Multiplex communications – Communication over free space – Combining or distributing information via time channels
Reexamination Certificate
1999-07-15
2004-02-24
Jung, Min (Department: 2663)
Multiplex communications
Communication over free space
Combining or distributing information via time channels
C370S392000, C370S466000, C370S474000
Reexamination Certificate
active
06697352
ABSTRACT:
FIELD OF THE INVENTION
The present invention relates to a device and method for sending data packets, for example over a link establishing a connection between a computer and a packet exchange network such as the so called Internet.
BACKGROUND OF THE INVENTION
With the progress in data processing and communications technology over the past years, the establishment of data exchange networks has become an important fixture in many aspects of the modern world, e.g. in the scientific and military community, but also with strongly increasing growth in the business and private realm. The best example of this is the steadily rising offer and demand of services in the world wide communication network commonly referred to as the Internet. In principle, the term “internet” simply refers to a network consisting of other networks, so that the world wide “Internet” is only an example, albeit a very well known one.
The commonly used data exchange principle for networks is that of packet exchange. This means that the data to be sent is broken down into units. Rules for sending and receiving such units, as well as rules for the structure of the units themselves are determined by so called protocols. Protocols are sets of rules that allow the communication between a sending end and a receiving end, as the rules specify how and in what form data to be sent has to be prepared, such that the receiving end may interpret the data and react in accordance to protocol defined rules to which both partners in the communication adhere.
An important concept for allowing the exchange of data between different networks, and thereby between numerous kinds of software and hardware, is that of protocol layering. This means that a number of protocols (sometimes also referred to as a suite) is organized in a hierarchy of layers, where each layer has specific functions and responsibilities. This will briefly be explained by referring to an example illustrated in
FIGS. 3
to
5
. A more detailed description of this concept is e.g. given in “TCP/IP Illustrated, Volume 1, The Protocols” by W. Richard Stevens, Addison-Wesley, 1994.
The Transmission Control Protocol (TCP) and the Internet Protocol (IP) are examples of protocols according to which communication over the Internet may be handled. What is commonly referred to as TCP/IP, however, comprises other protocols as well. The so-called TCP/IP suite has four layers, as shown in FIG.
3
. The link layer handles the input and output of data into the physical communication media, e.g. a cable or a radio connection. It typically is implemented in the device driver in the operating system and the corresponding network interface card in the computer. The network layer handles the movement of packets around the network, e.g. routing. IP is an example of a network layer protocol. The transport layer provides a flow of data for the application layer above. For example, TCP is at the transport layer. An alternative to TCP is the User Datagram Protocol (UDP). The application layer is constituted by the application program sending or receiving data, e.g. an e-mail program.
A communication between two points then has the schematic form shown in FIG.
4
. Data is first handed down through the layers and input into the physical connection on the sending side, and then handed up through the layers on the receiving side. This is indicated by the solid line arrows. The elements handling the data at a given layer in accordance with a protocol specified for that layer (e.g. TCP at the transport layer in the example of
FIG. 4
) are also referred to as peers. In other words, the transport layer in the example of
FIG. 4
is handled by a TCP peer. It should be noted that the physical connection shown at the bottom of
FIG. 4
may again consist of one or more protocol layers of its own, depending on the type of connection. This will be explained in more detail further on.
FIG. 5
illustrates the mechanism of passing data through the layers. The typical basic structure of a packet has two parts, namely a header and a payload part. The header contains information on the type of data contained in the payload part and communication control information for the respective layer. As can be seen in
FIG. 5
, at the application layer user data is processed by adding a header. The resulting data unit or packet is passed to the transport layer, where e.g. a TCP header is added. This TCP header contains information for the TCP peer on the receiving side. The resulting packet is sometimes also referred to as a TCP segment. Then this TCP segment is passed to the network layer, where in the example of
FIG. 5
an IP header is added that e.g. contains routing information. The resulting packet is also referred to as an IP datagram. Finally, the IP datagram is passed to the link layer, where a header associated with the link layer protocol (LLP), e.g. the Point-to-Point Protocol (PPP), is added. The resulting packet is often called a frame. The frame also receives a start flag and an end flag, such that a receiver may recognize where a frame begins and where it ends. This process of embedding a packet of a higher layer in a larger packet of a lower layer is referred to as encapsulation.
On the receiving side, the user data is extracted by steps of de-encapsulation in the opposite order of what is shown in FIG.
5
. It should be noted that the above description only refers to an example, and variations are possible. For example, some protocols not only add headers, but also trailers.
It should be remarked that a packet need not originate from the application layer, much rather a lower layer may generate a packet, e.g. for sending specific information regarding only that layer to the corresponding peer at the receiving end. An example of this is the sending of Link Control Protocol (LCP) packets prior to sending higher layer data, where said LCP packets are used by the link layer peers to configure the (physically established) link in accordance with parameters that are adjustable and/or negotiable at the link layer.
The representation in
FIG. 4
is only very schematic, as it implies that the four individual peers on each side are respectively implemented in one location. This is possible, but in reality the situation is usually more complicated.
FIG. 6
schematically shows an example of a communication between an IP-host
1
and an IP-host
2
. The top part of the figure represents the physical communication path, and the lower part of the figure shows the logical communication path associated with the various protocols employed. The example of
FIG. 6
relates to a connection to the Internet via a GSM network.
IP-host
1
can e.g. be a laptop computer. The terminal adaptation function TAF can be fulfilled e.g. by a PCMCIA interface card that is connected to the mobile station MS, e.g. a cellular telephone. The mobile station MS communicates with a base transceiver station BTS, which in turn is connected to a base station controller BSC. The connection to a public switched telephone network PSTN is accomplished by a modem in the interworking function IWF of the mobile switching center MSC associated with the base transceiver station BTS. It may be noted that due to the fact that GSM is digital, the TAF is not a modem. Finally, the PSTN provides the connection to an Internet services provider ISP, who in turn provides a gateway to the Internet. The physical connection between the Internet and IP-host
2
, e.g. a personal computer to which an e-mail from IP-host
1
is to be sent, is not shown.
As can be seen in the lower part of
FIG. 6
, a TCP peer, an IP peer and a PPP peer are implemented at IP-host
1
. The corresponding TCP peer and an IP peer reside in IP-host
2
, whereas an IP peer and PPP peer are implemented at the Internet services provider ISP.
An important aspect of the layering scheme is that the different layers are “transparent”. This means that the peers in a layer are oblivious to what happens in another layer. As an example, the PPP peers establish a pseudo-dedicated PPP connection be
Khan Farooq
Ludwig Reiner
Rathonyi Bela
Jung Min
Lee Andy
Telefonaktiebolaget LM Ericsson
LandOfFree
Communication device and method does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Communication device and method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Communication device and method will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3328574