摘要:
Signal, e.g., message, security techniques are described for wireless systems. A first signal is received by an access node via a wireless link. The signal includes a first authenticator that was generated by the transmitting device, e.g., wireless terminal. The access node determines from an attribute of the signal at least some information known to both the access node and transmitting device but which was not transmitted as part of the message content. The determined information was used by the wireless terminal in generating the first authenticator. The access node sends at least a portion of the first signal including the first authenticator and the determined information to another entity. The entity compares the first authenticator to a second authenticator it generates from the determined information and a secure key which it shares with the transmitting device to determine if the first and second authenticators match.
摘要:
Pilot signal transmission sequences and methods are described for use in a multi-sector cell. Pilots in different sectors are transmitted at different known power levels. In adjacent sectors a pilot is transmitted while no pilot is transmitted in the adjoining sector. This represents transmission of a NULL pilot signal. A cell NULL is also supported in which NULL pilots are transmitted in each sector of a cell at the same time. Multiple pilot signal measurements are made. At least two channel quality indicator values are generated from measurements corresponding to at least two pilot signals of different power levels. The two values are transmitted back to the base station which uses both values to determine the transmit power required to achieve a desired SNR at the wireless terminal. The wireless terminal also reports information indicating its location to a sector boundary.
摘要:
In a wireless multiple access communications system (Fig. 1) the channel resource is managed partitioning the channel resource into an acknowledgment channel and a traffic channel in a fixed manner, each of which carries its respective segments (Fig. 3). A traffic segment (Fig, 2, #202) is the basic resource unit to convey data, and has a prescribed finite time interval and bandwidth. Each traffic segment is associated with an acknowledgment segment in a one-to-one manner (Fig. 3). The acknowledgment segment conveys acknowledgment information of the associated traffic segment (Fig. 5, 502), and both the base station (Fig, 1, #101) and the wireless terminals (Fig. 1, #103-1…Y) use the acknowledgment segment to acknowledge associated traffic segments. The base station and the wireless terminal monitors all the acknowledgment segments associated with the segments it transmitted (Fig, 5, #503) and determines if any segments need to be retransmitted (Fig, 5, #504). The wireless terminal also performs retransmission of its respective segments (Fig. 6).
摘要:
The use of multiple states of mobile communication device (14) operation to allow a single base station (12) to support a relatively large number of mobile nodes (14, 16) is described. The various states require different amounts of communications resources, e.g., bandwidth. Four supported states of operation are a on-state (404), a hold-state (410), a sleep-state (408), and an access-state (402). Each mobile node in the on-state (404) is allocated communication resources to perform transmission power control signaling, transmission timing control signaling and to transmit data as part of a data uplink communications operation. Each mobile node in the hold-state (410) is allocated communication resources to perform transmission timing control signaling and is provided a dedicated uplink for requesting a state transition and a shared resource for transmitting acknowledgements. In the sleep state (408) a mobile node is allocated minimal resources and does not conduct power control signaling or timing control signaling.
摘要:
The use of multiple states of mobile communication device (14) operation to allow a single base station (12) to support a relatively large number of mobile nodes (14, 16) is described. The various states require different amounts of communications resources, e.g., bandwidth. Four supported states of operation are a on-state (404), a hold-state (410), a sleep-state (408), and an access-state (402). Each mobile node in the on-state (404) is allocated communication resources to perform transmission power control signaling, transmission timing control signaling and to transmit data as part of a data uplink communications operation. Each mobile node in the hold-state (410) is allocated communication resources to perform transmission timing control signaling and is provided a dedicated uplink for requesting a state transition and a shared resource for transmitting acknowledgements. In the sleep state (408) a mobile node is allocated minimal resources and does not conduct power control signaling or timing control signaling.
摘要:
A method and apparatus for providing uplink macro-diversity in packet-switched networks that allows packets and/or portions of packets, e.g., frames, to be selectively sent from an end node (200), e.g., wireless communication device or mobile terminal, over a set of multiple communication connections, e.g., physical-layer or link-layer connections, to one or more access nodes (300), e.g. base stations. Uplink macro-diversity is achieved in part through intelligent selective forwarding over multiple communication connections (402-404), e.g., physical-layer channel conditions and/or higher layer policy. The forwarding decision executed on a rapid timescale, e.g. on a per packet basis, to adapt to the dynamically carrying conditions of the set of communication connections (402, 404).
摘要:
Methods and apparatus for routing messages between an end node and an access node via another access node are described. Physical layer identification information is used when identifying a remote, e.g., adjacent, access node as a message destination. Thus, when a connection identifier based on one or more physical layer identifiers is available to a wireless terminal, e.g., from one or more downlink signals received from a destination access node, the wireless terminal can use the connection identifier corresponding to the destination node to route a message via an access node with which it has an established uplink connection. Such connection identifier information can be used even when other addressing information, e.g., network layer address information, associated with the destination access node, may not be available to the wireless terminal.
摘要:
Methods and apparatus for using end nodes, e.g., wireless terminals, to discover base stations and communicate information about discovered access nodes, e.g., base stations, to other access nodes in a system are described. As the wireless terminal roams in the system and new access nodes are encountered, one or more physically adjacent access nodes will be informed of the presence of the new access node as a result of communications with the wireless terminal. A message indicating an access node's inability to route a message to another access node which is known to a wireless terminal may trigger the wireless terminal to begin the process of updating access node routing and neighbor information.
摘要:
Methods and apparatus for routing messages between an end node and an access node via another access node are described. Physical layer identification information is used when identifying a remote, e.g., adjacent, access node as a message destination. Thus, when a connection identifier based on one or more physical layer identifiers is available to a wireless terminal, e.g., from one or more downlink signals received from a destination access node, the wireless terminal can use the connection identifier corresponding to the destination node to route a message via an access node with which it has an established uplink connection. Such connection identifier information can be used even when other addressing information, e.g., network layer address information, associated with the destination access node, may not be available to the wireless terminal.
摘要:
A stream of modulation symbols from a zero symbol rate (ZSR) coding/modulation module and a stream of modulation symbols from another type of coding/modulation module are input into an interweaver module. The interweaver module mixes the two input streams when assigning modulation symbols to be communicated in a segment. If a ZSR modulation symbol is non-zero, the ZSR modulation symbol is allocated a transmission position. If the ZSR modulation symbol is a zero modulation symbol, the modulation symbol from the other coding/modulation module is allocated the transmission position. The non-zero modulation symbols from the ZSR module are higher in power than the non-zero modulation symbols from the other module, thus facilitating detection and recovery.