Abstract:
A system for identifying an optimal route in a network is disclosed. The system includes a destination node having an associated node address, a source node having an associated node address, and a number of intermediate nodes each having an associated node address. The intermediate nodes include a number of neighboring nodes associated with the source node. The node addresses associated respectively with the destination node and the intermediate nodes include location information associated respectively with the destination node and the intermediate nodes. The source node is configured to select one or more of the neighboring nodes to receive a route request. The selection of the selected one or more neighboring nodes is based on the location information associated with the destination node and the selected one or more neighboring nodes. One or more of the selected one or more neighboring nodes propagate their route requests received from the source node to the destination node along one or more routes. Each of the one or more routes includes one or more of the intermediate nodes. The destination node is configured to receive the route requests propagated by one or more of the selected one or more neighboring nodes, the route requests respectively identifying the one or more routes, and select the optimal route from the one or more routes based on the received route requests.
Abstract:
A wireless networking system uses mobile and fixed transceivers to achieve a network with changing topology. A routing process includes quality-of-service considerations in the network to allow for features such as file or other data transfer, streaming audio and video, digital telephone communications, etc. The routing process adapts to transceiver units entering, leaving, or moving within, the network. Auxiliary networks such as the Internet, campus or corporate intranets, home networks, etc., can be accessed through the wireless network. Features, designs and user interfaces for the units are described. Security and access control of media content and other data is presented.
Abstract:
A method of producing a screen for forming a nonwoven material by hydroentanglement. The method includes the steps of providing a layer of radiation curable polymeric resin material in fluid form. Further, the step of irradiating at least one layer of radiation curable polymeric resin material in fluid form through at least one mask selectively transparent to the radiation, so as to effect at least partial curing of the material of the at least one layer in positions corresponding with radiation-transparent regions of the mask. Further still, the step of removing uncured polymeric material to form one or more apertures within the at least one layer. Wherein the radiation-transparent regions of the mask have different sizes and shapes and are distributed randomly, such that the one or more apertures provided in the cured polymeric material of the screen are not provided in a regular pattern or form.
Abstract:
A communication system formed by a private network that includes a private wireless network. The communication system includes a public wireless network using a public wireless protocol, such as GSM, and includes public networks, such as PSTN, ISDN and the Internet, using a wired protocol, such as 1P. The private network also includes a local area network (LAN) and the private network connects to the public networks using a wired packet protocol, such as IP. The public and private wireless networks operate with the same public wireless protocol, such as GSM, and the private wireless network additionally operates with a wired packet protocol, such as IP. The communication system permits users to operate freely in both public and private wireless networks using standard mobile stations while achieving high private network data rates. The communication system uses normal wireless handsets or other mobile or fixed stations without need for any modifications.
Abstract:
Error bursts are detected and corrected in a communication system using shortened cyclic codes, such as shortened Fire codes. Data is loaded into a first error syndrome register and a second error syndrome register. The data in the registers may be evaluated to determine if the data bits contain a correctable error. Shortened zero bits are shifted into the second error syndrome register. A number of zero bits are shifted into the first error syndrome register to trap an error burst pattern in the data. A determination is made as to the number of zero bits shifted into the second error syndrome register to trap the location of the error burst in the data. Using the number of zero bits shifted into the second error syndrome register and the error burst pattern, the error in the data is located and corrected.
Abstract:
A wireless networking system uses mobile and fixed transceivers to achieve a network with changing topology. A routing process includes quality-of-service considerations in the network to allow for features such as file or other data transfer, streaming audio and video, digital telephone communications, etc. The routing process adapts to transceiver units entering, leaving, or moving within, the network. Auxiliary networks such as the Internet, campus or corporate intranets, home networks, etc., can be accessed through the wireless network. Features, designs and user interfaces for the units are described. Security and access control of media content and other data is presented.
Abstract:
A wireless networking system uses mobile and fixed transceivers to achieve a network with changing topology. A routing process includes quality-of-service considerations in the network to allow for features such as file or other data transfer, streaming audio and video, digital telephone communications, etc. The routing process adapts to transceiver units entering, leaving, or moving within, the network. Auxiliary networks such as the Internet, campus or corporate intranets, home networks, etc., can be accessed through the wireless network. Features, designs and user interfaces for the units are described. Security and access control of media content and other data is presented.
Abstract:
A method for determining direction of transmission using an antenna array having a number of panels is disclosed. Each panel is configured to receive signals. According to one aspect of the method, each of the panels is directed to receive signals from a transmitting node. For each panel, a first table having data representing received signal power difference between the panel and a first neighboring panel and a second table having data representing received signal power difference between the panel and a second neighboring panel are built. The panel with the maximum received power is identified. For the identified panel, a first gain table and a second gain table corresponding to its first and second neighboring panels are searched to identify a first transmission angle and a second transmission angle, if any. A transmission angle relative to the transmitting node is determined using the first and second transmission angles.
Abstract:
An array antenna is facilitates transmission of data with amongst fixed radio units. The array antenna includes a number of antenna panels arranged in an hexagonal shape, one or more array control elements controlling the antenna panels, and one antenna routing element controlling the one or more array control elements.
Abstract:
A method for handover execution in a wireless environment is provided that comprises communicating, by a mobile network, a handover command message to a physical layer of a mobile station to initiate a handover execution. The handover command message is received by the physical layer, which responds by tuning to a handed to frequency and by communicating physical layer bursts over the handed to frequency such that initial timing advance and power control setting characteristics are determined by the mobile network. The method also includes communicating a cease signal to stop communicating the bursts to the mobile station, which responds by ending the transmission of the bursts and by establishing a new communications link over the handed to frequency with the mobile network. The mobile station and mobile network may then couple to a voice or data path such that a wireless communication associated with the mobile station and the mobile network is facilitated.