 222, and display 224 couple to bus 208.
  • Hardware system 200 may optionally include a keyboard and pointing device (not shown) coupled to bus 208.
  • Collectively, these elements are intended to represent a broad category of computer hardware systems, including but not limited to general purpose computer systems based on the Pentium® processor manufactured by Intel Corporation of Santa Clara, CaUf., as well as any other suitable processor.
  • network interface 216 provides communication between hardware system 200 and any of a wide range of networks, such as an Ethernet (e.g., IEEE 802.3) network, etc.
  • Mass storage 218 provides permanent storage for the data and programming instructions to perform the above described functions implemented in the location server 22, whereas system memory 214 (e.g., DRAM) provides temporary storage for the data and programming instructions when executed by processor 202.
  • I/O ports 220 are one or more serial and/or parallel communication
  • Hardware system 200 may include a variety of system architectures; and various components of hardware system 200 may be rearranged.
  • cache 204 may be on-chip with processor 202.
  • cache 204 and processor 202 may be packed together as a "processor module," with processor 202 being referred to as the "processor core.”
  • certain implementations of the present invention may not require nor include all of the above components.
  • the peripheral devices shown coupled to standard I/O bus 208 may couple to high performance I/O bus 206.
  • only a single bus may exist, with the components of hardware system 200 being coupled to the single bus.
  • hardware system 200 may include additional components, such as additional processors, storage devices, or memories.
  • the operations of the location server 22 described herein are implemented as a series of software routines run by hardware system 200.
  • These software routines comprise a plurality or series of instructions to be executed by a processor in a hardware system, such as processor 202.
  • the series of instructions are stored on a storage device, such as mass storage 218.
  • the series of instructions can be stored on any suitable storage medium, such as a diskette, CD-ROM, ROM, EEPROM, etc.
  • the series of instructions need not be stored locally, and could be received from a remote storage device, such as a server on a network, via network/communication interface 216.
  • An operating system manages and controls the operation of hardware system 200, including the input and output of data to and from software applications (not shown).
  • the operating system provides an interface between the software applications being executed on the system and the hardware components of the system. According to one embodiment of the present invention, the operating
  • 7 6571/54025PCT system is the Windows® 95/98/NT/XP operating system, available from Microsoft Corporation of Redmond, Wash.
  • the present invention may be used with other suitable operating systems, such as the Apple Macintosh Operating System, available from Apple Computer Inc. of Cupertino, Calif., UNIX operating systems, LINUX operating systems, and the like.
  • Figure 3 illustrates an example physical space having a defined perimeter 300.
  • Figure 3 shows a wireless node 60 and a perimeter 300.
  • the perimeter 300 may, for example, correspond to the walls of a building. However, the perimeter may be any arbitrarily defined region.
  • the location server 22 determines whether the wireless node 60 is located inside or outside the perimeter 300 based on an inside/outside probability ratio.
  • the probability ratio is the probability that the wireless node 60 is outside a defined perimeter (Pout) over the probability that the wireless node 60 is inside the defined perimeter (Pin). In one implementation, if the probability ratio is such that Pout/Pin > 1, the location server 22 will estimate that the wireless node is outside the defined perimeter. In contrast, in one implementation, if the probability ratio is such that Pout/Pin ⁇ 1, the location server 22 will estimate that the wireless node is inside the defined perimeter.
  • Figure 4 illustrates an example method associated with determining the relative location of a wireless node (e.g., relative to the perimeter 300 of a building).
  • the location server 22 collects received signal strength data associated with a wireless node (402).
  • the location server 22 may utilize radio frequency (RF) coverage maps, based upon estimated client transmission power, wireless access point location, height, azimuth angle, elevation angle, antenna pattern and/or a pathloss model.
  • RF radio frequency
  • the location server 22 may also utilize interpolated RF coverage maps calculated using a calibration survey performed inside and/or outside the building perimeter. RF coverage maps are described in more detail below in connection with Figures 6 and 7.
  • the location server 22 then computes a probability surface corresponding to the location probability of the wireless node within a physical region based on the received signal strength data associated with a wireless node and an RF model of the physical region (404).
  • the location server 22 may optionally compute a normalized probability surface.
  • One implementation for computing a normalized probability surface is described in more detailed below in connection with Figure 5.
  • the location server 22 then computes the aggregate probability (Pin) of the wireless node 60 being inside the perimeter 300 defined with the physical region based on the probability surface (406).
  • the aggregate probability Pin is a sum of the probability values inside the perimeter.
  • the location server 22 then computes the aggregate probability (Pout) of the wireless node 60 being outside the perimeter 300 based on the probability surface (408).
  • the aggregate probability Pout is a sum of the probability values outside the perimeter.
  • the location server 22 then computes a probability ratio of the aggregate probability (Pin) of the wireless node 60 being inside the perimeter 300 to aggregate probability (Pout) of the wireless node 60 being outside the perimeter 300 based on the probability surface (410). In other words, the location server 22 computes Pout/Pin.
  • the location server 22 may optionally bias the probability ratio, where the probability ratio may be biased, based on a predefined policy (412).
  • the predefined policy may be to either increase the probability that a given wireless node is inside a perimeter or increase
  • the aggregate probability (Pin) of the wireless node being inside the perimeter may biased higher (e.g., given a greater weight) in order to determined some borderline wireless nodes to be inside the perimeter.
  • Pin the aggregate probability of the wireless node being inside the perimeter
  • a wireless node may belong to an executive where the cost of mistakenly declaring such a wireless node to be outside the building and consequently disconnecting the wireless node from the network would be considered too high, according to the policy. In other words, it may be more important to avoid frustrating legitimate users than to foil hackers.
  • the location server 22 may apply a bias globally or relative to a particular wireless access point. In one implementation, if the bias is applied globally, the location server 22 applies the same bias to all wireless access points inside the perimeter. In one implementation, if the bias is based on a particular wireless access point, each wireless access point would have an associated bias, where the location server 22 determines the closest wireless access point (e.g., the wireless access point receiving the strongest signals from the wireless node), and then applies the bias associated with that access point. For example, in the scenario described above, a given wireless access point may be located in an executive wing of a building. Accordingly, that wireless access point could be associated with a bias that favors declaring the wireless node of the executive to be inside rather that outside. Other wireless access points in the same building may be associated with different biases.
  • the aggregate probability (Pout) of the wireless node being outside the perimeter may be biased higher in order to declare some borderline wireless nodes to be outside the perimeter.
  • a particular building may be high-
  • the location server 22 determines whether the wireless node is inside or outside the perimeter 300 based on the probability ratio (414). As describe above, in one implementation; if the probability ratio is such that Pout/Pin > 1, the location server 22 will render the wireless node to be outside the perimeter, and if the probability ratio is such that Pout/Pin ⁇ 1, the location server 22 will render the wireless node to be inside the perimeter. Based on the determination, an appropriate node of the wireless network infrastructure (e.g., WLAN management server 20) may either permit continual connection to the wireless network if the wireless node is determined to be inside the perimeter or else disconnect the wireless node from the wireless network.
  • an appropriate node of the wireless network infrastructure e.g., WLAN management server 20
  • Figure 5 illustrates an example method associated with computing a normalized probability surface.
  • the location system collects received signal strength data (502). Collection of received signal strength data, according to one example implementation, is described in following sections.
  • the location system computes an aggregate square error surface based on the received signal strength data (504).
  • the aggregate error surface characterizes the aggregate square error or difference between the received signal strength, SSi, detected by infrastructure radio transceivers and the expected received signal strength values in the coverage maps corresponding to the infrastructure radio transceivers.
  • the location system computes a probability surface by computing a probability density function (Pu) from the aggregate error surface (506).
  • Pu probability density function
  • the unnormalized probability density function (Pu) may be described using the following equation :
  • the location system computes the probability function for each location bin in the aggregate error surface.
  • the Pu represents the unnormalized probability density that the wireless node is at a given location. Accordingly, lower aggregate square error values for a given location bin result in higher probability values.
  • the location system normalizes the probability surface such that the sum of the probabilities over the entire surface equals one.
  • the normalized probability surface may be described using the following equation:
  • P(x,y) Pu(x ) y)/ ⁇ Pu(x,y).
  • FIG. 6 illustrates an example wireless node location mechanism.
  • the wireless node location mechanism includes a wireless node location module 59 and a plurality of infrastructure radio transceivers 58a, 58b, 58c, 58d, 58e, and 58f disposed throughout a physical space.
  • infrastructure radio transceivers 58 and wireless node location module 59 can be integrated into a wireless node location mechanism.
  • Infrastructure radio transceivers 58 are operative to detect the strength of received radio-frequency signals, such as the signals 57 transmitted by wireless node 56 and by other radio transceivers, and provide the detected signal strength data for corresponding wireless nodes to wireless node location module 59.
  • infrastructure radio transceivers 58 are also operative to transmit and receive wireless or radio-frequency signals according to a wireless communications protocol, such as the IEEE 802.11 WLAN protocol.
  • Infrastructure radio transceivers 58 in one implementation, can operate on a selected channel from a plurality of channels in a given band. In another implementation, infrastructure radio transceivers 58 can also operate in more than one band.
  • infrastructure radio receivers 58 may be configured to operate in the 802.11a-5 GHz band, and/or the 802.11b/g-2.4 GHz band.
  • infrastructure radio transceivers 58 can be configured to collect the signal strength information associated with wireless nodes and transmit the collected data in response to SNMP or other requests by wireless node location module 59.
  • the infrastructure radio transceivers 58 can transmit signal strength information on a regular or periodic basis. As discussed below, other methods for collecting signal strength data may also be employed.
  • Identification of wireless nodes depends on the wireless communications protocol in use. For 802.11 WLAN environments, for example, wireless nodes can be identified based on MAC address.
  • wireless nodes can be authorized mobile stations, such as remote client elements 60a-60d (see Figure l), rogue systems (e.g., rogue access points and/or rogue mobile stations), as well as authorized access points for which no location information is known.
  • wireless nodes can be identified based on a unique property of the RF signal, such as a given frequency channel, or a unique signal pattern, and
  • infrastructure radio transceivers 58 are also operable to communicate with one or more mobile stations, such as wireless node 56, according to a wireless communication protocol.
  • radio transceiver 58 in one implementation, is an access point or other WLAN component.
  • radio transceiver 58 is operably connected to a Local Area Network (LAN), Wide Area Network (WAN) or other wireline network to bridge traffic between mobile stations and the wireline network.
  • LAN Local Area Network
  • WAN Wide Area Network
  • radio transceiver 58 may also be an access point or light weight access point in a wireless network featuring hierarchical processing of protocol information.
  • the radio transceiver 58 implements the 802.11 protocols (where 802.11, as used herein, generically refers to the IEEE 802.11 standard for wireless LANs and all its amendments).
  • 802.11 as used herein, generically refers to the IEEE 802.11 standard for wireless LANs and all its amendments.
  • the present invention can be used in connection with any suitable radio-frequencybased wireless network or communications protocol.
