摘要:
Example methods and apparatus to authenticate requests for network capabilities for connecting to an access network are disclosed. A disclosed example method involves receiving a request at a first access network. The request requests network connectivity information for connecting a wireless terminal to a second access network. The example method also involves encapsulating the request in an authentication frame. The authentication frame indicates the request as a white space protocol frame. The authentication frame is sent to a database addressed in the request.
摘要:
A method and apparatus for estimating location of wireless stations in a wireless communication network are provided. An estimation of a bearing angle of a wireless station from a reference point of a multi-beam antenna pattern is made based on a plurality of beaming angles of a multi-beam antenna pattern and a received signal property, at the wireless station, of each of a plurality of wireless signals transmitted on respective beams of the multi-beam antenna pattern for each of the plurality of beaming angles.
摘要:
A method and system for achieving a link budget improvement in a diverse OFDM radio system by addressing the timing misalignment issue that can occur due to the differences in propagation time in signals between mobile stations and Radio Access Nodes. Timing misalignment is shared or split between the primary path to a primary Radio Access Node and a diverse path to a diverse Radio Access Node. The relative timing offsets between mobile stations are adjusted, the mobile stations are grouped into zones using a variety of different grouping techniques, and the transmission for each mobile station is scheduled, using one or more of a variety of scheduling techniques.
摘要:
A method of detecting extra-system signals in a multi-node RLAN (radio local area network) involves: at each of a plurality of nodes in the RLAN, processing at least one respective received signal to produce detection results and deciding whether an extra-system signal has or has not been detected based on detection results of at least two of the plurality of nodes. The extra-system signal is for example a signal from a RADAR system. The detection results are produced using pulse pattern matching for example. Furthermore, in some implementations a decision as to whether an extra-system signal has or has not been detected is based on a comparison of a detection signature for at least two of the nodes to see if there is a substantial match. In some implementations the decision is further based on information representative of a direction of arrival of respective received signals.
摘要:
Security in wireless communication networks that employ relay stations to facilitate communications between base stations and mobile stations is enhanced. In one embodiment, resource information provided to one or more relay stations from a base station or another relay station is encrypted prior to being delivered to the one or more relay stations. Only authorized relay stations are allocated an appropriate key necessary to decrypt the resource information. As such, only appropriate relay stations are able to access and use the resource information to effect communications directly or indirectly between the base stations and the mobile stations. In certain embodiments, the resource information is delivered between the various base and relay stations using either unicast or multicast delivery techniques.
摘要:
A method and transceiver in a secondary system for utilizing channel bandwidths allocated to a primary system. A secondary system transceiver receives a primary system signal, re-transmits a delayed version of the primary system signal, and communicates with secondary system equipment utilizing secondary system signals within at least part of a bandwidth of at least one channel of the primary system. The re-transmission of the primary system signal allows the use of primary system channels by the secondary system without adversely affecting the primary or secondary system users.
摘要:
According to an aspect of the present invention one or more radio units of a wireless device are used to measure or detect clues about the radio propagation environment and type of space that surrounds a wireless device. From the measurements, the wireless device may determine the type of location that it is located within, whether that is simply a determination between inside and outside or a more complex determination of the type of building or space that the wireless device is located within. In either case, this determination can be used to automatically change/adjust the radio system operation parameters the wireless device operates in accordance with. With the type of location determined, a wireless device may then automatically select the appropriate radio system operation parameters for the type of location that it is in and the corresponding regulations that apply.
摘要:
A wireless network node and a network provide for automatic self-deployment of the radio frequency channels without the need for preplanning. Each wireless network node adapts to the inclusion of a new node and to changing local conditions without requiring manual configuration at deployment or re-deployment. When a node is added to the network, it scans and finds its neighbors, and enters a frequency self-selection phase of its initialization process. The method for frequency self-selection involves transmitting and receiving a sequence of messages to/from neighbors and performing related processing within the controller unit of the node. Three sets of parameters are used in the frequency self-selection algorithm. The three parameter sets include a routing cost function, the frequencies in use by neighbors (and those that may be blocked), and the antenna beams used for the respective frequencies.
摘要:
The cellular system has a radio access network comprising base stations and a controller to which a wireless local area network is linked. A terminal is authenticated with the cellular system through the radio access network, and in response an authentication token allocated thereto. The allocated token is transmitted from the controller to the terminal through the radio access network. The allocated token and an identifier of the terminal are further transmitted from the controller to an authentication server accessible through said wireless network. The terminal is authenticated with the wireless network by verifying that the terminal possesses the token transmitted to said authentication server.