CROSS REFERENCE TO RELATED APPLICATIONSThis application is a continuation of U.S. patent application Ser. No. 10/785,596, entitled “Methods and Apparatus for Handling Wireless Roaming Among and Across Wireless Area Networks,” filed on Feb. 23, 2004, the entirety of which is incorporated herein by reference.
COPYRIGHT NOTICEA portion of the disclosure of this patent document contains material which is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent files or records, but otherwise reserves all copyright rights whatsoever.
FIELD OF THE INVENTIONThe present invention relates to the field of wireless networking. More particularly, the present invention relates to a solution for wireless roaming among and across wireless local area networks.
BACKGROUND OF THE INVENTIONWireless network has significantly grown in popularity. The IEEE 802.11 standards are currently the most widely used wireless networking standards. Wireless network can present unique problems when clients “roam”. Roaming may be defined as switching from one access point to another access point.
The ability of a mobile client to move freely between various segments of a wireless domain without experiencing any observable service degradation or disruption is called seamless roaming. Roaming can occur at various layers. If a client roams between two segments that are part of the same Internet Protocol (IP) subnet, then the roaming is termedlayer2 roaming. If the client roams between segments that have different IP subnets, then the roaming is termedlayer3 roaming.
The Inter Access Point Protocol (IAPP) has been suggested by the IEEE 802.11 committee to address thelayer2 roaming of clients in wireless networks. It runs on wireless access points and uses a combination of Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) to facilitate roaming. However, it fails to supportlayer3 roaming as it relies onlayer2 broadcast messages to find other access points.
The IPv4 (RFC 3344) standard has been proposed by the Internet Engineering Task Force (IETF) and it attempts to addressLayer3 roaming. Though it is a generic solution, it suffers several limitations. For example, the standard relies on software upgrades to the clients to run some piece of the protocol. This requires that all users upgrade their mobile clients (laptops, mobile phones, etc.) before they can use this standard. Additionally, this standard only addresses thelayer3 roaming aspect of the generic problem.
What is needed is a solution that can seamlessly handle bothlayer2 andlayer3 roaming.
BRIEF DESCRIPTION OF THE INVENTIONWireless roaming in a computer network may be handled through a solution provided on one or more switches in the network. A roam request sent by a switch corresponding to the user's new location may be received by the other switches in the network. If the user is known to any of these switches, then they may execute steps to accommodate the roaming. The tasks performed may vary based on whether the roaming is onlayer2 orlayer3, whether the switch is a home agent for the client, and/or whether the switch already corresponds to the user's new location.
BRIEF DESCRIPTION OF THE DRAWINGSThe accompanying drawings, which are incorporated into and constitute a part of this specification, illustrate one or more embodiments of the present invention and, together with the detailed description, serve to explain the principles and implementations of the invention.
In the drawings:
FIG. 1 is adiagram illustrating layer2 roaming on a single WLAN switch in accordance with an embodiment of the present invention.
FIG. 2 is adiagram illustrating layer2 roaming between two WLAN switches in accordance with an embodiment of the present invention.
FIG. 3 is adiagram illustrating layer3 roaming on a single WLAN switch in accordance with an embodiment of the present invention.
FIG. 4 is adiagram illustrating layer3 roaming between two WLAN switches in accordance with an embodiment of the present invention.
FIG. 5 is adiagram illustrating layer3 roaming followed by anotherlayer3 roaming involving 2 WLAN switches in accordance with an embodiment of the present invention.
FIG. 6 is adiagram illustrating layer3 roaming to a different WLAN switch followed by anotherlayer3 roaming back to the original WLAN switch in accordance with an embodiment of the present invention.
FIG. 7 is adiagram illustrating layer3 roaming followed by anotherlayer3 roaming on3 or more WLAN switches in accordance with an embodiment of the present invention.
FIG. 8 is adiagram illustrating layer3 roaming followed bylayer2 roaming involving 2 WLAN switches in accordance with an embodiment of the present invention.
FIG. 9 is adiagram illustrating layer3 roaming followed bylayer2 roaming on 3 or more WLAN switches in accordance with an embodiment of the present invention.
FIG. 10 is a flow diagram illustrating a method for responding to client roaming at a switch in accordance with an embodiment of the present invention.
FIG. 11 is a flow diagram illustrating a method for handling a roam request from a switch in accordance with an embodiment of the present invention.
FIG. 12 is a flow diagram illustrating a method for handling a roam reply in a switch in accordance with an embodiment of the present invention.
FIG. 13 is a block diagram illustrating an apparatus for responding to client roaming at a switch in accordance with an embodiment of the present invention.