  • infrastructure radio transceivers 58 make use of the signal strength detection functionality residing on a wireless network interface adapter to detect signal strength on a frame -byframe basis.
  • the IEEE 802.11 standard defines a mechanism by which RF energy is measured by the circuitry (e.g., chip set) on a wireless network interface controller.
  • the IEEE 802.11 protocol specifies an optional parameter, the receive signal strength indicator (RSSI).
  • RSSI receive signal strength indicator
  • This parameter is a measure by the PHY layer of the energy observed at the antenna used to receive the current packet or frame. This numeric value is an integer with an allowable range of 0 * 255 (a 1-byte value).
  • RSSI_Max the receive signal strength indicator
  • dBm 14 6571/54025PCT Resolving a given RSSI value reported by a given vendor's chip set to an actual power value (dBm) can be accomplished by reference to a conversion table.
  • some wireless networking chip sets actually report received signal strength in dBm units, rather than or in addition to RSSI.
  • Other attributes of the signal can also be used in combination with received signal strength or as an alternative.
  • the detected SignaHo-Noise Ratio (SNR) during packet reception can be used in determining overlay signal transmit power.
  • SNR SignaHo-Noise Ratio
  • many chip sets include functionality and corresponding APIs to allow for a determination of SNRs associated with packets received from wireless node 56.
  • the resulting signal strength information in one implementation, can be associated with a time stamp corresponding to the receipt of the frame.
  • Wireless node location module 59 collects signal strength data received from infrastructure radio transceivers 58 and maintains the signal strength data in association with a wireless node identifier, and an identifier for the particular infrastructure radio transceiver 58 and antenna which provided the signal strength data. Wireless node location module 59, in one implementation, is also configured to distinguish between signals received from infrastructure radio transceivers 58 and signals received from other wireless nodes based on the wireless node identifier. In one implementation, wireless node location module 59 maintains a variety of data structures for storing signal strength information.
  • Wireless node location module 59 maintains signal strength data for all other wireless nodes in tables or other suitable data structures.
  • wireless node location module 59 maintains, for each antenna of each radio transceiver 58, a separate table including at least two fields ⁇ l) a wireless node identifier; 2) the detected signal strength. Additional fields may also include a time stamp indicating the time the infrastructure radio transceiver 58 received the signal. In one implementation, when the memory space
  • wireless node location module 59 filters the signal strength data received from the infrastructure radio transceivers 58 against a list of wireless node identifiers in order to identify the appropriate data structure to update.
  • the signal strength data maintained by wireless node location module 59 can be updated as the frames/packets are received.
  • the latest signal strength value is used to essentially overwrite the old value.
  • an average, moving average, weighted moving average, or time-weighted moving average can be used if successive wireless frames corresponding to a given wireless node are encountered within a threshold time interval (e.g., typically resulting from a data stream transmission). In such a situation, the time stamp can correspond to the time of the last packet or frame.
  • radio transceivers 58 when operating as access points typically operate on different channels, mobile stations at various times (e.g., transmitting probe requests to find access points) transmit wireless frames on all available operating channels. This helps to ensure that a plurality of infrastructure radio transceivers 58 detect the mobile station.
  • one or more infrastructure radio transceivers 58 that are adjacent to a radio transceiver 58 that detected a given wireless node may be directed to switch to a given operating channel to listen for signals transmitted by the mobile station.
  • the infrastructure radio transceivers 58 may be commanded to specifically transmit frames on a given channel for the purpose of updating the signal strength data maintained by wireless node location module 59.
  • Wireless node location module 59 also maintains a RF physical model of the coverage area associated with the RF environment.
  • the RF physical model includes a plurality of coverage maps. Each coverage map characterizes for a given infrastructure radio transceiver and antenna 58 the expected received signal strength associated with a wireless transmitter at a given location.
  • the RF physical model comprises, for each antenna, a radio coverage map or matrix that indicates the expected signal strength detected at an infrastructure radio transceiver received from a wireless node, assuming a uniform transmit power, at a given location defined in x-, and y coordinates. This database can be populated in a variety of ways.
  • the radio coverage maps can be populated with the results of an extensive site survey, according to which a wireless transmitter is placed at different locations in the physical space.
  • the infrastructure radio transceivers 58 operate in a listening mode that cycles between the antennas and report the resulting signal strength of the signal transmitted by the wireless node used to conduct the site survey.
  • the infrastructure radio transceivers 58 can be configured to transmit the signal strength data back to the wireless transmitter, which may be a laptop computer or other wireless device.
  • the coverage maps are constructed by associating the signal strength and location data in the coverage maps corresponding to each infrastructure radio transceiver.
  • the coverage maps may also be constructed by having a WLAN tester (or other wireless node) simply measure the signal strength of frames transmitted by the infrastructure radio transceivers 58 (e.g., beacon packets) at desired locations within the deployment region. If path loss symmetry is assumed, these values can be used to construct the coverage maps for each of the infrastructure radio transceivers. Still further, locations in the coverage map not populated by manual methods can be estimated based on interpolation or extrapolation techniques.
  • a coverage map, for each infrastructure radio transceiver 58 is maintained that includes the signal strengths in an N x M matrix of location bins, where N is the number of x- coordinates in the coverage map, and M is the number of y coordinates in the coverage map.
  • the coverage map is a three dimensional N x M x P matrix of location bins, where P is the number of z-coordinates in the coverage map.
  • the extent of the physical space model by the coverage maps for each infrastructure radio transceiver 58 are co-extensive.
  • the coverage maps for all infrastructure radio transceivers 58 can be co- extensive with the physical space in which the location system is deployed, or with a boundary configured by a network administrator. In one implementation, however, knowledge of various antenna attributes associated with each infrastructure radio transceiver 58- -such as antenna type (e.g., omni-directional, directional), peak gain orientation, beamwidth, front-to-back isolation-can be used to compress or reduce the size of the coverage maps.
  • the coverage maps can be configured to be substantially coextensive with the antenna pattern of each antenna connected to the infrastructure radio transceivers 58 out to a threshold signal strength or gain level. For example, the coverage map for a given antenna can be compressed to the front or intended coverage area of the directional antenna. In addition, if the coverage maps are compressed, the search for the best fit across selected coverage maps can be isolated to the overlap between coverage maps associated with the antennas selected to locate the wireless node.
  • the coverage maps of the RF physical model may be constructed using RF prediction to model the coverage area, employing mathematical techniques like raytracing, and the like.
  • the RF prediction model can be computed for each coordinate location in a desired physical space, assuming a uniform wireless node transmit power.
  • the estimated signal strength information for each infrastructure radio transceiver 58 can be used to populate the coverage maps discussed above.
  • RF prediction models can be computed relative to each infrastructure radio transceiver antenna. If path loss symmetry and transmit power symmetry between the wireless nodes and the infrastructure radio transceivers 58 are assumed, the coverage maps for each infrastructure radio transceiver antenna can be populated by using the computed values at each of the coordinate locations in the coverage map. Of course, site survey data can also be used to adjust one or more parameters associated with the RF prediction model used to estimate expected signal strength at the various locations. As above, the boundaries of the coverage maps can be contoured based on the properties of the antennas connected to the infrastructure radio transceivers 58.
  • the location coordinates in the coverage maps can be two-dimensional, x- and ycoordinates, defining location in a horizontal plane, or three dimensional, x% y and z- coordinates, defining location in three dimensions.
  • the values of the coordinates can be either global (i.e., longitude and latitude) or expressed relative to an arbitrarily- defined origin.
  • the granularity of the coordinates in the coverage maps depends on the desired granularity of the wireless node location estimates.
  • the wireless node location functionality can be triggered on demand, for example, in response to a command issued by a network administrator using a control interface to locate a mobile station identified by a MAC address or other suitable identifier, such as an arbitrary name associated with a MAC address in a table or other data structure.
  • Wireless node location module 59 may also be triggered automatically in response to the detection of a rogue access point.
  • Wireless node location module 59 can also be configured to periodically determine the location of a given mobile station in order to track its movement over a period of time.
  • wireless node location module 59 begins by selecting the infrastructure radio transceivers (IRTs) 58 whose signal measurements will be used in locating the desired wireless node
  • wireless node location module 59 scans the data structures discussed above to identify the infrastructure radio transceivers 58 that see or detect wireless frames transmitted by the desired wireless node.
  • the time stamps in the data structures can be used to filter out infrastructure radio transceivers 58 that have not detected the desired wireless node within a threshold period of time. Additional or alternative filter criteria can include a threshold signal strength level (such as -80 dBm).
  • wireless node location module 59 selects the M infrastructure radio transceivers 58 that report the strongest signal strengths (where M is a configurable parameter).
  • wireless node location module 59 can command the infrastructure radio transceivers 58 to actively scan for the desired wireless node and return signal strength information.
  • Wireless node location module 59 collects the signal strength (e.g., RSSI) measurements corresponding to the selected infrastructure radio transceivers 58 (704), and identifies the RF coverage maps to be used in estimating the location of the wireless node based on selected infrastructure radio transceivers 58 (706).
  • signal strength e.g., RSSI
  • wireless node location module 59 for all selected infrastructure radio transceivers (708), computes, for each point in the coverage map, MAPj, an error surface, ErrSurfi, characterizing the difference between the signal strength, SSi, detected by the infrastructure radio transceiver and the value in the corresponding coverage map (710).
  • wireless node location module 59 uses the square of the error for each point in the error surface.
  • wireless node location module 59 sums the individual error surfaces, ErrSurfi, to create a total error surface, TotalErrSurf, for all points for which the error surfaces overlap (712).
  • Figure 8 illustrates an example physical space having two defined perimeters 800 and 802 and an exclusion region 804 between the perimeters 800
  • Figure 8 shows a wireless node 60 in the exclusion region.
  • wireless nodes inside the building may be considered trusted (i.e., a legitimate wireless node having permission to connection to the wireless network) and wireless nodes outside the building and outside the exclusion region are untrusted (e.g., potentially a rogue wireless node).
  • location server 22 excludes bin probabilities within the exclusion region 804 when computing the probability aggregates Pin and Pout ( Figure 4). In other words, the location server 22 ignores the possibility that wireless nodes might be located within the exclusion region 804 (Le., between perimeters 800 and 802) such as wireless node 60, as shown. The presumption is that rogue wireless nodes (e.g., hackers) would typically not approach a building too closely, as they would become vulnerable to conventional means of detection. [0047] In one implementation, the location server 22 may modify the size of the exclusion region 804 to bias the probability ratio. For example, a wider exclusion region 804 decreases the probability that a given wireless node will be determined to be inside the perimeter 800.
  • a wireless node inside the exclusion region would have no guarantee of coverage (e.g., may be denied coverage).
  • the present invention has been explained with reference to specific embodiments. For example, while embodiments of the present invention have been described as operating in connection with IEEE 802.11 networks, the present invention can be used in connection with any suitable wireless network environment. Other embodiments will be evident to those of ordinary skill in the art. It is therefore not intended that the present invention be limited, except as indicated by the appended claims.

