摘要:
A method and apparatus are used in cooperative relays with incremental redundancy (IR) and distributed spatial multiplexing. A wireless transmit/receive unit (WTRU) may listen to the base station (BS) transmission during Phase 1 of the communication, and use cooperation between a relay station (RS) and the BS for the data transmission during Phase 2 to improve performance. During Phase 2, both the BS and the RS may transmit data to the WTRU, using either distributed Space Time Block Codes/Space Frequency Block Codes (STBC/SFBC) or distributed spatial multiplexing.
摘要:
A method and apparatus for cooperation in wireless communications. Cooperation is considered among a number of network elements, including at least one wireless transmit-receive unit, at least one relay station, and at least one base station.
摘要:
Tokens/keys are produced for wireless communications. These tokens/keys are used for watermarks, signature insertion, encryption and other uses. In one embodiment, contextual information is used to generate tokens/keys. The tokens/keys may be derived directly from the contextual information. The contextual information may be used in conjunction with other information to derive the tokens/keys. Tokens/keys may be exchanged between transmit/receive units. The exchange of these tokens/keys may be encrypted.
摘要:
The present invention is related to a method and apparatus for enhancing security of communications. The apparatus comprises a security processing unit, a data processing unit, a cross-layer watermarking unit, and optionally a smart antenna processor. The security processing unit generates a token/key to be used in watermarking and sends a node security policy to other components. The data processing unit generates user data. The cross-layer watermarking unit includes at least one of Layer-2/3, Layer-1 and Layer-0. Each layer performs a different scheme or degree of watermarking. The cross-layer watermarking unit embeds the token/key into the user data transmission on at least one of the layers selectively in accordance with a security policy.
摘要:
A system and method for providing variable security levels in a wireless communication network. The present invention optimizes the often conflicting demands of highly secure wireless communications and high speed wireless communications. According to a preferred embodiment of the present invention, various security sensors are scanned to determine the likely presence of an intruder within a predetermined trust zone. If an intruder is likely present, the security level is changed to the highest setting, and consequently a lower data rate, while the intruder is identified. If the identified intruder is in fact a trusted node, the security level is returned to a lower setting. If the identified intruder is not a trusted node, the security level is maintained at an elevated state while the intruder is within the trust zone.
摘要:
A method and apparatus for power control for distributed wireless communication is disclosed including one or more power control loops associated with a wireless transmit/receive unit (WTRU). Each power control loop may include open loop power control or closed loop power control. A multi-phase power control method is also disclosed with each phase representing a different time interval and a WTRU sends transmissions at different power levels to different set of node-Bs or relay stations during different phases to optimize communications.
摘要:
A system and method for providing variable security levels in a wireless communication network. The present invention optimizes the often conflicting demands of highly secure wireless communications and high speed wireless communications. According to a preferred embodiment of the present invention, various security sensors are scanned to determine the likely presence of an intruder within a predetermined trust zone. If an intruder is likely present, the security level is changed to the highest setting, and consequently a lower data rate, while the intruder is identified. If the identified intruder is in fact a trusted node, the security level is returned to a lower setting. If the identified intruder is not a trusted node, the security level is maintained at an elevated state while the intruder is within the trust zone.
摘要:
A system and method for providing variable security levels in a wireless communication network. The present invention optimizes the often conflicting demands of highly secure wireless communications and high speed wireless communications. According to a preferred embodiment of the present invention, various security sensors are scanned to determine the likely presence of an intruder within a predetermined trust zone. If an intruder is likely present, the security level is changed to the highest setting, and consequently a lower data rate, while the intruder is identified. If the identified intruder is in fact a trusted node, the security level is returned to a lower setting. If the identified intruder is not a trusted node, the security level is maintained at an elevated state while the intruder is within the trust zone.
摘要:
A method and apparatus for cooperation in wireless communications. Cooperation is considered among a number of network elements, including at least one wireless transmit-receive unit, at least one relay station, and at least one base station.
摘要:
A wireless communication method and apparatus are disclosed for assigning different phases, (i.e., time periods), to perform data transmissions over designated frequency bands in a cooperative relaying system. In phase 1, a relay station (RS) listens to a wireless transmit/receive unit (WTRU) and successfully receives b information bits. In phase 2, the RS and WTRU cooperatively transmit these b information bits to the destination. These transmissions may be performed in a unicast scheme, wherein a WTRU sends information to a selected RS in phase 1, and the RS forwards the information to a base station (BS) in phase 2. The transmission may also be performed in a multicast scheme, wherein the WTRU sends information to the RS and the BS in phase 1, and the RS transmits a subset the information to the BS in phase 2.