摘要:
Methods and apparatus for storing, manipulating, retrieving, and forwarding state, e.g., context and other information, used to support communications sessions with one or more end nodes, e.g., mobile devices, are described. Various features are directed to a mobile node controlling the transfer of state from a first access node to a second access node during a handoff operation thereby eliminating any need for state transfer messages to be transmitted between the second access node and the first access node during handoff. Other features of the invention are directed to the use of a core network node to store state information. State information stored in the core node can be accessed and used by access nodes in cases where a mobile node does not send a state transfer message during a handoff, e.g., because communication with the first access node is lost or because such messages are not supported.
摘要:
Group communications methods and apparatus are described. In particular, methods for granting a mobile device access to a communications resource, e.g., the right to transmit data, associated with a group are described. User requests for the communications resource are suppressed by the corresponding mobile device, for periods during which the communications resource has been granted to another mobile device. A mobile device may store a suppressed user request so that a resource request signal may be transmitted after the communications resource has been released by the mobile device that was previously granted the resource. In this manner requests that cannot be granted are not transmitted, increasing communications efficiency as compared to systems where requests are not suppressed at the mobile devices. A priority scheme is used in some embodiments to determine whether or not a request should be suppressed while another device has been granted the communications resource.
摘要:
The invention described herein enables a form of downlink macro-diversity in packet-switched cellular networks. It allows packets to be selectively delivered from a network/internetwork to an end node, e.g., a wireless communication device or terminal, over a set of available link-layer connections to/from the end node, through one or more access nodes, e.g., base stations. Downlink macro-diversity is particularly important when the link-layer connections between the end node and the corresponding access node, e.g., the access links, are subject to independent or partially correlated time variations in signal strength and interference. In accordance with the invention, the end node dynamically selects the downlink to be used out of a set of available access links on a per packet basis subject to prevailing channel conditions, availability of air-link resources and other constraints. The invention improves the robustness and efficiency of communication, overall utilization of air-link resources, and quality of service experienced by the end node.
摘要:
The claimed subject matter relates to providing appropriate QoS treatment to one or more traffic flows associated with a terminal, wherein the QoS treatment is defined within a profile assigned to the terminal and implemented when the terminal requests access to a network. An access mode can receive identifying indicia associated with the terminal and relays such indicia to an authentication and authorization server (AAS). The AAS can thereafter provide the access node with a profile that defines QoS treatment to associate with one or more traffic flows related to the terminal.
摘要:
Methods and apparatus related to the determination of the trustworthiness of information communicated in a message and/or the exchange of trust information are described. Various described methods and apparatus are well suited to peer to peer wireless communications in an ad-hoc network. At a given time, a communications device may have a trust relationship with a first set of devices. A first communications device determines trustworthiness of a received message from a second device, which is not a member of the first set of devices, based on information received from a third device which is a member of the first set of devices. The first communications device makes an informed decision as to whether or not to act upon the first message based upon its trustworthiness determination.
摘要:
Methods and apparatus related to routing in communications networks are described. Various embodiments are well suited to wireless communications systems lacking centralized control, e.g., a mobile wireless communications system supporting the dynamic formation and/or maintenance of overlapping peer-to-peer ad hoc networks. A node can establish multiple links, e.g., with different links corresponding to different overlapping networks. Next hop packet routing information, e.g., forwarding tables, are maintained on a per network basis. A node determines the next hop routing for a received packet to be forwarded based on the link upon which the packet was received, which is associated with a particular network, and the included packet destination address. The same destination address may, and sometimes does, correspond to different next hop nodes for different networks.
摘要:
Methods and apparatus related to a peer to peer wireless communications system supporting secure advertisement of identification and/or discovery information e.g., upper layer discovery information, are described. Air interface timing and/or other information received from a third device, e.g., a beacon or GPS transmitter is incorporated in the computation of identification/discovery information which is communicated from a first device to a second device. The second device stores some identification/discovery credentials corresponding to the first device, which have been communicated out of band from the first device to the second device. Upon receipt of a identifier from a first device, the second device determines if the stored information corresponds to the device that transmitted the identifier. Various embodiments facilitate secure advertisement of identification and/or discovery information and discovery, e.g., selective discovery by trusted peers.
摘要:
Methods and apparatus related to a peer to peer wireless communications system supporting secure advertisement of identification and/or discovery information e.g., upper layer discovery information, are described. Air interface timing and/or other information received from a third device, e.g., a beacon or GPS transmitter is incorporated in the computation of identification/discovery information which is communicated from a first device to a second device. The second device stores some identification/discovery credentials corresponding to the first device, which have been communicated out of band from the first device to the second device. Upon receipt of a identifier from a first device, the second device determines if the stored information corresponds to the device that transmitted the identifier. Various embodiments facilitate secure advertisement of identification and/or discovery information and discovery, e.g., selective discovery by trusted peers.
摘要:
An access node, e.g., base station, determines a configuration of an end node, e.g., wireless terminal, intended to support a specific traffic flow and sends a configuration command to the wireless terminal. A base station may determine one or more parameters associated with classification, queue management, scheduling, and/or automatic repeat request, and then send a configuration command to the wireless terminal instructing it to implement a configuration operation. In some embodiments, a wireless terminal sets the value of an internal parameter to a value directly provided by the base station in a configuration command. In some embodiments, a wireless terminal determines and sets the value of an internal parameter as a function of information included in the configuration command from the base station.
摘要:
Various embodiments relate to wireless communications, and more particularly, to methods and apparatus for authorizing use of spectrum, e.g., through the issuance of spectrum access keys, and/or preventing or discouraging the unauthorized use of licensed spectrum. Peer to peer wireless communications between authorized users of licensed spectrum may involve scrambling/descrambling of information communicated between authorized devices. In some embodiments air interface timing and/or other information received from a second device, e.g., a beacon or GPS transmitter, is incorporated into a computation of a pseudo-random bit sequence which is also computed based on a spectrum access key communicated to authorized spectrum users. In some embodiments authorized peer to peer devices scramble communicated information based on the generated pseudo random bit sequence thereby preventing or discouraging communication with devices which are not authorized to use the spectrum and lack a spectrum access key used to generate the pseudo random bit sequence.