Abstract

In one embodiment, a method includes computing a probability surface corresponding to the location probability of the wireless node within a physical region based on the received signal strength data associated with a wireless node and an RF model of the physical region; computing, based on the probability surface, an aggregate probability (Pin) of the wireless node being inside a perimeter defined with the physical region! computing, based on the probability surface, an aggregate probability (Pout) of the wireless node being outside the perimeter; computing a probability ratio of the aggregate probabilities Pin to Pout; and determining whether the wireless node is inside or outside the perimeter based on a comparison of Pout and Pin.

Description

PATENT APPLICATION
Relative Location of a Wireless Node in a Wireless Network
Inventor(s): Brian Hart, a citizen of New Zealand, residing at 899 Lois Ave, Sunnyvale, California 94087.
Bretton Douglas, a citizen of the United States, residing at 434-16 Camille Circle, San Jose, California 95134
Assignee^ Cisco Technology, Inc. 170 West Tasman Dr. San Jose, CA 95134
Prepared By: Law Office of Mark J. Spolyar 2200 Cesar Chavez Street, Suite 8 San Francisco, CA 94124 (415) 826-7966 (415) 480-1780 (fax) Customer No.: 30505
Attorney Docket: 6571/54025PCT
Relative Location of a Wireless Node in a Wireless Network
TECHNICAL FIELD [0001] This disclosure relates generally to wireless networks.
BACKGROUND
[0002] Market adoption of wireless LAN (WLAN) technology has exploded, as users from a wide range of backgrounds and vertical industries have brought this technology into their homes, offices, and increasingly into the public air space. This inflection point has highlighted not only the Limitations of earlier generation systems, but also the changing role that WLAN technology now plays in people's work and Lifestyles across the globe. Indeed, WLANs are rapidly changing from convenience networks to business-critical networks. Increasingly users are depending on WLANs to improve the timeliness and productivity of their communications and applications, and in doing so, require greater visibility, security, management, and performance from their network. Radio frequency (RF) coverage maps, also referred to as a heat maps, provide information regarding coverage of particular wireless access points. RF coverage maps are useful for assessing the area or region of sufficient WLAN service, and for use in locating wireless nodes. RF coverage maps are typically derived from manual site surveys and mathematical modeling techniques, such as ray tracing. However, shadowing from nearby walls and furniture, and the multipath effects inherent to various RF environments, make high accuracy coverage maps difficult to achieve.
DESCRIPTION OF THE DRAWINGS
[0003] Figure 1 illustrates example components in a wireless local area network (WLAN) system.
[0004] Figure 2 illustrates an example computing system architecture that may be used to implement one or more aspects of the functionality described herein.
2 6571/54025PCT [0005] Figure 3 illustrates an example physical space having a defined perimeter.
[0006] Figure 4 illustrates an example method associated with determining the relative location of a wireless node.
[0007] Figure 5 illustrates an example method associated with computing a normalized probability surface.
[0008] Figure 6 illustrates an example wireless node location mechanism.
[0009] Figure 7 illustrates an example method associated with computing an aggregate error surface.
[0010] Figure 8 illustrates an example physical space having two defined perimeters and an exclusion region.
6571/54025PCT DESCRIPTION OF EXAMPLE EMBODIMENTS
A. Overview
[0011] Particular embodiments of the present invention are directed to determining the location of a wireless node relative to a defined area. According to one implementation, the location server determines whether a wireless node is located inside or outside a perimeter of a defined area (e.g., a building) based on a computed probability ratio. More specifically, in one implementation, the location server computes a probability surface corresponding to the location probability of the wireless node at various locations in a physical region based on received signal strength data associated with the wireless node. The location server then computes an aggregate probability (Pin) of the wireless node being inside a perimeter based on the probability surface, and computes an aggregate probability (Pout) of the wireless node being outside the perimeter based on the probability surface. The location server then computes a probability ratio of the aggregate probabilities Pin to Pout, and determines whether the wireless node is inside or outside the perimeter based on the probability ratio. In one implementation, the probability ratio may be biased based on a predefined policy. According to another implementation, the location server may exclude aggregate probabilities (i.e., Pin and Pout) within an exclusion region when computing the probability ratio Pout/Pin, and may modify the size of the exclusion region to bias the probability ratio.
B. Example Wireless Network System Architecture B.I. Network Topology
[0012] Figure 1 illustrates example components in a wireless local area network (WLAN) system. In a specific embodiment of the present invention, the system includes a WLAN management server 20, a location server 22, and a central controller 42, a local area network (LAN) 30, a router 32, and wireless access points 50a, 50b, 50c, and 5Od (collectively referred to as wireless access points 50). LAN
4 6571/54025PCT 30 is implemented by a switch (or an array of switches) and/or other network devices, such as a bridge.
[0013] As Figure 1 illustrates, these network elements are operably connected to a network 52. Network 52, in one implementation, generally refers to a computer network, such as a LAN, a WAN, etc., that includes one or more intermediate network devices (e.g., routers, switches, etc.), which allow for the transmission of messages between WLAN management server 20 and wireless nodes via wireless access points 50. Of course, network 52 can include a variety of network segments, transmission technologies and components, such as terrestrial WAN Links, satellite links, optical fiber links, and cellular links. Network 52 could also be a campus LAN. LAN 30 may be a LAN, LAN segments implemented by an Ethernet switch (not shown), or an array of switches having multiple ports to which wireless access points 50 are connected. The wireless access points 50 are typically connected to switch ports via Ethernet links; however, other Link layer connection protocols or communication means can be employed. Figure 1 illustrates one possible network environment in which the invention may operate! however, other implementations are possible. For example, although WLAN management server 20 is illustrated as being on a different LAN or LAN segment, it may be co-located with wireless access points 50.
[0014] The wireless access points 50 are operative to wirelessly communicate with remote wireless node devices 60a, 60b, 60c, and 6Od. In one implementation, the wireless access points 50 implement the wireless network protocol specified in the IEEE 802.11 WLAN specification) of course, other wireless network protocols may be used. The wireless access points 50 may be autonomous or so-called "fat" wireless access points, or light-weight wireless access points operating in connection with a wireless switch (not illustrated. In addition, the network infrastructure may also include a Wireless LAN Solution Engine (WLSE) offered by Cisco Systems, Inc. of San Jose, California or another wireless network management system. In some implementations, the network infrastructure may
5 6571/54025PCT also include one or more Wireless Control System (WCS) nodes operative to manage one or more wireless switches and access points.
B.2. Exemplary System Architecture for Location Server [0015] Figure 2 illustrates an example computing system architecture, which may be used to implement a location server 22, which may be used to perform the location processes described below. In one implementation, hardware system 200 comprises a processor 202, a cache memory 204, and one or more software applications and drivers directed to the functions described herein. Additionally, hardware system 200 includes a high performance input/output (I/O) bus 206 and a standard I/O bus 208. A host bridge 210 couples processor 202 to high performance I/O bus 206, whereas I/O bus bridge 212 couples the two buses 206 and 208 to each other. A system memory 214 and a network/communication interface 216 couple to bus 206. Hardware system 200 may further include video memory (not shown) and a display device coupled to the video memory. Mass storage 218, I/O ports 220, keyboard and pointing device 222, and display 224 couple to bus 208. Hardware system 200 may optionally include a keyboard and pointing device (not shown) coupled to bus 208. Collectively, these elements are intended to represent a broad category of computer hardware systems, including but not limited to general purpose computer systems based on the Pentium® processor manufactured by Intel Corporation of Santa Clara, CaUf., as well as any other suitable processor. [0016] The elements of hardware system 200 are described in greater detail below. In particular, network interface 216 provides communication between hardware system 200 and any of a wide range of networks, such as an Ethernet (e.g., IEEE 802.3) network, etc. Mass storage 218 provides permanent storage for the data and programming instructions to perform the above described functions implemented in the location server 22, whereas system memory 214 (e.g., DRAM) provides temporary storage for the data and programming instructions when executed by processor 202. I/O ports 220 are one or more serial and/or parallel communication
6 6571/54025PCT ports that provide communication between additional peripheral devices, which may be coupled to hardware system 200.