FIG. 14 is a block diagram illustrating an apparatus for handling a roam request from a switch in accordance with an embodiment of the present invention.
FIG. 15 is a block diagram illustrating a method for handling a roam reply in a switch in accordance with an embodiment of the present invention.
DETAILED DESCRIPTIONEmbodiments of the present invention are described herein in the context of a system of computers, servers, and software. Those of ordinary skill in the art will realize that the following detailed description of the present invention is illustrative only and is not intended to be in any way limiting. Other embodiments of the present invention will readily suggest themselves to such skilled persons having the benefit of this disclosure. Reference will now be made in detail to implementations of the present invention as illustrated in the accompanying drawings. The same reference indicators will be used throughout the drawings and the following detailed description to refer to the same or like parts.
In the interest of clarity, not all of the routine features of the implementations described herein are shown and described. It will, of course, be appreciated that in the development of any such actual implementation, numerous implementation-specific decisions must be made in order to achieve the developer's specific goals, such as compliance with application—and business-related constraints, and that these specific goals will vary from one implementation to another and from one developer to another. Moreover, it will be appreciated that such a development effort might be complex and time-consuming, but would nevertheless be a routine undertaking of engineering for those of ordinary skill in the art having the benefit of this disclosure.
In accordance with the present invention, the components, process steps, and/or data structures may be implemented using various types of operating systems, computing platforms, computer programs, and/or general purpose machines. In addition, those of ordinary skill in the art will recognize that devices of a less general purpose nature, such as hardwired devices, field programmable gate arrays (FPGAs), application specific integrated circuits (ASICs), or the like, may also be used without departing from the scope and spirit of the inventive concepts disclosed herein. Furthermore, the present invention is described in the context of a switch. However, one of ordinary skill in the art will recognize that the term switch should be read broadly, so as to include any device that directs packets, including a router and a gateway.
Layer2 andLayer3 roaming are based on the Open Systems Interconnection (OSI) network standard of layers.Layer2 represents the data-link layer, whilelayer3 represents the network layer. For purposes of this document,layer2 roaming may involve the roaming from one access point (AP) to a new AP having the same virtual local area network (VLAN) and subnet.Layer3 roaming may involve the roaming from one AP to a new AP that has either a different VLAN, or the same VLAN but different subnet.
Clients in a wireless network can roam from one access point to another. A combination of access points, wireless local area network (WLAN) switches, and the underlying topology presents a challenge to manage roaming clients. The present invention provides a solution that allows WLAN switches to properly manage wireless roaming.
One embodiment of the present invention involves the use of new protocols between the access point (AP) and the WLAN switch, and between WLAN switches. The protocol between the AP and the WLAN switch may be called the Switch Access Point Protocol (SAPP). The protocol between the WLAN switches may be called the Inter Switch Roaming Protocol (ISRP). Use of these protocols is optional, however, and one of ordinary skill in the art will recognize that the present invention may be practiced without the use of either of these protocols.
SAPP may begin with a discovery phase in which the APs send a discovery request frame, causing any WLAN switch receiving the frame to respond with a discover reply frame. From all the discovery replies received, an AP may select a WLAN switch with which to associate, and then may send out a join request. The WLAN switch receiving the join request may then send a join reply. Upon receiving the join reply, the AP may establish a TCP session with the WLAN switch. Once the TCP session is up, the Access Point may communicate to the WLAN switch all the client related events.
Each of the WLAN switches within a mobility domain may be configured with the IP addresses of all the other WLAN switches in that domain. This helps to establish a full mesh of TCP connections amongst them.
Once the TCP connection is established, the WLAN switch may send out an initialization message via ISRP to the peer WLAN switch. If the peer accepts the initialization message, it may reply with its own initialization message followed by a keep alive message.
When roaming is detected, the new WLAN switch may send a roam mobile message to all the other WLAN switches in the mobility domain. When a WLAN switch receives this message, it may check to see if it knows anything about the client. If it does, then it may invoke a roaming algorithm to handle the message. Otherwise, it may simply ignore the message.
FIG. 1 is adiagram illustrating layer2 roaming on a single WLAN switch in accordance with an embodiment of the present invention. In this case, the client has roamed from oneAP100 to anotherAP102, both of which are connected to thesame WLAN switch104. There is not much that needs to be done in this case. TheWLAN switch104 will still be the home agent (HA). The client's policy, however, should be moved from the old AP port to the new AP port on theWLAN switch104.
FIG. 2 is adiagram illustrating layer2 roaming between two WLAN switches in accordance with an embodiment of the present invention. In this case, the client has roamed from anAP200 connected to afirst WLAN switch202 to anotherAP204 connected to asecond WLAN switch206. Here, the client's mobility context information should be moved fromWLAN switch202 toWLAN switch206. Additionally,WLAN switch206 should be designated as the new HA.WLAN switch202 should then remove the client'slayer2 information from the bridging table, and then clean up the client's data structures.
FIG. 3 is adiagram illustrating layer3 roaming on a single WLAN switch in accordance with an embodiment of the present invention. In this case, the client has roamed from oneAP300 to anotherAP302, both of which are connected to thesame WLAN switch304. Once again, there is not much that needs to be done here.WLAN switch304 will be both the HA and the foreign agent (FA). However, if the VLAN has changed then the packets destined for the client should be forwarded to the CPU, which may modify it to reflect the correct VLAN tag.
FIG. 4 is adiagram illustrating layer3 roaming between two WLAN switches in accordance with an embodiment of the present invention. In this case, the client has roamed from anAP400 connected to afirst WLAN switch402 to anotherAP404 connected to asecond WLAN switch404. Here, the client's mobility context information should be moved fromWLAN switch402 to WLAN switch40. Then thefirst WLAN switch402, being the HA, should tunnel the client's traffic to thesecond WLAN switch406. Thesecond WLAN switch406 then should apply the client's policy to the port to which the client's associated AP is attached.
FIG. 5 is adiagram illustrating layer3 roaming followed by anotherlayer3 roaming involving 2 WLAN switches in accordance with an embodiment of the present invention. In this case, the client has roamed twice. After thefirst layer3 roam, thefirst WLAN switch500 will be both the HA and the FA. No tunneling is needed as the client is still connected to thesame WLAN switch500. However, VLAN tag addition or replacement may need to be performed. After thesecond layer3 roam, thesecond WLAN switch502 will become the new FA and the following should be performed. First, the client's mobility context information should be moved from thefirst WLAN switch500 to thesecond WLAN switch502. Thefirst WLAN switch500, being the HA, should then tunnel the client's traffic to thesecond WLAN switch502. Then thesecond WLAN switch502 should apply the client's policy to the port to which the client's associate AP is attached. Finally, thesecond WLAN switch502 should extract the packet from the IP in IP encapsulation, make the necessary VLAN changes, and forward the packet to the client.
FIG. 6 is adiagram illustrating layer3 roaming to a different WLAN switch followed by anotherlayer3 roaming back to the original WLAN switch in accordance with an embodiment of the present invention. In this case, the clientfirst layer3 roamed from anAP600 connected to afirst WLAN switch602 to anAP604 connected to asecond WLAN switch606. This part is the same as the case described byFIG. 4 and the accompanying text, and thus the same steps should be taken. On thesecond layer3 roam, the client gets associated with an AP (600, or possibly another AP) connected to theoriginal WLAN switch602. What is performed here depends on whether the client roamed back to the same VLAN. If so, then there is no FA. If not, then theoriginal WLAN switch602 will be both the HA and the FA.
FIG. 7 is adiagram illustrating layer3 roaming followed by anotherlayer3 roaming on 3 or more WLAN switches in accordance with an embodiment of the present invention. In this case, the client haslayer3 roamed twice. The first roam is similar to the case described byFIG. 4 and the accompanying text, and thus the same steps should be taken. On thesecond layer3 roam, the client's mobility context information should be copied from the HA (WLAN switch700) to the new FA (WLAN switch704). Then IP in IP tunneling of the client's traffic should be performed by the HA. The old FA (WLAN switch702) should then clean up the client's data structures.
FIG. 8 is adiagram illustrating layer3 roaming followed bylayer2 roaming involving 2 WLAN switches in accordance with an embodiment of the present invention. In this case, the client has first roamed fromAP800 toAP802, both of which are connected to thesame WLAN switch804. Next, the client roamed fromAP802 toAP806, which is connected to anotherWLAN switch808. After the first roam,WLAN switch804 is both the HA and the FA for the client, which is similar to the case described byFIG. 3 and the accompanying text, and thus the same steps should be performed. After thesecond layer2 roam, the case becomes similar to the case described byFIG. 2 and the accompanying text, and thus the same steps should be performed.
FIG. 9 is adiagram illustrating layer3 roaming followed bylayer2 roaming on 3 or more WLAN switches in accordance with an embodiment of the present invention. In this case, the client has first roamed from anAP900 connected toWLAN switch902 toAP904 connected to another WLAN switch906. Next, the client roams fromAP904 to AP908, which is connected to WLAN switch910. After the first roam,WLAN Switch902 is the HA and WLAN switch906 is the FA for the client, and this case is similar to that described byFIG. 4 and the accompanying texts, and thus the same steps should be performed. After thesecond layer2 roam, the WLAN switch910 becomes the new FA and the following should be performed. First, the client's mobility context information should be copied from the HA (WLAN switch902) to the new FA (WLAN switch910). IP in IP tunneling of the client's traffic should then be performed by the HA. Finally, the old FA (WLAN switch906) should clean up the client's data structures and any bridging information that it may have stored.
FIG. 10 is a flow diagram illustrating a method for responding to client roaming at a switch in accordance with an embodiment of the present invention. At1000, a move request may be received at the switch from an associated access point indicating that a client has associated with the access point. This may be, for example, a SAPP move message. Then, at1002, the switch may send a roam request to all peer switches in the mobility domain, including itself. This may be, for example, an ISRP roam request.
FIG. 11 is a flow diagram illustrating a method for handling a roam request from a switch in accordance with an embodiment of the present invention. This method may be run on any switch in the mobility domain, including the switch that sent the roam request in the first place. At1100, roam request may be received from a switch. This roam request may be, for example, an ISRP roam request. The roam request may include an indication of the client that has roamed. At1102, it may be determined if the client is known to this switch. This may include looking up the identification of the client in a table or similar data structure. If no such client can be found, then the roam request may simply be ignored. If on the other hand, the client is found, then at1104 it may be determined if the roaming being attempted islayer3 roaming. If so, then at1106 it may be determined if the switch is the same as the switch that sent the roam request. This may include, for example, seeing if the source network address of the roam request matches the network address of the switch. Such a case could occur if, for example, the client is roaming between two VLANs serviced by the same switch. If it is the same switch, then at1108 this switch may be set as the foreign agent. Then at1110, a VLAN tag corresponding to the client in a table or similar data structure may be updated with a new VLAN tag. This may act to change the VLAN that packets to this client will be forwarded to upon receipt by the switch.
If at1106 it was determined that the WLAN switch was not the same WLAN switch that sent the roam request, then at1112 it may be determined if the switch is the Home Agent for the client. If not, then at1114, information regarding the client may be removed from the switch. This may make it such that the client is no longer “known” to this switch. If, however, the switch is the Home Agent for the client, then at1116, traffic for this client may be tunneled to the switch that sent the roam request. Then, at1118, the switch may proxy for the client on the local (old) network. Finally, at1120, a roam reply indicating success may be sent to the switch that sent the roam request. This roam reply may include all network configuration information (e.g., IP address) for the client from the switch. This may be also be performed afterstep1110.
If at1104 it was determined that it was notlayer3 roaming (but instead waslayer2 roaming), then at1120, it may be determined if the switch is the same switch that sent the roam request. If not, then at1122, information regarding the client may be removed from the switch. Then the process may move to1118. If not, then the process may simply move to1118.
It should be noted that at1118, the switch may instead send a roam reply indicating failure if something went wrong during the process, such as the failure in tunnel establishment.
FIG. 12 is a flow diagram illustrating a method for handling a roam reply in a switch in accordance with an embodiment of the present invention. This method may be run on a switch that sent a roam request. At1200, a roam reply may be received. At1202 it may be determined if the roam reply indicates that the handling of a roam request was successful or not. If not, then at1204 a reply to the corresponding access point may be sent indicating failure. This may be sent via a SAPP reply. If the handling of the roam request was successful, then at1206, the switch may be set as the Foreign Agent. At this point, if the client attempts to send packets, it will likely still be referencing a router address located in the old domain. In order to remedy this, at1208 all Address Resolution Protocol (ARP) packets from the client should be trapped. Then at1210, an ARP reply may be sent to the client with this switch's default router address. This causes the client to correctly send out data traffic having a usable router address. Then at1212, a move reply may be sent to the corresponding AP. In this reply, the new VLAN identification may also be passed to the AP. This reply may be a SAPP reply. The AP may then start to tag the client's traffic with the new VLAN tag.
FIG. 13 is a block diagram illustrating an apparatus for responding to client roaming at a switch in accordance with an embodiment of the present invention. Amove request receiver1300 may receive a move request at the switch from an associated access point indicating that a client has associated with the access point. This may be, for example, a SAPP move message. Then, a roam requestpeer switch sender1302 coupled to themove request receiver1300 may may send a roam request to all peer switches in the mobility domain, including itself. This may be, for example, an ISRP roam request.
FIG. 14 is a block diagram illustrating an apparatus for handling a roam request from a switch in accordance with an embodiment of the present invention. This apparatus may be located on any switch in the mobility domain, including the switch that sent the roam request in the first place. A roamrequest receiver1400 may receive the roam request from a switch. This roam request may be, for example, an ISRP roam request. The roam request may include an indication of the client that has roamed. A knownclient checker1402 coupled to the roamrequest receiver1400 may determine if the client is known to this switch. This may include looking up the identification of the client in a table or similar data structure. If no such client can be found, then the roam request may simply be ignored. If on the other hand, the client is found, then alayer2 orlayer3roaming ascertainer1404 coupled to the knownclient checker1402 may determine if the roaming being attempted islayer3 roaming. If so, then a first switch second switchidentical discoverer1406 coupled to thelayer2 orlayer3roaming ascertainer1404 may determine if the switch is the same as the switch that sent the roam request. This may include, for example, seeing if the source network address of the roam request matches the network address of the switch. Such a case could occur if, for example, the client is roaming between two VLANs serviced by the same switch. If it is the same switch, then a first switchforeign agent setter1408 coupled to the first switch second switchidentical discoverer1406 may set this switch as the foreign agent. Then a virtualnetwork tag updater1410 coupled to the first switchforeign agent setter1408 may update a VLAN tag corresponding to the client in a table or similar data structure with a new VLAN tag. This may act to change the VLAN that packets to this client will be forwarded to upon receipt by the switch.
If it was determined that the WLAN switch was not the same WLAN switch that sent the roam request, then a first switchhome agent determiner1412 may determine if the switch is the Home Agent for the client. If not, then a client information remover1414 coupled to the first switchhome agent deteminer1412 may remove information regarding the client from the switch. This may make it such that the client is no longer “known” to this switch. If, however, the switch is the Home Agent for the client, then a secondswitch traffic tunneler1416 coupled to the first switchhome agent determiner1412 may tunnel traffic for this client to the switch that sent the roam request. Then the switch may proxy for the client on the local (old) network. Finally, a roamreply sender1418 coupled to the client information remover1414 and to the secondswitch traffic tunneler1416 may send a roam reply indicating success to the switch that sent the roam request. This roam reply may include all network configuration information (e.g., IP address) for the client from the switch.
If it was determined that it was notlayer3 roaming (but instead waslayer2 roaming), then it may be determined if the switch is the same switch that sent the roam request. If not, then a client information remover1420 coupled to thelayer2 orlayer3roaming ascertainer1404 may remove information regarding the client from the switch. If so, nothing special needs to be done.
It should be noted that the switch may instead send a roam reply indicating failure if something went wrong during the process, such as the failure in tunnel establishment.
FIG. 15 is a block diagram illustrating a method for handling a roam reply in a switch in accordance with an embodiment of the present invention. This apparatus may be located on a switch that sent a roam request. A roamreply receiver1500 may receive a roam reply . A successful roamreply determiner1502 coupled to the roamreply receiver1500 may determine if the roam reply indicates that the handling of a roam request was successful or not. If not, then a failure replyaccess point sender1504 coupled to thesuccessful reply determiner1502 may send a reply to the corresponding access point may be sent indicating failure. This may be sent via a SAPP reply. If the handling of the roam request was successful, then a foreignagent switch setter1506 coupled to the successful roamreply determiner1502 may set the switch as the Foreign Agent. At this point, if the client attempts to send packets, it will likely still be referencing a router address located in the old domain. In order to remedy this, a designatedrouter switcher1508 coupled to the foreignagent switch setter1506 may switch a router designated by the client with a default router for the switch. This may include an address resolutionprotocol packet trapper1510, which may trap all Address Resolution Protocol (ARP) packets from the client, and an address resolutionprotocol reply sender1512 coupled to the address resolutionprotocol packet trapper1510, which may send an ARP reply to the client with this switch's default router address. This causes the client to correctly send out data traffic having a usable router address. Then a move replyaccess point sender1514 coupled to the successful roamreply determiner1502 may send a move reply to the corresponding AP. In this reply, the new VLAN identification may also be passed to the AP. This reply may be a SAPP reply. The AP may then start to tag the client's traffic with the new VLAN tag.
While embodiments and applications of this invention have been shown and described, it would be apparent to those skilled in the art having the benefit of this disclosure that many more modifications than mentioned above are possible without departing from the inventive concepts herein. The invention, therefore, is not to be restricted except in the spirit of the appended claims.