Abstract:
A method of encoding data for transmissions from a source to a destination over a communications channel is provided. The method operates on an ordered set of source symbols and may generate zero or more redundant symbols from the source symbols, wherein data is encoded in a first step according to a simple FEC code and in a second step, data is encoded according to a second FEC code, more complex than the first FEC code. The first FEC code and/or the second FEC code might comprise coding known in the art. These steps result in two groups of encoded data in such a way that a low-complexity receiver may make use of one of the groups of encoded data while higher complexity receivers may make use of both groups of encoded data.
Abstract:
Emulating a tag reading environment includes accessing a virtual tag reading system of a virtual environment. The virtual tag reading system includes a virtual antenna operable to detect virtual tags. At least one virtual tag is inserted into the virtual environment. The virtual tag is subjected to a field of the virtual antenna. A response of the virtual tag reading system to the virtual tag is monitored.
Abstract:
A method of encoding data operates on an ordered set of input symbols and includes generating redundant symbols from the input symbols, and includes generating output symbols from a combined set of symbols including the input symbols and the redundant symbols, wherein the number of possible output symbols is much larger than the number of the combined set of symbols, wherein at least one output symbol is generated from more than one symbol in the combined set of symbols and from less than all of the symbols in the combined set of symbols. The redundant symbols are generated from an ordered set of input symbols in a deterministic process such that a first set of static symbols calculated using a first input symbol has a low common membership with a second set of static symbols calculated using a second input symbol distinct from the first input symbol.
Abstract:
An electromagnetically operable rotary shutter is rendered bi-stable by the use of two linear electric motors, one to open the shutter and a second to close the shutter together with a latch that holds the shutter in either an open or a closed position in the absence of power to purposefully open or close the shutter.
Abstract:
Data is streamed from a transmitter to a receiver, wherein streaming is transferring data with an assumption that the receiver will begin using the data before it is all transmitted and received and the streamed data includes forward error correction (“FEC”) and the rates of data consumption can vary. The transmitter has an input rate and a transmit rate and the two rates can be different and can change. At the receiver, there is a reception rate (at which the receiver receives data) and a consumption rate (at which the receiver uses up data for its output). The transmitter transmits using a transmit rate higher than the consumption rate and the extra bandwidth is usable for FEC protection and buffering. In some embodiments, the excess rate varies over a transmission period.
Abstract:
The present invention is concerned with situations in which call signalling follows an indirect path between an originating party and a destination party. Such an indirect path can occur when multi-homed communications networks are used. For example, where a service is provided to an enterprise which has a private address domain and that service is hosted by a service provider whose equipment is located in a public address domain connected to the enterprise domain by two or more address translators. Previously, in this type of situation, resulting media paths also follow the indirect path of the call signalling. This is wasteful of network resources. The present invention enables a direct media path to be set-up. This is achieved by enabling network address translators between two address domains to retain information in call set-up messages about the relevant address in the previous address domain and also by adding network identifier information to call set up messages.
Abstract:
According to one aspect of the present invention there is provided a method of preparing second protocol data for transmitting over a first protocol network comprising the steps of compressing the data to be transmitted in accordance with the first protocol, to produced first protocol compressed data and encrypting the first protocol compressed data in accordance with the first protocol to produce first protocol compressed and encrypted data. The invention consists of a means for the client to indicate to the first hop proxy that it wishes S/MIME encryption to be applied to part of an outgoing message. The first hop proxy then applies this encryption on behalf of the client. The encryption is therefore applied after the message has traversed the end terminal link. On the first proxy link, the message is sent without S/MIME encryption and can therefore benefit from compression (before the first hop IPSEC encryption is applied). A second aspect of the invention allows the support of end-to-end compression to be negotiated between end devices so that SIP compression can be applied to data before it is encrypted using S/MIME by the end system.
Abstract:
An electromagnetically operable rotary shutter is rendered bi-stable by the use of two linear electric motors, one to open the shutter and a second to close the shutter together with a latch that holds the shutter in either an open or a closed position in the absence of power to purposefully open or close the shutter.
Abstract:
The present invention divides the recording head into multiple sections, each section accessing a subset of the total number of channels arranged such that one section reads and writes only a subset of the data channels. The sections may be either independently actuated for both coarse (data band) and fine (track-following) positioning, or linked by a common actuator for data band positioning with independent fine position actuators for fine track following.
Abstract:
The invention is directed to a method and apparatus for decoding encoded data symbols. The invention is also directed to corresponding encoding methods. The decoder arrangement comprises an input for receiving encoded data and an identifier associated with a coding scheme used to create said encoded data. A processor in the decoding arrangement determines from the identifier, a mapping between said encoded data and the original data. A decoder uses the mapping to extract the original data from the encoded data. The operation of the decoder is independent of the coding scheme used in the encoding process.