[0017] Hardware system 200 may include a variety of system architectures; and various components of hardware system 200 may be rearranged. For example, cache 204 may be on-chip with processor 202. Alternatively, cache 204 and processor 202 may be packed together as a "processor module," with processor 202 being referred to as the "processor core." Furthermore, certain implementations of the present invention may not require nor include all of the above components. For example, the peripheral devices shown coupled to standard I/O bus 208 may couple to high performance I/O bus 206. In addition, in some implementations only a single bus may exist, with the components of hardware system 200 being coupled to the single bus. Furthermore, hardware system 200 may include additional components, such as additional processors, storage devices, or memories. [0018] As discussed below, in one embodiment, the operations of the location server 22 described herein are implemented as a series of software routines run by hardware system 200. These software routines comprise a plurality or series of instructions to be executed by a processor in a hardware system, such as processor 202. Initially, the series of instructions are stored on a storage device, such as mass storage 218. However, the series of instructions can be stored on any suitable storage medium, such as a diskette, CD-ROM, ROM, EEPROM, etc. Furthermore, the series of instructions need not be stored locally, and could be received from a remote storage device, such as a server on a network, via network/communication interface 216. The instructions are copied from the storage device, such as mass storage 218, into memory 214 and then accessed and executed by processor 202. [0019] An operating system manages and controls the operation of hardware system 200, including the input and output of data to and from software applications (not shown). The operating system provides an interface between the software applications being executed on the system and the hardware components of the system. According to one embodiment of the present invention, the operating
7 6571/54025PCT system is the Windows® 95/98/NT/XP operating system, available from Microsoft Corporation of Redmond, Wash. However, the present invention may be used with other suitable operating systems, such as the Apple Macintosh Operating System, available from Apple Computer Inc. of Cupertino, Calif., UNIX operating systems, LINUX operating systems, and the like.
C. Example Wireless Network Environment Having A Defined Perimeter [0020] Figure 3 illustrates an example physical space having a defined perimeter 300. Figure 3 shows a wireless node 60 and a perimeter 300. In one implementation, the perimeter 300 may, for example, correspond to the walls of a building. However, the perimeter may be any arbitrarily defined region. The location server 22 determines whether the wireless node 60 is located inside or outside the perimeter 300 based on an inside/outside probability ratio. The probability ratio is the probability that the wireless node 60 is outside a defined perimeter (Pout) over the probability that the wireless node 60 is inside the defined perimeter (Pin). In one implementation, if the probability ratio is such that Pout/Pin > 1, the location server 22 will estimate that the wireless node is outside the defined perimeter. In contrast, in one implementation, if the probability ratio is such that Pout/Pin < 1, the location server 22 will estimate that the wireless node is inside the defined perimeter.
[0021] Cl. Relative Location Of A Wireless Client
[0022] Figure 4 illustrates an example method associated with determining the relative location of a wireless node (e.g., relative to the perimeter 300 of a building). As Figure 4 illustrates, the location server 22 collects received signal strength data associated with a wireless node (402). In one implementation, the location server 22 may utilize radio frequency (RF) coverage maps, based upon estimated client transmission power, wireless access point location, height, azimuth angle, elevation angle, antenna pattern and/or a pathloss model. The pathloss model may be some
8 6571/54025PCT average pathloss model or one determined from a calibration survey throughout a building or to some distance beyond the perimeter of the building. In one implementation, the location server 22 may also utilize interpolated RF coverage maps calculated using a calibration survey performed inside and/or outside the building perimeter. RF coverage maps are described in more detail below in connection with Figures 6 and 7.
[0023] The location server 22 then computes a probability surface corresponding to the location probability of the wireless node within a physical region based on the received signal strength data associated with a wireless node and an RF model of the physical region (404). In one implementation, the location server 22 may optionally compute a normalized probability surface. One implementation for computing a normalized probability surface is described in more detailed below in connection with Figure 5. The location server 22 then computes the aggregate probability (Pin) of the wireless node 60 being inside the perimeter 300 defined with the physical region based on the probability surface (406). In one implementation, the aggregate probability Pin is a sum of the probability values inside the perimeter. The location server 22 then computes the aggregate probability (Pout) of the wireless node 60 being outside the perimeter 300 based on the probability surface (408). In one implementation, the aggregate probability Pout is a sum of the probability values outside the perimeter. [0024] The location server 22 then computes a probability ratio of the aggregate probability (Pin) of the wireless node 60 being inside the perimeter 300 to aggregate probability (Pout) of the wireless node 60 being outside the perimeter 300 based on the probability surface (410). In other words, the location server 22 computes Pout/Pin.
[0025] In one implementation, the location server 22 may optionally bias the probability ratio, where the probability ratio may be biased, based on a predefined policy (412). In one implementation, the predefined policy may be to either increase the probability that a given wireless node is inside a perimeter or increase
9 6571/54025PCT the probability that a given wireless node is outside a perimeter, as illustrated in the following examples. In one implementation, the aggregate probability (Pin) of the wireless node being inside the perimeter may biased higher (e.g., given a greater weight) in order to determined some borderline wireless nodes to be inside the perimeter. In other words, it may be desirable to not mistakenly declare some wireless nodes to be outside a building when they are in fact inside. For example, a wireless node may belong to an executive where the cost of mistakenly declaring such a wireless node to be outside the building and consequently disconnecting the wireless node from the network would be considered too high, according to the policy. In other words, it may be more important to avoid frustrating legitimate users than to foil hackers.
[0026] In one implementation, the location server 22 may apply a bias globally or relative to a particular wireless access point. In one implementation, if the bias is applied globally, the location server 22 applies the same bias to all wireless access points inside the perimeter. In one implementation, if the bias is based on a particular wireless access point, each wireless access point would have an associated bias, where the location server 22 determines the closest wireless access point (e.g., the wireless access point receiving the strongest signals from the wireless node), and then applies the bias associated with that access point. For example, in the scenario described above, a given wireless access point may be located in an executive wing of a building. Accordingly, that wireless access point could be associated with a bias that favors declaring the wireless node of the executive to be inside rather that outside. Other wireless access points in the same building may be associated with different biases.
[0027] In one implementation, the aggregate probability (Pout) of the wireless node being outside the perimeter may be biased higher in order to declare some borderline wireless nodes to be outside the perimeter. In other words, it may be desirable to not mistakenly declare some wireless nodes to be inside the building when they are in fact outside. For example, a particular building may be high-
10 6571/54025PCT security building such as a bank, where there the policy may place a high cost on mistakenly declaring a rogue wireless node to be inside a building, where the rogue wireless node is actually outside the building.
[0028] Referring again to Figure 4, the location server 22 then determines whether the wireless node is inside or outside the perimeter 300 based on the probability ratio (414). As describe above, in one implementation; if the probability ratio is such that Pout/Pin > 1, the location server 22 will render the wireless node to be outside the perimeter, and if the probability ratio is such that Pout/Pin < 1, the location server 22 will render the wireless node to be inside the perimeter. Based on the determination, an appropriate node of the wireless network infrastructure (e.g., WLAN management server 20) may either permit continual connection to the wireless network if the wireless node is determined to be inside the perimeter or else disconnect the wireless node from the wireless network.
C.2. Normalized Probability Surface
[0029] Figure 5 illustrates an example method associated with computing a normalized probability surface. As Figure 5 shows, the location system collects received signal strength data (502). Collection of received signal strength data, according to one example implementation, is described in following sections. Next, the location system computes an aggregate square error surface based on the received signal strength data (504). One implementation for computing an aggregate square error surface is discussed in more detail below in connection with Figure 7. The aggregate error surface characterizes the aggregate square error or difference between the received signal strength, SSi, detected by infrastructure radio transceivers and the expected received signal strength values in the coverage maps corresponding to the infrastructure radio transceivers. [0030] Next, the location system computes a probability surface by computing a probability density function (Pu) from the aggregate error surface (506). In one
11 6571/54025PCT implementation, the unnormalized probability density function (Pu) may be described using the following equation :
Figure imgf000014_0001
