摘要:
Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updated key is encrypted using the broadcast key and provided periodically to a user. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key.
摘要:
Operating at least one low duty cycle (LDC) controller to maintain synchronization between the LDC controller and a plurality of LDC terminals operating over a communication network using only overhead channels of the network and conforming to the protocol and timing of said network, wherein synchronization between the LDC controller and the plurality of LDC terminals is maintained separately from the protocol and timing of the communication network, and enables the LDC controller to schedule power down and wake up of the plurality of LDC terminals for durations longer than allowable under the protocol and timing of the communication network.
摘要:
A method and system provides for efficient data throughput by avoiding unnecessary data sub-packets transmission while not missing new data packets. The method and system distinguishes between a sub-packet for a current data packet and a sub-packet for a new data packet by assigning different codes to them. When a currently received sub-packet and a previously received sub-packet for a previously decoded data packet have equivalent codes, the remote station sends an acknowledgement signal to the base station, preventing unnecessary sub-packets transmission. When the currently received sub-packet and the previously received sub-packet have different codes, the remote station sends an acknowledgement signal, if the remote station can decode the new packet from the current sub-packet. Otherwise, the remote station sends a negative acknowledgement signal to the base station, and requests more sub-packs for the current packet if the limit on number of transmission for currently received sub-packet has not reached.
摘要:
A user terminal establishes a session with a first access point (AP0) and obtains a token associated with modem configuration information used for radio communication. The user terminal thereafter establishes a connection with a second access point (AP1) by sending the token. AP1 receives the token, obtains the modem configuration information associated with the token, and initializes an air interface protocol stack with the modem configuration information to obtain a modem-specific protocol stack for the user terminal. AP1 sends a response indicating successful connection setup. The user terminal and AP1 thereafter communicate in accordance with the modem-specific protocol stack. AP1 may attempt to fetch the session for the user terminal from AP0. If this is successful, then AP1 updates the protocol stack with the session information to obtain a complete protocol stack for the user terminal. The user terminal and AP1 thereafter communicate with the complete protocol stack.
摘要:
To access a first communication system, a terminal determines a transmission time for an access probe, an expected response time from the system, and a protected time interval based on the transmission time and/or expected response time. The terminal determines a starting time for sending the access probe such that the protected time interval does not overlap a tune-away interval in which the terminal is to monitor anther frequency/air-interface. This starting time may be set initially to the end of a prior access probe plus a pseudo-random wait duration and may be advanced forward or moved backward in time, if needed, by a time duration selected such that the protected time interval does not overlap the tune-away interval.
摘要:
Techniques to determine whether or not a terminal is under the coverage of a current wireless communication system (e.g., a packet data system) and to switch from the current system to another wireless communication system (e.g., a voice/data system). In one method, at least one measurement of at least one parameter for at least one base station in the current system is initially obtained. The measurement(s) may be SNR measurements. A metric is derived based on the measurement(s) and used (typically along with a metric threshold and a timer) to determine whether or not the terminal is within the coverage of the current system. A switch to another system is initiated if the terminal is deemed to be outside the coverage of the current system. The two systems provide at least one common service (e.g., packet data service).
摘要:
In a wireless communication system where different frequency bands are deployed to generate various communication zones, pilot signal set management for a plurality of pilot signals generated from an additional coverage zone is based on identifying a preselected signal set from the plurality of pilot signals and determining whether a predetermined criterion is met.
摘要:
Techniques for dynamically varying coverage in a multi-carrier communication system are described. A sector may operate on multiple carriers. The sector may vary coverage on a given carrier k based on its load, so that less interference may be caused to other sectors when the sector load is light. In one design, the sector may communicate on a first carrier at a first transmit power level and on a second carrier at a second transmit power level equal to or lower than the first transmit power level. The sector may vary the second transmit power level based on its load to vary the coverage of the second carrier. The sector may reduce the second transmit power level to zero or a low level if the sector load is light. The sector may also vary the second transmit power level based on a function of sector load or a switching pattern.
摘要:
Techniques for managing the load of an access channel in a wireless communication system are described. In an aspect, the load of the access channel may be controlled by having each terminal regulates its use of the access channel (e.g., its rate of system access) based on a rate control algorithm (e.g., token bucket). The rate control algorithm may maintain information on past activities of a terminal and may regulate the use of the access channel by the terminal based on its past activities in order to control the access channel load and achieve fairness. The system may determine at least one parameter value for the rate control algorithm based on load conditions and may broadcast the at least one parameter value to terminals. Each terminal may regulate its use of the access channel based on the at least one parameter value received from the system.