主权项 |
1. A system comprising:
a CPU, a computer readable memory and a computer readable storage medium; program instructions to scan for available secondary wireless networks; program instructions to establish a result table set up such that at least one of closest proximity network connections and stronger wireless signals appear in the result table for the available secondary wireless networks in an order from at least one of closest to farthest and strongest to weakest, respectively, wherein the result table includes price listings of the available secondary wireless networks; program instructions to connect the wireless device with a selected one of the available secondary wireless networks based on which one of the available secondary wireless networks is either closest or strongest while the wireless device is still connected to the primary wireless network; program instructions to determine, after the wireless device has been connected to the selected secondary wireless network, whether the selected secondary wireless network is cheaper than the primary wireless network; and program instructions to determine whether to disconnect the wireless device from the selected secondary wireless network or the primary wireless network based upon a comparison of differences in at least one of price, proximity and signal strength of the selected secondary wireless network and the primary wireless network, wherein, after determining whether to disconnect the wireless device from the selected secondary wireless network or the primary wireless network, the wireless device will be connected only to one of the primary wireless network or the selected secondary wireless network, program instructions to compare the available secondary wireless networks to a history table providing data for previously used wireless networks used by the wireless device in the past, and selecting one of the available secondary wireless networks over other available secondary wireless networks if it is listed on the history table, wherein the history table includes unique identifiers of the previously used wireless networks, actual connection types of the previously used wireless networks, MAC or IP addresses of the previously used wireless networks, and indications whether the previously used wireless networks are encryption enabled or disabled, and wherein the program instructions are stored on the computer readable storage medium for execution by the CPU via the computer readable memory. |