where e is Euler's number, σ is the standard deviation of the residual errors (e.g., measured pathloss less the estimated pathloss based on calibration values or a default value (e.g., by default sigma equals 7)), and S(x,y) represents the value of an error surface at a given location bin (x,y). In one implementation, the location system computes the probability function for each location bin in the aggregate error surface. The Pu represents the unnormalized probability density that the wireless node is at a given location. Accordingly, lower aggregate square error values for a given location bin result in higher probability values. [0031] In one embodiment, the location system normalizes the probability surface such that the sum of the probabilities over the entire surface equals one. The normalized probability surface may be described using the following equation:
P(x,y) = Pu(x)y)/ΣPu(x,y).
C.3. Infrastructure Radio Transceivers and Received Signal Strength [0032] Figure 6 illustrates an example wireless node location mechanism. As Figure 6 shows, the wireless node location mechanism includes a wireless node location module 59 and a plurality of infrastructure radio transceivers 58a, 58b, 58c, 58d, 58e, and 58f disposed throughout a physical space. One skilled in the art will recognize that the system depicted in Figure 1 represents an example of the basic components of the invention and is mostly for didactic purposes. As discussed more fully below, the functionality generally denoted by infrastructure radio transceivers 58 and wireless node location module 59 can be integrated into a
12 6571/54025PCT variety of systems, such as wireless systems dedicated for location of wireless nodes, or WLAN or other wireless network systems.
[0033] Infrastructure radio transceivers 58 are operative to detect the strength of received radio-frequency signals, such as the signals 57 transmitted by wireless node 56 and by other radio transceivers, and provide the detected signal strength data for corresponding wireless nodes to wireless node location module 59. In one implementation, infrastructure radio transceivers 58 are also operative to transmit and receive wireless or radio-frequency signals according to a wireless communications protocol, such as the IEEE 802.11 WLAN protocol. Infrastructure radio transceivers 58, in one implementation, can operate on a selected channel from a plurality of channels in a given band. In another implementation, infrastructure radio transceivers 58 can also operate in more than one band. For example, infrastructure radio receivers 58 may be configured to operate in the 802.11a-5 GHz band, and/or the 802.11b/g-2.4 GHz band. In one implementation, infrastructure radio transceivers 58 can be configured to collect the signal strength information associated with wireless nodes and transmit the collected data in response to SNMP or other requests by wireless node location module 59. In other implementations, the infrastructure radio transceivers 58 can transmit signal strength information on a regular or periodic basis. As discussed below, other methods for collecting signal strength data may also be employed. [0034] Identification of wireless nodes depends on the wireless communications protocol in use. For 802.11 WLAN environments, for example, wireless nodes can be identified based on MAC address. Furthermore, wireless nodes can be authorized mobile stations, such as remote client elements 60a-60d (see Figure l), rogue systems (e.g., rogue access points and/or rogue mobile stations), as well as authorized access points for which no location information is known. In other implementations, wireless nodes can be identified based on a unique property of the RF signal, such as a given frequency channel, or a unique signal pattern, and
13 6571/54025PCT the like. For example, the wireless node location functionality may be employed to locate a detected source of interference, such as a non-802.11 compliant device. [0035] In one implementation, infrastructure radio transceivers 58 are also operable to communicate with one or more mobile stations, such as wireless node 56, according to a wireless communication protocol. For example, radio transceiver 58, in one implementation, is an access point or other WLAN component. In one implementation, radio transceiver 58 is operably connected to a Local Area Network (LAN), Wide Area Network (WAN) or other wireline network to bridge traffic between mobile stations and the wireline network. As discussed more fully below, radio transceiver 58 may also be an access point or light weight access point in a wireless network featuring hierarchical processing of protocol information. In one implementation, the radio transceiver 58 implements the 802.11 protocols (where 802.11, as used herein, generically refers to the IEEE 802.11 standard for wireless LANs and all its amendments). Of course, the present invention can be used in connection with any suitable radio-frequencybased wireless network or communications protocol.
[0036] In one implementation, infrastructure radio transceivers 58 make use of the signal strength detection functionality residing on a wireless network interface adapter to detect signal strength on a frame -byframe basis. For example, the IEEE 802.11 standard defines a mechanism by which RF energy is measured by the circuitry (e.g., chip set) on a wireless network interface controller. The IEEE 802.11 protocol specifies an optional parameter, the receive signal strength indicator (RSSI). This parameter is a measure by the PHY layer of the energy observed at the antenna used to receive the current packet or frame. This numeric value is an integer with an allowable range of 0*255 (a 1-byte value). Typically, 802.11 chip set vendors have chosen not to actually measure 256 different signal levels. Accordingly, each vendor's 802.11-compliant adapter has a specific maximum RSSI value ("RSSI_Max"). Therefore, the RF energy level reported by a particular vendor's wireless network adapter will range between 0 and RSSI_Max.
14 6571/54025PCT Resolving a given RSSI value reported by a given vendor's chip set to an actual power value (dBm) can be accomplished by reference to a conversion table. In addition, some wireless networking chip sets actually report received signal strength in dBm units, rather than or in addition to RSSI. Other attributes of the signal can also be used in combination with received signal strength or as an alternative. For example, the detected SignaHo-Noise Ratio (SNR) during packet reception can be used in determining overlay signal transmit power. Again, many chip sets include functionality and corresponding APIs to allow for a determination of SNRs associated with packets received from wireless node 56. The resulting signal strength information, in one implementation, can be associated with a time stamp corresponding to the receipt of the frame. As discussed herein, this signal strength information can be collected at each infrastructure radio transceiver 58 and/or the wireless node location module 59 in suitable data structures. [0037] Wireless node location module 59, in one implementation, collects signal strength data received from infrastructure radio transceivers 58 and maintains the signal strength data in association with a wireless node identifier, and an identifier for the particular infrastructure radio transceiver 58 and antenna which provided the signal strength data. Wireless node location module 59, in one implementation, is also configured to distinguish between signals received from infrastructure radio transceivers 58 and signals received from other wireless nodes based on the wireless node identifier. In one implementation, wireless node location module 59 maintains a variety of data structures for storing signal strength information. Wireless node location module 59, in one implementation, maintains signal strength data for all other wireless nodes in tables or other suitable data structures. In one implementation, wireless node location module 59 maintains, for each antenna of each radio transceiver 58, a separate table including at least two fields^ l) a wireless node identifier; 2) the detected signal strength. Additional fields may also include a time stamp indicating the time the infrastructure radio transceiver 58 received the signal. In one implementation, when the memory space
15 6571/54025PCT allocated to the wireless node tables is depleted, the least recently used/updated entry as indicated by the time stamps is overwritten. In the case that all entries are recent, the weakest RSSI may be overwritten instead. In one implementation, wireless node location module 59 filters the signal strength data received from the infrastructure radio transceivers 58 against a list of wireless node identifiers in order to identify the appropriate data structure to update. One skilled in the art will recognize that a variety of data structures beyond matrices and tables can be used.
[0038] As discussed above, signal strengths are detected, in one implementation, on a frame byframe basis. Accordingly, in one embodiment, the signal strength data maintained by wireless node location module 59 can be updated as the frames/packets are received. In one implementation, the latest signal strength value is used to essentially overwrite the old value. In other implementations, however, an average, moving average, weighted moving average, or time-weighted moving average can be used if successive wireless frames corresponding to a given wireless node are encountered within a threshold time interval (e.g., typically resulting from a data stream transmission). In such a situation, the time stamp can correspond to the time of the last packet or frame. In addition, while radio transceivers 58 when operating as access points typically operate on different channels, mobile stations at various times (e.g., transmitting probe requests to find access points) transmit wireless frames on all available operating channels. This helps to ensure that a plurality of infrastructure radio transceivers 58 detect the mobile station. In some implementations, one or more infrastructure radio transceivers 58 that are adjacent to a radio transceiver 58 that detected a given wireless node may be directed to switch to a given operating channel to listen for signals transmitted by the mobile station. Still further, as discussed below, the infrastructure radio transceivers 58 may be commanded to specifically transmit frames on a given channel for the purpose of updating the signal strength data maintained by wireless node location module 59.
16 6571/54025PCT C.4. Aggregate Error Surface
[0039] Wireless node location module 59 also maintains a RF physical model of the coverage area associated with the RF environment. In one implementation, the RF physical model includes a plurality of coverage maps. Each coverage map characterizes for a given infrastructure radio transceiver and antenna 58 the expected received signal strength associated with a wireless transmitter at a given location. For example, in one implementation, the RF physical model comprises, for each antenna, a radio coverage map or matrix that indicates the expected signal strength detected at an infrastructure radio transceiver received from a wireless node, assuming a uniform transmit power, at a given location defined in x-, and y coordinates. This database can be populated in a variety of ways. For example, the radio coverage maps can be populated with the results of an extensive site survey, according to which a wireless transmitter is placed at different locations in the physical space. During the site survey, the infrastructure radio transceivers 58 operate in a listening mode that cycles between the antennas and report the resulting signal strength of the signal transmitted by the wireless node used to conduct the site survey. In one implementation, the infrastructure radio transceivers 58 can be configured to transmit the signal strength data back to the wireless transmitter, which may be a laptop computer or other wireless device. The coverage maps are constructed by associating the signal strength and location data in the coverage maps corresponding to each infrastructure radio transceiver. The coverage maps may also be constructed by having a WLAN tester (or other wireless node) simply measure the signal strength of frames transmitted by the infrastructure radio transceivers 58 (e.g., beacon packets) at desired locations within the deployment region. If path loss symmetry is assumed, these values can be used to construct the coverage maps for each of the infrastructure radio transceivers. Still further, locations in the coverage map not populated by manual methods can be estimated based on interpolation or extrapolation techniques.
17 6571/54025PCT [0040] In one implementation, a coverage map, for each infrastructure radio transceiver 58, is maintained that includes the signal strengths in an N x M matrix of location bins, where N is the number of x- coordinates in the coverage map, and M is the number of y coordinates in the coverage map. In another implementation, the coverage map is a three dimensional N x M x P matrix of location bins, where P is the number of z-coordinates in the coverage map. In one implementation, the extent of the physical space model by the coverage maps for each infrastructure radio transceiver 58 are co-extensive. The coverage maps for all infrastructure radio transceivers 58 can be co- extensive with the physical space in which the location system is deployed, or with a boundary configured by a network administrator. In one implementation, however, knowledge of various antenna attributes associated with each infrastructure radio transceiver 58- -such as antenna type (e.g., omni-directional, directional), peak gain orientation, beamwidth, front-to-back isolation-can be used to compress or reduce the size of the coverage maps. In one implementation, the coverage maps can be configured to be substantially coextensive with the antenna pattern of each antenna connected to the infrastructure radio transceivers 58 out to a threshold signal strength or gain level. For example, the coverage map for a given antenna can be compressed to the front or intended coverage area of the directional antenna. In addition, if the coverage maps are compressed, the search for the best fit across selected coverage maps can be isolated to the overlap between coverage maps associated with the antennas selected to locate the wireless node.
[0041] In another implementation, the coverage maps of the RF physical model may be constructed using RF prediction to model the coverage area, employing mathematical techniques like raytracing, and the like. In one implementation, the RF prediction model can be computed for each coordinate location in a desired physical space, assuming a uniform wireless node transmit power. The estimated signal strength information for each infrastructure radio transceiver 58 can be used to populate the coverage maps discussed above. In an alternative
18 6571/54025PCT embodiment, RF prediction models can be computed relative to each infrastructure radio transceiver antenna. If path loss symmetry and transmit power symmetry between the wireless nodes and the infrastructure radio transceivers 58 are assumed, the coverage maps for each infrastructure radio transceiver antenna can be populated by using the computed values at each of the coordinate locations in the coverage map. Of course, site survey data can also be used to adjust one or more parameters associated with the RF prediction model used to estimate expected signal strength at the various locations. As above, the boundaries of the coverage maps can be contoured based on the properties of the antennas connected to the infrastructure radio transceivers 58. In addition, the location coordinates in the coverage maps can be two-dimensional, x- and ycoordinates, defining location in a horizontal plane, or three dimensional, x% y and z- coordinates, defining location in three dimensions. In addition, the values of the coordinates can be either global (i.e., longitude and latitude) or expressed relative to an arbitrarily- defined origin. In addition, the granularity of the coordinates in the coverage maps depends on the desired granularity of the wireless node location estimates. [0042] Figure 7 illustrates an example method associated with generating an aggregate error surface. The wireless node location functionality can be triggered on demand, for example, in response to a command issued by a network administrator using a control interface to locate a mobile station identified by a MAC address or other suitable identifier, such as an arbitrary name associated with a MAC address in a table or other data structure. Wireless node location module 59 may also be triggered automatically in response to the detection of a rogue access point. Wireless node location module 59 can also be configured to periodically determine the location of a given mobile station in order to track its movement over a period of time.
[0043] As Figure 5 illustrates, wireless node location module 59, in one implementation, begins by selecting the infrastructure radio transceivers (IRTs) 58 whose signal measurements will be used in locating the desired wireless node
19 6571/54025PCT (702). In one implementation, wireless node location module 59 scans the data structures discussed above to identify the infrastructure radio transceivers 58 that see or detect wireless frames transmitted by the desired wireless node. In implementations where signal strength data is regularly collected (as opposed to on demand), the time stamps in the data structures can be used to filter out infrastructure radio transceivers 58 that have not detected the desired wireless node within a threshold period of time. Additional or alternative filter criteria can include a threshold signal strength level (such as -80 dBm). In the implementation shown, wireless node location module 59 selects the M infrastructure radio transceivers 58 that report the strongest signal strengths (where M is a configurable parameter). In one implementation, if an insufficient number of infrastructure radio transceivers 58 are identified, wireless node location module 59 can command the infrastructure radio transceivers 58 to actively scan for the desired wireless node and return signal strength information. Wireless node location module 59 collects the signal strength (e.g., RSSI) measurements corresponding to the selected infrastructure radio transceivers 58 (704), and identifies the RF coverage maps to be used in estimating the location of the wireless node based on selected infrastructure radio transceivers 58 (706). [0044] As Figure 5 shows, wireless node location module 59, for all selected infrastructure radio transceivers (708), computes, for each point in the coverage map, MAPj, an error surface, ErrSurfi, characterizing the difference between the signal strength, SSi, detected by the infrastructure radio transceiver and the value in the corresponding coverage map (710). To neutralize positive and negative errors, wireless node location module 59, in one implementation, uses the square of the error for each point in the error surface. As Figure 5 illustrates, wireless node location module 59 sums the individual error surfaces, ErrSurfi, to create a total error surface, TotalErrSurf, for all points for which the error surfaces overlap (712). [0045] Figure 8 illustrates an example physical space having two defined perimeters 800 and 802 and an exclusion region 804 between the perimeters 800
20 6571/54025PCT and 802. Figure 8 shows a wireless node 60 in the exclusion region. In one implementation, wireless nodes inside the building may be considered trusted (i.e., a legitimate wireless node having permission to connection to the wireless network) and wireless nodes outside the building and outside the exclusion region are untrusted (e.g., potentially a rogue wireless node).
[0046] In one implementation, location server 22 excludes bin probabilities within the exclusion region 804 when computing the probability aggregates Pin and Pout (Figure 4). In other words, the location server 22 ignores the possibility that wireless nodes might be located within the exclusion region 804 (Le., between perimeters 800 and 802) such as wireless node 60, as shown. The presumption is that rogue wireless nodes (e.g., hackers) would typically not approach a building too closely, as they would become vulnerable to conventional means of detection. [0047] In one implementation, the location server 22 may modify the size of the exclusion region 804 to bias the probability ratio. For example, a wider exclusion region 804 decreases the probability that a given wireless node will be determined to be inside the perimeter 800. Accordingly, a wireless node inside the exclusion region would have no guarantee of coverage (e.g., may be denied coverage). [0048] The present invention has been explained with reference to specific embodiments. For example, while embodiments of the present invention have been described as operating in connection with IEEE 802.11 networks, the present invention can be used in connection with any suitable wireless network environment. Other embodiments will be evident to those of ordinary skill in the art. It is therefore not intended that the present invention be limited, except as indicated by the appended claims.
21 6571/54025PCT

