摘要:
A method and apparatus for establishing security associations between nodes of an ad hoc wireless network includes two authentication steps: an initial first contact step (authentication, authorization, and accounting (AAA)-based authentication), and a “light-weight” step that reuses key material generated during first contact. A mesh authenticator within the network provides two roles. The first role is to implement an 802.1X port access entity (PAE), derive transient keys used for encryption with a supplicant mesh point via a four-way handshake and take care of back end communications with a key distributor. The second role is as a key distributor that implements a AAA-client and derives keys used to authenticate a mesh point during first contact or fast security association. The key distributor and the on-line authentication server can communicate to one another without these messages being transported over mesh links.
摘要:
A method (1000) and apparatus (110) determine a multimedia representation for a multimedia asset. The method includes receiving (1020) a multimedia asset request for a multimedia asset at a multimedia representation broker (110). The multimedia asset request is received from a specific client device (120). The multimedia asset request includes client device information about the specific client device (120). The method determines (1030), at the multimedia representation broker (110), a multimedia representation for use in providing the multimedia asset to the specific client device (120) based on the client device information and based on media representations appropriate for a client device context of the specific client device (120). The method outputs (1040) multimedia representation information corresponding to the multimedia asset for the specific client device (120) based on the determined multimedia representation.
摘要:
A method is used by a mesh point that includes one or more step of receiving one of a beacon and probe response from an other mesh point; setting a state of whether the mesh point is already synchronized with one or more peers to true and performing a beacon timing synchronization function when the mesh point is in the unsynchronized state and the other mesh point requests synchronization from a peer mesh point; adding an identity of the other mesh point to a database of beacon senders maintained by the mesh point and performing a beacon timing synchronization function when the mesh point and the other mesh point are both synchronized; and providing indications of whether the mesh point supports synchronization, requests synchronization from a peer mesh point, and is already synchronized with one or more peer.
摘要:
A method for priority-based admission control in a network, comprises receiving an admission request for transmitting an information flow to a network through a communication channel and determining an admissible region within a range of a channel data rate of a communication channel for an information flow in response to a priority of the information flow, where the priority of the information flow is one of a plurality of priorities of information flow. The admissible region is one of a plurality of admissible regions within the channel data rate range that correspond to different ones of the plurality of priorities of information flow, respectively, and each of the plurality of admissible regions within the channel data rate range is useable for transmitting information flow with a respective one of the plurality of priorities. Further included in the method is determining an available channel data rate of the communication channel for receiving the information flow by the network, and granting the admission request for the information flow after determining that the available channel data rate of the communication channel is within the admissible region of the channel data rate range.
摘要:
A method for accessing a wireless local area network (WLAN) channel and providing quality of service (QoS) for voice in a system supporting both voice and data services. Under the method, a communication device (302, 303) contends for a medium (channel). Upon identifying a transmit opportunity, the device transmits a voice packet to an access point (AP) (304) and polls the AP for downlink traffic. A low power implementation is feasible because the communication device can sleep, wake up to contend for the medium, transmit a voice packet to the AP, request a voice packet from the AP, transmit an acknowledgement, and go back to sleep.
摘要:
The disclosure relates to techniques and technologies for efficiently transporting management information between mesh nodes across multiple hops or “mesh links” in a multi-hop mesh network. These techniques and technologies are general purpose and provide an extensible mechanism for transporting management traffic across a mesh network. These techniques and technologies can be applied in a number of applications relating, for example, to security, routing, radio measurements, mesh node management, etc.
摘要:
The disclosure relates to techniques and technologies for establishing a secure link between a mesh authenticator and a mesh key distributor for transporting security association messages. The secure link can allow the mesh key distributor to communicate results of an authentication process to the mesh authenticator.
摘要:
A system and method for data transmission in an ad hoc wireless communication network is useful for improving network efficiency. The method includes determining whether both high priority data and low priority data are queued for transmission from a sending node to a receiving node (step 620). When both high priority data and low priority data are queued for transmission, the high priority data and the low priority data are aggregated in an aggregated data frame (step 625). Finally, the aggregated data frame is transmitted to the receiving node (step 630).
摘要:
An access point (11) for a wireless local area network (10) transmits a beacon message during a service interval period (21). This beacon message identifies, in a preferred embodiment, those subscriber units to whom the access point will shortly be transmitting data. Subscriber units that are not identified in the beacon message and that do not have data themselves to transmit to the access point can implement a power conservation mode of operation until the next beacon message. Subscriber units that have data, such as voice information, to transmit can utilize the beacon message contents to at least estimate a likely time by when the access point will have concluded making its transmissions to the subscriber units. That estimated time can then be used to facilitate scheduling a time at which a given subscriber unit will contend for an opportunity to transmit its data to the access point. In a preferred embodiment, this scheduled transmission time can potentially occur either during a contention window that follows the service interval period or during a dynamic contention window that follows the transmissions of the access point and concludes with the conclusion of the service interval period. Subscriber units can then use intervening periods of time to effect their power conservation schemes of choice.
摘要:
A method (1000) and apparatus (110) determine a multimedia representation for a multimedia asset. The method includes receiving (1020) a multimedia asset request for a multimedia asset at a multimedia representation broker (110). The multimedia asset request is received from a specific client device (120). The multimedia asset request includes client device information about the specific client device (120). The method determines (1030), at the multimedia representation broker (110), a multimedia representation for use in providing the multimedia asset to the specific client device (120) based on the client device information and based on media representations appropriate for a client device context of the specific client device (120). The method outputs (1040) multimedia representation information corresponding to the multimedia asset for the specific client device (120) based on the determined multimedia representation.