Abstract:
Methods and systems for connecting isolated networks. One method includes storing, in a database of a network core, information related to a first set of communication devices associated with a first radio access network and a second set of communication devices associated with a second radio access network. The method further includes communicating between the network core and a transceiver of the first radio access network via an interface. The method further includes communicating, via the interface, between the network core and a virtual transceiver that represents an actual transceiver of the second radio access network.
Abstract:
A method and apparatus for moving network equipment is provided herein. During operation, an optimal base station configuration will be determined. Currently-employed network equipment will be moved based on a determination if adequate coverage will be provided to users of the system.
Abstract:
Disclosed herein are methods and systems for node operation according to network-wide resource-allocation schedules. One embodiment takes the form of a method carried out by a given node within an ad-hoc wireless network, which includes a controller node for a current time period. The method includes obtaining one or more air-interface resource requests for the current time period, where each obtained resource request indicates a requesting node and a requested resource. The method further includes using a network-standard algorithm for deriving a network-wide resource-allocation schedule for the current time period based at least in part on the obtained resource requests. The method further includes verifying the derived resource-allocation schedule based at least in part on a verification value derived by the controller node from the network-wide resource-allocation schedule using a network-standard verification function. The method also includes operating according to the verified resource-allocation schedule for the current time period.
Abstract:
A lossless call may be established over a wireless radio network by determining, at a target subscriber device during a received call, that one or more identified media items in a stream of media items of the call being received over a first radio channel was not successfully received, and responsively: continuing to receive first subsequent media items of the call and buffering, instead of rendering at the target subscriber device, the first subsequent media items, requesting the identified media items, receiving by the target subscriber device via an established second radio channel, different from the first radio channel, the identified media items, re-ordering the identified media items chronologically with respect to the buffered first subsequent media items to create the re-ordered subsequent media stream, and rendering, by the target subscriber device, the re-ordered subsequent media stream at a first increased relative rate.
Abstract:
An inter-device interference mitigation system, method, and device. The device includes a first transceiver, a second transceiver, and an electronic processor. The electronic processor is configured to receive an interference policy and receive information from a second electronic communications device to determine an interference potential. The electronic processor compares the interference potential to a predetermined interference threshold. When the interference potential exceeds the predetermined interference threshold, the electronic processor performs at least one action selected from the group consisting of adjusting a power output of the first transceiver, generating a user notice including instructions to move or adjust an operation of either one or both of the electronic communications device and the second electronic communications device, affecting an operation of an application present on either one or both of the electronic communications devices, and modifying a transmission of either one or both of the electronic communications devices.
Abstract:
A method and apparatus for magnetic interference compensation of an embedded magnetometer. One embodiment provides a method for operating a mobile communications device that includes an electronic processor, a memory, and a magnetometer. In one exemplary embodiment, the method includes determining, by the electronic processor, an operational mode for the mobile communication device. The method further includes retrieving, from the memory and based on the operational mode, at least one predetermined calibration parameter. The method further includes obtaining, from the magnetometer, a magnetic field reading, and determining, by the electronic processor, a calibrated magnetic field value based on the magnetic field reading and the at least one predetermined calibration parameter.
Abstract:
A method and a system for operating a subscriber unit to seamlessly switch between a trunked mode operation (TMO) and a direct mode operation (DMO) in a communication system. The communication system includes one or more subscriber units communicating in trunked mode operation on a first communication channel via a base station and the subscriber units communicating in direct mode operation on a second communication channel via a direct mode gateway station. When the subscriber units communicate in the TMO and when the signal quality on the first communication channel is below the predetermined threshold, the subscriber units automatically switch to the direct mode operation. When the subscriber units communicate in DMO and when the signal quality on the second communication channel is below the predetermined threshold, the subscriber units automatically switch to the trunked mode operation.
Abstract:
An inter-device interference mitigation system, method, and device. The device includes a first transceiver, a second transceiver, and an electronic processor. The electronic processor is configured to receive an interference policy and receive information from a second electronic communications device to determine an interference potential. The electronic processor compares the interference potential to a predetermined interference threshold. When the interference potential exceeds the predetermined interference threshold, the electronic processor performs at least one action selected from the group consisting of adjusting a power output of the first transceiver, generating a user notice including instructions to move or adjust an operation of either one or both of the electronic communications device and the second electronic communications device, affecting an operation of an application present on either one or both of the electronic communications devices, and modifying a transmission of either one or both of the electronic communications devices.
Abstract:
Methods and systems for connecting isolated networks. One method includes storing, in a database of a network core, information related to a first set of communication devices associated with a first radio access network and a second set of communication devices associated with a second radio access network. The method further includes communicating between the network core and a transceiver of the first radio access network via an interface. The method further includes communicating, via the interface, between the network core and a virtual transceiver that represents an actual transceiver of the second radio access network.
Abstract:
A method and apparatus for operating a communication system that includes a plurality of base stations. The method includes receiving a route, the route including an array of locations and times. The method further includes determining a plurality of modulation schemes by determining at least one modulation scheme for each of the plurality of base stations. The method further includes determining a quality of service having a guaranteed bit rate. The method further includes determining an allocation scheme based on the route, at least one of the plurality of modulation schemes, and the guaranteed bit rate. Wherein determining the allocation scheme includes allocating an amount of resources such that a consumed bit rate is substantially constant with respect to the guaranteed bit rate.