Claims

CLAIMS What is claimed is:
1. Logic encoded in one or more tangible media for execution and when executed operable to÷ compute a probability surface corresponding to the location probability of the wireless node within a physical region based on the received signal strength data associated with a wireless node and an RF model of the physical region) compute, based on the probability surface, an aggregate probability (Pin) of the wireless node being inside a perimeter defined with the physical region; compute, based on the probability surface, an aggregate probability (Pout) of the wireless node being outside the perimeter! and determine whether the wireless node is inside or outside the perimeter based on a comparison of Pout and Pin.
2. The logic of claim 1 wherein the logic is further operable to determine whether the wireless node is inside or outside the perimeter based on whether Pin or Pout is larger.
3. The logic of claim 1 wherein, to determine whether the wireless node is inside or outside the perimeter, the logic is further operable to compute a probability ratio of the aggregate probabilities Pin to Pout.
4. The logic of claim 1 wherein the logic is further operable to: compute a probability ratio based on Pin and Pout; and bias the probability ratio based on a predefined policy.
22 6571/54025PCT
5. The logic of claim 4 wherein the predefined policy either increases the probability that a given wireless node is inside the perimeter or increases the probability that a given wireless node is outside the perimeter.
6. The logic of claim 4 wherein the logic is further operable to bias the probability ratio globally to all wireless access points inside the perimeter.
7. The logic of claim 4 wherein the logic is further operable to bias the probability ratio relative to a given wireless access point..
8. The logic of claim 4 wherein the logic is further operable to exclude probabilities from bins within an exclusion region when computing the aggregate probabilities Pin and Pout.
9. The logic of claim 4 wherein the logic is further operable to modify the size of the exclusion region to bias the probability ratio.
10. A method comprising: computing a probability surface corresponding to the location probability of the wireless node within a physical region based on the received signal strength data associated with a wireless node and an RF model of the physical region; computing, based on the probability surface, an aggregate probability (Pin) of the wireless node being inside a perimeter defined with the physical region; computing, based on the probability surface, an aggregate probability (Pout) of the wireless node being outside the perimeter; and determining whether the wireless node is inside or outside the perimeter based on a comparison of Pout and Pin.
23 6571/54025PCT
11. The method of claim 10 wherein the determining is based on whether Pin or Pout is larger.
12. The method of claim 10 wherein, to determine whether the wireless node is inside or outside the perimeter, the method further comprises computing a probability ratio of the aggregate probabilities Pin to Pout.
13. The method of claim 10 further comprising" computing a probability ratio based on Pin and Pout; and biasing the probability ratio based on a predefined policy.
14. The method of claim 13 wherein the predefined policy either increases the probability that a given wireless node is inside the perimeter or increases the probability that a given wireless node is outside the perimeter.
15. The method of claim 13 further comprising biasing the probability ratio globally to all wireless access points inside the perimeter.
16. The method of claim 13 further comprising biasing the probability ratio relative to a given wireless access point..
17. The method of claim 13 further comprising excluding probabilities from bins within an exclusion region when computing the aggregate probabilities Pin and Pout.
18. The method of claim 13 further comprising modifying the size of the exclusion region to bias the probability ratio.
24 6571/54025PCT
19. A system comprising: a location server operable to compute a probability surface corresponding to the location probability of the wireless node within a physical region based on the received signal strength data associated with a wireless node and an RF model of the physical region; compute, based on the probability surface, an aggregate probability (Pin) of the wireless node being inside a perimeter defined with the physical region! compute, based on the probability surface, an aggregate probability (Pout) of the wireless node being outside the perimeter; and determine whether the wireless node is inside or outside the perimeter based on a comparison of Pout and Pin; and a wireless access point operable to communicate with a wireless node.
20. The system of claim 19 wherein the location server is further operable to determine whether the wireless node is inside or outside the perimeter based on whether Pin or Pout is larger.
21. The system of claim 19 wherein, to determine whether the wireless node is inside or outside the perimeter, the location server is further operable to compute a probability ratio of the aggregate probabilities Pin to Pout.
22. The system of claim 19 wherein the location server is further operable to^ compute a probability ratio based on Pin and Pout! and bias the probability ratio based on a predefined policy.
23. The system of claim 22 wherein the predefined policy either increases the probability that a given wireless node is inside the perimeter or increases the probability that a given wireless node is outside the perimeter.
25 6571/54025PCT
24. The system of claim 22 wherein the location server is further operable to bias the probability ratio globally to all wireless access points inside the perimeter.
25. The system of claim 22 wherein the location server is further operable to bias the probability ratio relative to a given wireless access point.
26. The system of claim 22 wherein the location server is further operable to exclude probabilities from bins within an exclusion region when computing the aggregate probabilities Pin and Pout.
27. The system of claim 22 wherein the location server is further operable to modify the size of the exclusion region to bias the probability ratio.
26 6571/54025PCT
PCT/US2007/079354 2006-10-04 2007-09-25 Relative location of a wireless node in a wireless network WO2008042641A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP07843092.3A EP2055021B1 (en) 2006-10-04 2007-09-25 Relative location of a wireless node in a wireless network

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US11/542,739 US7626969B2 (en) 2006-10-04 2006-10-04 Relative location of a wireless node in a wireless network
US11/542,739 2006-10-04

Publications (2)

Publication Number Publication Date
WO2008042641A2 true WO2008042641A2 (en) 2008-04-10
WO2008042641A3 WO2008042641A3 (en) 2009-05-22

Family

ID=39269082

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2007/079354 WO2008042641A2 (en) 2006-10-04 2007-09-25 Relative location of a wireless node in a wireless network

Country Status (3)

Country Link
US (1) US7626969B2 (en)
EP (1) EP2055021B1 (en)
WO (1) WO2008042641A2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016050258A1 (en) * 2014-09-29 2016-04-07 Telecom Italia S.P.A. Positioning method and system for wireless communication networks

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102005032943A1 (en) * 2005-07-14 2007-01-18 Siemens Ag Method and device for changing a method for determining the position of a mobile station within a mobile communication network
US7890060B2 (en) * 2006-10-11 2011-02-15 Nokia Corporation Enhanced location based service for positioning intersecting objects in the measured radio coverage
US8320933B2 (en) * 2007-02-28 2012-11-27 Polaris Wireless, Inc. Estimating whether or not a wireless terminal is in a zone using radio navigation
US9247516B2 (en) * 2007-02-28 2016-01-26 Polaris Wireless, Inc. Estimating whether or not a wireless terminal is in a geographic zone using pattern classification
US8289884B1 (en) * 2008-01-14 2012-10-16 Dulles Research LLC System and method for identification of unknown illicit networks
US8233406B1 (en) * 2008-11-06 2012-07-31 Sprint Communications Company L.P. Communication system and method for operating a control database for a wireless communication system
US8892103B2 (en) * 2011-05-06 2014-11-18 Telefonaktiebolaget L M Ericsson (Publ) Methods and nodes supporting cell change
US9019846B2 (en) 2011-06-20 2015-04-28 Cisco Technology, Inc. Reducing the impact of hidden nodes in mesh networks
US8955004B2 (en) 2011-09-27 2015-02-10 Adobe Systems Incorporated Random generation of beacons for video analytics
US8782175B2 (en) * 2011-09-27 2014-07-15 Adobe Systems Incorporated Beacon updating for video analytics
US8811189B2 (en) * 2012-04-23 2014-08-19 Cisco Technology, Inc. Generating accurate dynamic heat maps
US9161385B2 (en) 2012-11-26 2015-10-13 Brightsource Industries (Israel) Ltd. Systems and methods for wireless communications in a solar field
US9037131B2 (en) 2013-01-23 2015-05-19 Qualcomm Incorporated Efficient generation of radio coverage map of access points in an indoor environment
US8971919B2 (en) 2013-01-23 2015-03-03 Qualcomm Incorporated Fast generation of radio coverage map of access points in an indoor environment
US9628952B2 (en) * 2013-02-22 2017-04-18 Apple Inc. Methods for determining relative locations of multiple nodes in a wireless network
US9002375B1 (en) * 2013-03-15 2015-04-07 Groupon, Inc. Presence detection based on crowd surfing signal strength
US9823330B2 (en) 2013-05-03 2017-11-21 Cisco Technology, Inc. Angle of arrival location sensing with antenna array
US10192182B2 (en) * 2014-06-10 2019-01-29 Wellaware Holdings, Inc. Aerial drone for well-site and signal survey
CN106714094B (en) * 2015-07-20 2021-03-02 阿里巴巴集团控股有限公司 Data processing method, device and system
US11493644B2 (en) 2019-03-15 2022-11-08 Kabushiki Kaisha Toshiba Identification of selected items through radiolocation and movement detection
US11240146B2 (en) 2019-10-30 2022-02-01 Kabushiki Kaisha Toshiba Service request routing

