Abstract:
Systems and methods are disclosed which provide wireless communication systems implementing subsystems adapted for flexible deployment configurations and to resist the introduction of interference. Preferred embodiments of the present invention provide a wireless communication system configuration in which an ODU subsystem is coupled to an IDU subsystem using a fiber optic link. According to a preferred embodiment of the present invention, an ODU subsystem is adapted to provide conversion between digital and analog to thereby facilitate the use of a digital link between the ODU subsystem and a corresponding IDU subsystem. Embodiments of the present invention utilize a plurality of ODU subsystems configured according to the present invention to provide wireless communication coverage of a service area, such as to provide a wireless application termination system (WATS) hub for use in providing wireless communication links with respect to a plurality of subscriber units.
Abstract:
A method and apparatus for providing system clock failover using a one-shot circuit are disclosed. A process, in one embodiment, is able to detect a clock failure using a one-shot circuit, wherein the clock signals are generated by a first clock circuit. Upon generating a switching signal in response to the clock failure, a system reset signal is asserted for a predefined time period in accordance with the clock failure. After switching a second clock circuit to replace the first clock circuit, the process is capable of resuming the clock signals via the second clock circuit.
Abstract:
A system and method for synchronizing digital media playback at multiple digital media playback devices interconnected on a network is provided. A digital media playback device comprising a processor, a synchronization component, a timekeeper component and a digital media source performs synchronization processes to arrange for other players to begin playback at a predetermined position and time in the digital media signal. Synchronization is accomplished by processes which approximate the arrival time of a packet containing audio and/or video digital content across the network and instruct the playback devices as to when playback is to begin, and at what point in the streaming media content signal to begin playback. One method uses a time-stamp packet on the network to synchronize all players. Other methods utilize reiterative processes to narrow approximations of packet arrival time at each playback device.
Abstract:
Method for configuring a tunnel connection between a first gateway and second gateway. Configuration of the tunnel connection is completed at the first gateway in response to a user request. At the second gateway, a request is received from the user to configure the second gateway, and an identification of the first gateway is received from the user. A request for configuration information is sent from the second gateway to the first gateway. The first gateway authenticates the second gateway based on information received from the second gateway. The second gateway sends configuration information to the first gateway, and the second gateway is automatically configured, based on the configuration information received from the first gateway. Also described is a method of configuring an IPSec connection between a first gateway and a second gateway. Additionally a network system is described, which includes a first gateway, second gateway and logic to establish a tunnel connection.
Abstract:
Disclosed is a wireless node with a detachable antenna. When the antenna is detached, 802.11a lower band communications are disabled. When the antenna is attached, 802.11a lower band communications are enabled.
Abstract:
Disclosed is a wireless node with a detachable antenna. When the antenna is detached, 802.11a lower band communications are disabled. When the antenna is attached, 802.11a lower band communications are enabled.
Abstract:
Techniques, apparatuses, and systems for throughput estimation for a wireless device are disclosed. Throughput estimation includes generating network traffic for transmission between two nodes. The first node transmits the network traffic to the second node. The first node receives an acknowledgement from the second node that indicates successful receipt of the network traffic. The first node determines an amount of data successfully transmitted between the two nodes based on the reception of the acknowledgement. A throughput estimate is determined based on the amount of data successfully transmitted between the two nodes.
Abstract:
A method includes obtaining a set of wireless statistics of a wireless communication device and a set of hardware-related information of the wireless communication device. The method further includes determining a set of test results of a testbed system based on the set of wireless statistics and the set of hardware-related information by configuring the testbed system based on the set of wireless statistics and the set of hardware-related information. The method further includes updating a set of decision parameters of a wireless configuration decision model using a machine learning model based on the set of test results. The method further includes sending the updated set of decision parameters to the wireless communication device, wherein the wireless communication device configures a wireless configuration parameter based on an instance of the wireless configuration decision model configured with the updated set of decision parameters.
Abstract:
A multi-band network node has selectable backhaul/fronthaul configurations. Network nodes provide multi-band operation to take advantage of higher Internet speeds and to support lower latency (>2 Gbps,
Abstract:
In various aspects, code-based indicia contain secured network access credentials. In some aspects, a computer processor receives user input that specifies secured network access credentials, and the computer processor creates or modifies credentials for establishing a secured network connection. In these aspects, the computer processor generates code-based indicia that contain at least part of the secured network access credentials. In other aspects, a computer processor scans the code-based indicia and extracts the network access credentials. In these aspects, the computer processor employs the network access credentials to establish the secured network connection. In additional aspects, a network router apparatus renders the code-based indicia to an active display. In further aspects, a network router apparatus conditions grant of network access to a device on receipt from the device of an answer to a security question included in the secured network access credentials.