摘要:
There is provided a communications network comprising a network node and a resource limited node. The network node comprises a controller operable to estimate an optimal duty cycle for various operating modes of the resource limited node to minimise the overall resource consumption of the resource limited node; and a transmitter operable to notify parameters of the estimated optimal duty cycle to the resource limited node.
摘要:
A method, a network access node and a computer program product are disclosed. The method of estimating a distance between at least one network access node and a network node of a wireless communications network, comprises: measuring total path losses between the at least one network access node and the network node on at least two different frequencies; determining frequency-dependent path losses of transmissions by the at least one network access node on the at least two different frequencies; and estimating a distance between the network node and the at least one network access node using the total path losses and the frequency-dependent path losses on the at least two different frequencies. By measuring the total path losses between network nodes on different frequencies and using frequency-dependent path losses determined for those frequencies, it is possible to estimate the distance between network nodes. This effectively removes the effects of the frequency-dependent path losses for the different frequencies in order to estimate the distance between network nodes.
摘要:
A wireless communication network control node method for use in a wireless communication network comprising a plurality of nodes operable to directly sense other nodes, a computer program product and network control node operable to perform that method. The method comprises: determining for each node in the network, an indication of direct neighbour nodes; grouping the nodes into node clusters such that each node in the network belongs to one node cluster and each node in the same node cluster can directly sense all other nodes in that cluster, and selecting a set of node clusters such that the total number of node clusters in the network is minimised; assessing, for a selected network performance objective, how many simultaneous signals can be successfully decoded by a node in the network and calculating, based on the assessment, a simultaneous signal group number; comparing the number of node clusters in the selected set of node clusters with the calculated simultaneous signal group number; and modifying the selected set of node clusters in dependence upon the simultaneous signal group number. Arrangements described provide a method of clever network organization that combines CSMA approaches and Successive Interference Cancellation (SIC) processes to optimize overall throughput. Some arrangements introduce code-based carrier sensing to CSMA/ CA to enhance overall capacity.
摘要:
A method of establishing a set of user equipment verification credentials from an authentication protocol within a wireless communications network. The method comprises: triggering release of an indication of identity by the user equipment; authenticating the user equipment identity using the authentication protocol, and establishing a shared set of user equipment verification credentials for future validation of the authenticated user equipment identity. The future validation method comprises verifying an identity of an authenticated user equipment operating within a wireless communications network by: receiving an indication of a shared set of user equipment verification credentials, established from prior authentication of the user equipment identity using an authentication protocol; interrogating the user equipment using the indication of a shared set of user equipment credentials; receiving a response from the user equipment; and verifying the identity of the authenticated user equipment if the received response matches that predicted by the indication of a shared set of user equipment verification credentials. Embodiments take mechanisms of authentication and subsequent integrity/cipher protection and use them for fast secure UE identification. This allows a UE to be used for example, for opening a door, making a point of sale payment at a retail store or giving out address details, all by swiping a phone past a sensor.