Family Cites Families (79)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4254467A (en) 1979-06-04 1981-03-03 Xerox Corporation Vector to raster processor
US5028848A (en) 1988-06-27 1991-07-02 Hewlett-Packard Company Tile vector to raster conversion method
GB9016277D0 (en) 1990-07-25 1990-09-12 British Telecomm Location and handover in mobile radio systems
US5396582A (en) 1991-02-06 1995-03-07 Hewlett-Packard Company Raster to vector conversion system and method therefor
US5327144A (en) 1993-05-07 1994-07-05 Associated Rt, Inc. Cellular telephone location system
SE9302140L (en) 1993-06-21 1994-08-29 Televerket Procedure for locating mobile stations in digital telecommunications networks
JP2833967B2 (en) 1993-07-23 1998-12-09 日本電気株式会社 Cell phone position detection method
US5570412A (en) 1994-09-28 1996-10-29 U.S. West Technologies, Inc. System and method for updating a location databank
US5761328A (en) 1995-05-22 1998-06-02 Solberg Creations, Inc. Computer automated system and method for converting source-documents bearing alphanumeric text relating to survey measurements
US5732354A (en) 1995-06-07 1998-03-24 At&T Wireless Services, Inc. Method and apparatus for determining the location of a mobile telephone
US5717406A (en) 1995-06-07 1998-02-10 Sanconix Inc. Enhanced position calculation
JP3231787B2 (en) 1996-03-05 2001-11-26 松下電器産業株式会社 Location information detection system
GB2311697B (en) 1996-03-22 1999-07-28 Matsushita Electric Ind Co Ltd Wireless communication system and method and system for detection of position of radio mobile station
US6249252B1 (en) 1996-09-09 2001-06-19 Tracbeam Llc Wireless location using multiple location estimators
WO1998010307A1 (en) * 1996-09-09 1998-03-12 Dennis Jay Dupray Location of a mobile station
US6236365B1 (en) 1996-09-09 2001-05-22 Tracbeam, Llc Location of a mobile station using a plurality of commercial wireless infrastructures
US6112095A (en) 1997-01-08 2000-08-29 Us Wireless Corporation Signature matching for location determination in wireless communication systems
US6167274A (en) 1997-06-03 2000-12-26 At&T Wireless Svcs. Inc. Method for locating a mobile station
US6115605A (en) 1997-08-29 2000-09-05 Ppm, Inc. Communication system and device using dynamic receiver addressing
US6212391B1 (en) 1997-12-01 2001-04-03 Motorola, Inc. Method for positioning gsm mobile station
US6414634B1 (en) 1997-12-04 2002-07-02 Lucent Technologies Inc. Detecting the geographical location of wireless units
JPH11205845A (en) 1998-01-14 1999-07-30 Locus:Kk Position specifying system
US6804394B1 (en) 1998-04-10 2004-10-12 Hsu Shin-Yi System for capturing and using expert's knowledge for image processing
US6226400B1 (en) 1998-06-24 2001-05-01 Colorcom, Ltd. Defining color borders in a raster image by identifying and breaking contrast ties
US6456892B1 (en) 1998-07-01 2002-09-24 Sony Electronics, Inc. Data driven interaction for networked control of a DDI target device over a home entertainment network
US6243811B1 (en) 1998-07-31 2001-06-05 Lucent Technologies Inc. Method for updating secret shared data in a wireless communication system
US6441777B1 (en) 1998-08-26 2002-08-27 Mcdonald Keith D. Signal structure and processing technique for providing highly precise position, velocity, time and attitude information with particular application to navigation satellite systems including GPS
US6269246B1 (en) 1998-09-22 2001-07-31 Ppm, Inc. Location determination using RF fingerprinting
US6272541B1 (en) 1998-10-08 2001-08-07 International Business Machines Corporation Data processing system and method for determining a physical location of a client computer system coupled to a server via a physical network
US6198935B1 (en) 1998-11-17 2001-03-06 Ericsson Inc. System and method for time of arrival positioning measurements based upon network characteristics
US6184829B1 (en) 1999-01-08 2001-02-06 Trueposition, Inc. Calibration for wireless location system
KR100403748B1 (en) 1999-01-23 2003-11-03 삼성전자주식회사 Method for tracking a location of mobile telephone in mobile telecommunication network
US6799047B1 (en) 1999-02-25 2004-09-28 Microsoft Corporation Locating and tracking a user in a wireless network through environmentally profiled data
US6850946B1 (en) 1999-05-26 2005-02-01 Wireless Valley Communications, Inc. Method and system for a building database manipulator
US6317599B1 (en) 1999-05-26 2001-11-13 Wireless Valley Communications, Inc. Method and system for automated optimization of antenna positioning in 3-D
US6282427B1 (en) 1999-07-14 2001-08-28 Telefonaktiebolaget L M Ericsson (Publ) Selection of location measurement units for determining the position of a mobile communication station
GB0008364D0 (en) * 2000-04-06 2000-05-24 Hewlett Packard Co Deriving location information about a communication entity
US6766453B1 (en) 2000-04-28 2004-07-20 3Com Corporation Authenticated diffie-hellman key agreement protocol where the communicating parties share a secret key with a third party
US6704352B1 (en) 2000-05-04 2004-03-09 Samsung Electronics Co., Ltd. High accuracy receiver forward and reflected path test injection circuit
US6728782B1 (en) 2000-05-23 2004-04-27 At&T Corp. Method of verifying newly provisioned customer network route advertisements
US6556942B1 (en) 2000-09-29 2003-04-29 Ut-Battelle, Llc Short range spread-spectrum radiolocation system and method
KR100364368B1 (en) 2000-10-18 2002-12-12 엘지전자 주식회사 Private Network Using Bluetooth and Communication Method Using the Network
FI111901B (en) 2000-12-29 2003-09-30 Ekahau Oy Estimation of position in wireless communication networks
US6581000B2 (en) 2001-01-04 2003-06-17 Carnegie Mellon University Position location system and method
US20020102988A1 (en) 2001-01-26 2002-08-01 International Business Machines Corporation Wireless communication system and method for sorting location related information
US7103365B2 (en) 2001-02-21 2006-09-05 International Business Machines Corporation System and method for locating an alternate communication mechanism in case of a failure of a wireless communication device
US7259694B2 (en) 2001-02-26 2007-08-21 International Business Machines Corporation Wireless communication system and method to provide geo-spatial related event data
US7120129B2 (en) 2001-03-13 2006-10-10 Microsoft Corporation System and method for achieving zero-configuration wireless computing and computing device incorporating same
US20020174335A1 (en) 2001-03-30 2002-11-21 Junbiao Zhang IP-based AAA scheme for wireless LAN virtual operators
JP4164272B2 (en) 2001-04-24 2008-10-15 キヤノン株式会社 Image processing apparatus and image processing method
US7529537B2 (en) 2001-05-14 2009-05-05 International Business Machines Corporation System and method for providing personal and emergency service hailing in wireless network
US6732411B2 (en) * 2001-05-23 2004-05-11 Michael A. Vidal Hand tool handle modification system
US6842726B1 (en) * 2001-06-05 2005-01-11 At&T Wireless Services, Inc. Method of determining RF coverage area in a point-to-multipoint transmission system
WO2003021851A2 (en) 2001-09-05 2003-03-13 Newbury Networks, Inc. Position detection and location tracking in a wireless network
JP3792154B2 (en) 2001-12-26 2006-07-05 インターナショナル・ビジネス・マシーンズ・コーポレーション Network security system, computer apparatus, access point recognition processing method, access point check method, program, and storage medium
US6845241B2 (en) 2002-01-07 2005-01-18 International Business Machines Corporation Relevance assessment for location information received from multiple sources
CA2414789A1 (en) 2002-01-09 2003-07-09 Peel Wireless Inc. Wireless networks security system
US7058668B2 (en) 2002-01-11 2006-06-06 International Business Machines Corporation System for estimating the temporal validity of location reports through pattern analysis
US6754488B1 (en) 2002-03-01 2004-06-22 Networks Associates Technologies, Inc. System and method for detecting and locating access points in a wireless network
US6664925B1 (en) 2002-05-02 2003-12-16 Microsoft Corporation Method and system for determining the location of a mobile computer
FI113092B (en) 2002-05-31 2004-02-27 Ekahau Oy Measures of position differences and applications
FI113410B (en) 2002-05-31 2004-04-15 Ekahau Oy Probalistic model for positioning technique
FI113409B (en) 2002-05-31 2004-04-15 Ekahau Oy Sequence-based positioning technology
US7257105B2 (en) 2002-10-03 2007-08-14 Cisco Technology, Inc. L2 method for a wireless station to locate and associate with a wireless network in communication with a Mobile IP agent
US6823190B2 (en) 2002-12-03 2004-11-23 International Business Machines Corporation System and method to anonymously test for proximity of mobile users without revealing individual phase space coordinates
US7392247B2 (en) 2002-12-06 2008-06-24 International Business Machines Corporation Method and apparatus for fusing context data
US20040203910A1 (en) 2002-12-31 2004-10-14 International Business Machines Corporation Spatial boundary admission control for wireless networks
US7295119B2 (en) 2003-01-22 2007-11-13 Wireless Valley Communications, Inc. System and method for indicating the presence or physical location of persons or devices in a site specific representation of a physical environment
US20040151377A1 (en) 2003-02-04 2004-08-05 Boose Molly L. Apparatus and methods for converting network drawings from raster format to vector format
EP1445970B1 (en) * 2003-02-05 2009-04-01 Cambridge Positioning Systems Limited A method and system for locating a mobile radio receiver in a radio system with multiple tranmitters
US7149531B2 (en) 2003-02-13 2006-12-12 Ekahau Oy Location applications for wireless networks
BRPI0407797A (en) 2003-02-25 2006-02-14 Boston Communications Group Inc method and system for controlling the use of a wireless device, method for controlling communications between a wireless communication device and another communication device, apparatus for controlling the use of a wireless device, and method for communicating usage information of a wireless device
US7853250B2 (en) 2003-04-03 2010-12-14 Network Security Technologies, Inc. Wireless intrusion detection system and method
US20040259555A1 (en) 2003-04-23 2004-12-23 Rappaport Theodore S. System and method for predicting network performance and position location using multiple table lookups
US20040259554A1 (en) 2003-04-23 2004-12-23 Rappaport Theodore S. System and method for ray tracing using reception surfaces
US6990428B1 (en) 2003-07-28 2006-01-24 Cisco Technology, Inc. Radiolocation using path loss data
US7127258B2 (en) 2003-11-10 2006-10-24 Symbol Technologies, Inc. WLAN roaming based on location
ES2389807T3 (en) * 2004-10-15 2012-10-31 Telecom Italia S.P.A. Procedure and system to determine if a terminal belongs to a target space in a communication network, related network and software product
FR2879067A1 (en) * 2004-12-06 2006-06-09 France Telecom LOCATION OF A MOBILE TERMINAL IN RELATION TO A BUILDING

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
None

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016050258A1 (en) * 2014-09-29 2016-04-07 Telecom Italia S.P.A. Positioning method and system for wireless communication networks
US11852741B2 (en) 2014-09-29 2023-12-26 Telecom Italia S.P.A. Positioning method and system for wireless communication networks

Also Published As

Publication number Publication date
EP2055021A2 (en) 2009-05-06
US20080084858A1 (en) 2008-04-10
US7626969B2 (en) 2009-12-01
EP2055021B1 (en) 2015-11-11
WO2008042641A3 (en) 2009-05-22
EP2055021A4 (en) 2013-10-23

Similar Documents

Publication Publication Date Title
EP2055021B1 (en) Relative location of a wireless node in a wireless network
US7616555B2 (en) Minimum variance location estimation in wireless networks
US7116988B2 (en) Location of wireless nodes using signal strength weighting metric
US8200242B2 (en) Enhanced wireless node location using differential signal strength metric
EP1754385B1 (en) Wireless node location mechanism featuring definition of search region to optimize location computation
EP1719360B1 (en) Selective termination of wireless connections to refresh signal information in wireless node location infrastructure
US7532896B2 (en) Wireless node location mechanism using antenna pattern diversity to enhance accuracy of location estimates
EP1733247B1 (en) Wireless node location mechanism responsive to observed propagation characteristics of wireless network infrastructure signals
US8265677B2 (en) Method for the optimization of channel scanning function in a telecommunication network for mobile terminals
Kim et al. Robust transmission power and position estimation in cognitive radio
CN103796222A (en) Wireless communication methods and apparatus

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07843092

Country of ref document: EP

Kind code of ref document: A2

WWE Wipo information: entry into national phase

Ref document number: 2007843092

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE