摘要:
A process for controlling the association of one terminal (201) to one particular access point (210, 220) belonging to a wireless network comprising a set of access points. The process comprises the steps of arranging at least two dedicated Wireless Measurement (Wimeter) devices (211, 221) located in the close vicinity of two respective access points (210, 220), said devices continuously computing an estimation of the available bandwidth for the dedicated access point; - arranging a centralized Radio Resources Management (RRM) device (299) for the purpose of collecting the results of said computation; - running a process of Access Point Association Control (APAC) for every new terminal (201) requesting access to the wireless network. The APAC procedure comprises the steps of: - capturing (401) the parameters of the visible access points; - associating (402) said new terminal (201) to the access point offering the higher level of signal ; - generating and transmitting (403) a RRM discovery request (RRM DISCOVERY REQUEST) for requesting benefit of service provided by said Radio Resources Management (RRM) device (299); - detection (404) of a RRM discovery reply (RRM DISCOVERY REPLY) from said RRM device (299) confirming access to said service; - in response to a query presented by a running application within said new terminal (201), generation and transmission (405, 406) to said Radio Resources Management (RRM) device (299) of a bandwidth request message (BANDWIDTH REQUEST) requesting allocation of given bandwidth resources; - waiting (407) for a bandwidth reply (BANDWIDTH REPLY) comprising information collected from said Wireless Measurement (Wimeter) devices (211, 221) associated to visible access point, said reply being prepared and forwarded by said Radio Resources Management device (299); - controlling (408) association to one particular access point based on said information forwarded by said Bandwidth reply message received from said RRM device (299).
摘要:
A process for transmitting and receiving information through a wireless communication channel comprising the steps of:
receiving a stream of databits of a given data rate applying one unique encoder for creating a set of U substreams of the same data rate than said stream of data bits; modulating each of said substreams in accordance with a modulation scheme; and transmitting each of said U substreams to one different transmission antennas. Preferrably, the U substreams are interleaved and randomly spreaded. In the receiver, the received signal is processed by means of a front-end matched filter in order to generate a first statistics of the said U sub-streams. There is then applied a controllable iterative interference cancellation process in order to suppress ISI and Self-MAI from said first statistics and, for each of the U sub-streams, deinterleaving and applying a parallel to serial processing. The serialized data stream is then input to a decoder, such as a Viterbi decoder, and a feedback loop regenerating U sub-streams is used to control the interference cancellor.
摘要:
Method of marking a multi-media document l orig by generating a mark from said document and a marking image I inf_0 , comprising the following steps:
decomposing the initial document l orig according to a lossy approximation method ; determining a reference image l ref ; point-by-point subtracting the initial document l orig and the reference image l ref. , and according to at least one vector representative of the image in order to produce a support image I s ; formatting the marking image I inf_0 so as to obtain an image I inf1 of the same size as the support image I s by pre-introducing at least one level of redundancy; point-by-point combining the marking image I inf_0 , formatted beforehand, with the support image so as to generate a mark or a signature which can be, according to the case, either filed, or internally reintroduced into the initial document l orig .
The combining of image I inf1 and support image I s produces a compact-sized mark which can be either stored or reintegrated within the document itself.
摘要:
This patent relates to a communication between a wireless base station with L transmit antennas and a set of receiving nodes equipped with caches so that content from a set of files can be stored in these caches. By formulating a novel way of setting users in groups and a way to store content partially as function of this grouping, this patent allows for increased gains in terms of number of users served simultaneously compared to the state-of-art. The approach taken here makes use of the multiple transmit antennas to boost the number of multicasting users, in some settings, by up to L times compared to the state-of-art, thus reducing significantly the transmission time. The invented solution allows for caching of file segments in such a way such that users belonging in the same group have high correlation of content, while lower correlation appears between the content inter-group caches. Moreover, the invention is, also, presented for the settings of i) wired communications, ii) cooperative communications between two or more base stations transmitting to a set of receiving nodes in either a wireless or a wired network and iii) in a device-to-device setting where users desire to exchange files between one another
摘要:
In the field of distributed computing, the communication that needs to be performed between the computing nodes or helper nodes, poses a major performance bottleneck. In order to reduce the time associated with this so-called shuffling phase of inter-node communication, it was recently proposed that the computational redundancy across the nodes be exploited to allow - via a specific type of coded communications - that each transmission becomes useful to more than one node at a time, thus significantly reducing the overall communication time. But the authors in this patent application here, have identified as a main bottleneck of such coded' current approaches, the fact that the input dataset to be processed for a given job, has to be split into an exponentially large number of smaller subsets, which is often impossible, thus significantly constraining the speedup gains attributed to coded communication. The inventors here have invented a new method of assigning data to the computing nodes, which dramatically alleviates the aforementioned bottleneck, thus resulting in dramatic reduction to the overall execution time of the distributed computing job.
摘要:
Process for the control of the Attachment of one mobile terminal to one particular Attachment Point belonging to one particular wireless technology. The process takes place in a general architecture which allows management of a number of different radio technologies and which can easily integrate future radio technologies. The process controls the association of one terminal having at least two radio interlaces which can each be associated to one particular Attachment Point belonging to one particular radio technology, such as WIFI, Wimax, UMTS etc... Each particular Attachment Point is associated to one particular Resource Controller which provides measurements related to the particular wireless communication for said AP. The measurements may include the bandwidth available and are reported to a Radio Resource Manager (RRM) which is specific to the given radio technology e.g. WIFI, WIMAX, UMTS. The information collected by the RRM belonging to the different radio technologies are reported to a Unified Radio Resource manager which can provide control information to a mobile terminal requesting connectivity to a wireless network with a given Quality of Service. The process executed between the mobile terminal and the above mentioned network architecture involves all the relevant network discovering steps and afterwards the attach procedure steps.
摘要:
Process for controlling the traffic of an adhoc wireless network including a plurality of nodes directly communicating with each other without the need of any access point comprising:
establishing at least one regulator within said wireless network for the control of a Time Division Multiplex Access (TDMA) with a TDMA frame including:
a first field (BCH) including a synchronization signal (REG SYNC) generated by the regulator and being broadcasted and further including slot allocation control information; a second field (MCH) including measurements information generated by the nodes; a third field (SACH) serving for the direct communication between two nodes, said third field being arranged in a plurality of slots with each slot defining temporal resource allocation;
computing within said regulator said MCH and deriving therefrom slot allocation control information to be inserted within said first field (BCH), thereby providing a first level of traffic control; computing within each particular node said BCH field and deriving therefrom transmission opportunities assigned to one particular node, said node keeping possibilities of control of sub-allocation of the transmission resources to different flows of data, thereby providing a second level of control of the traffic.
摘要:
A process for establishing fast intermittent connections between a moving system and external Access points, said moving system comprising a Wireless infrastructure Database of available Access Points, said process involving the steps of: - establishing a first infrastructure connection between said moving system and one access point, allowing one application running into said moving system to get intermittent access to the Internet network; - establishing a second adhoc connection between said moving system and a counterpart second moving system; - exchanging information/data with said second moving system relative to infrastructure parameters regarding available Access Points to be used for a subsequent infrastructure connection between said moving system and another one of said external Access Points which may be used by said application. In one embodiment, the first infrastructure connection at said moving system uses a first radio interface and said second adhoc connection uses a second radio interface. Alternatively, a same radio interface of the moving system may be switched between the infrastructure and adhoc mode.
摘要:
A process of securing communication between a first node and a second mobile node via a communication network involving the steps of:
establishing at first and at least a second communication link between said second node and one particular duplication and merging agent located within said network; performing at least one duplication of each packet within said second node going to said first node (and inversely performing at least one duplication of each packet within said duplication and merging agent going to said second node), and forwarding the duplicated packets via said first and said least second communication links in order to transmit the same information through at least two different routes; merging the duplicated packets within duplication and merging agent (and inversely merging the duplicated packets within said second node) for the purpose of suppressing redundancy of the packets.
摘要:
A Non-Receipt Repudiation protocol between the emitter, the receiver and a Trusted Third Party (TTP) which is based on the transmission to the receiver of a first envelope which comprises an encrypted version of the message or document , a hash function of said message, and a Validation Certificate (VC) creating an unique link between said message M, said key K and said emitter. More specifically, the protocol involves the steps of transmitting a first envelope from the emitter to the receiver, said first envelope including a first, a second, a third, a fourth and a fifth element. The first element consists of an optional identifier (H1). The second element consists of an encrypted form of said document or message [M] k . The third element consists of the hashing of said message M. The fourth element is formed by [K, h(M)] encrypted with the public key of the TTP. A fifth element consists of a Validation Certificate (VC) consisting of a signature of said emitter which is used for creating an unambiguous link between the original message M and the key K chosen and used by the originator for encrypting this message before the latter is transmitted to the recipient.