Detecting device presence for a layer 3 connection using layer 2 discovery information
First Claim
1. A method of a first device accessing functionality on a second device, the method comprising:
- monitoring for presence of the second device using a layer-2 discovery mechanism without forming a layer-3 connection between the first device and the second device;
based on the monitoring, establishing a layer-3 connection with the second device;
transmitting information related to the functionality of the second device over a layer-3 connection to the second device;
receiving from the second device a response to the layer-3 discovery protocol message; and
based on information in the response, accessing the functionality of the second device over a layer-3 network.
2 Assignments
0 Petitions
Accused Products
Abstract
Techniques for monitoring presence of a remote device at Layer 2 that allow reducing power consumption without compromising the device'"'"'s availability. A device that pairs with a remote wireless device may establish a Layer 3 connection, such as an IP connection, to the remote device to provide services to a user. The Layer 3 connection may be formed over a Layer 2 connection via an access point or as a peer-to-peer wireless connection between the devices. When the Layer 3 connection is not actively used to access the remote device, the Layer 3 connection and the supporting Layer 2 connection (e.g., WI-FI, WI-FI DIRECT™ or BLUETOOTH®) may be terminated and presence of the remote device may be monitored using a Layer 2 device discovery mechanism. The Layer 2 and Layer 3 connections to the device may be reestablished when use of the remote device is desired.
-
Citations
20 Claims
-
1. A method of a first device accessing functionality on a second device, the method comprising:
-
monitoring for presence of the second device using a layer-2 discovery mechanism without forming a layer-3 connection between the first device and the second device; based on the monitoring, establishing a layer-3 connection with the second device; transmitting information related to the functionality of the second device over a layer-3 connection to the second device; receiving from the second device a response to the layer-3 discovery protocol message; and based on information in the response, accessing the functionality of the second device over a layer-3 network. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of a first computing device accessing application-level functionality executing on a second computing device, the method performed by the first computing device and comprising:
-
monitoring for presence of the second computing device using a wireless link-level advertisement, the monitoring performed while there is no network-level connection between the first computing device and the second computing device; based on the monitoring detecting the second computing device, establishing a network-level connection between the first computing device and the second computing device; transmitting a message comprising information indicating the application-level functionality of the second computing device over the network-level connection, the message received by the second computing device; receiving from the second computing device a response to the message, the response comprising information identifying the application-level functionality or a link to information about the application-level functionality; and based on the information in the response, accessing the application-level functionality on the second computing device over the network-level connection. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computing device comprising:
-
a layer-2 protocol module configured to monitor for a second device using a layer-2 discovery mechanism without forming a layer-3 connection with between the first device and the second device, the layer-2 discovery mechanism implemented by the layer-2 protocol module and comprising layer-2 advertisements configured to be transmitted without requiring existence or formation of a pairing or connection according to the layer-2 protocol; a layer-3 protocol module configured to, based on the monitoring, establish and manage a layer-3 connection with the second device; storage hardware storing instructions configured to cause processing hardware of the computing device to cause a message to be transmitted to the second device, the message comprising information related to functionality of the second device; the layer-3 protocol module further configured to receive, from the second computing device, a response to the message; and the instructions further configured to, based on information in the response, access the functionality of the second device over the layer-3 connection. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification