摘要:
A method for managing channel selection in a dynamic spectrum management network includes receiving a spectrum allocation request; based on the source of the spectrum allocation request, checking for available channels; based on the source of the spectrum allocation request, collecting sensing and usage data for the available channels; providing the channel usage data to an entity that transmitted the spectrum allocation request.
摘要:
A method for multicasting a packet begins by providing a buffer for each of two user equipments (UEs) in communication with a base station. A determination is made whether there is a previously unsent packet at the base station. A second determination is made whether both UE buffers are non-empty. A non-empty buffer is flushed if there is no previously unsent packet and if one of the buffers is non-empty. A packet is selected to be transmitted if there is a previously unsent packet or if both buffers are non-empty. The buffers are updated based on feedback received from the UEs.
摘要:
A method and apparatus are provided for performing information-theoretically secure cryptography using joint randomness not shared by others. Two valid communicating entities independently generate samples of a shared source that is not available to an illegitimate entity. The shared source may be a satellite signal, and each legitimate entity may generate uniformly distributed samples from a binary phase-shift keying signal received on an independent channel. Alternatively, the shared source may be a channel between the two legitimate entities, such that each legitimate entity generates samples of unknown distribution based on the channel impulse response of the channel. One legitimate entity generates an encryption key, a quantization error, and a syndrome from its samples. The quantization error and the syndrome are reported to the other legitimate entity. The other legitimate entity generates a matching encryption key using its samples, the quantization error, and the syndrome.
摘要:
A method and apparatus for cooperation in wireless communications. Cooperation is considered among a number of network elements, including at least one wireless transmit-receive unit, at least one relay station, and at least one base station.
摘要:
A method for managing channel selection in a dynamic spectrum management network includes receiving a spectrum allocation request; based on the source of the spectrum allocation request, checking for available channels; based on the source of the spectrum allocation request, collecting sensing and usage data for the available channels; providing the channel usage data to an entity that transmitted the spectrum allocation request.
摘要:
Systems and methods for dynamic white space management are described. First, local handling of channel queries, in which a channel query by a white space device (WSD) is handled by a local dynamic spectrum management (DSM) server, if the DSM server has all the information necessary for providing a response to the channel query. Second, a search extension, in which a WSDB passes part of a search for available channels to a local DSM server. Third, assisting of an available channel calculation, in which a DSM server provides spectrum sensing information to WSDBs to improve the available channel calculation within the WSDBs. And fourth, dynamic bandwidth management to meet the coexistence requirements. In addition, the content of the messages and procedures that enable the above value-adding functions and interactions with the WSDB systems are described.
摘要:
A method and apparatus are provided for performing information-theoretically secure cryptography using joint randomness not shared by others. Two valid communicating entities independently generate samples of a shared source that is not available to an illegitimate entity. The shared source may be a satellite signal, and each legitimate entity may generate uniformly distributed samples from a binary phase-shift keying signal received on an independent channel. Alternatively, the shared source may be a channel between the two legitimate entities, such that each legitimate entity generates samples of unknown distribution based on the channel impulse response of the channel. One legitimate entity generates an encryption key, a quantization error, and a syndrome from its samples. The quantization error and the syndrome are reported to the other legitimate entity. The other legitimate entity generates a matching encryption key using its samples, the quantization error, and the syndrome.
摘要:
A method and apparatus for maintaining a connection between a wireless transmit/receive unit (WTRU) and a blanket wireless local area network (BWLAN) are described. An inter-working function (IWF) entity in a given network access point (NAP) of the BWLAN maintains lists of WTRUs in respective states. Furthermore, the given NAP maintains a list of neighbor NAPs, and operates in accordance with a selected WTRU mobility protocol. The states may include a “not aware” (NA) state in which the given NAP is actually not aware of a particular WTRU, an “active transmit” (AT) state in which the given NAP is actively transmitting to a particular WTRU, and a “neighbor range” (NR) state for WTRUs indicated in an update report from neighbor (URN) message that the given NAP was not aware of. The WTRU mobility protocol may be a push mobility protocol or a poll mobility protocol.
摘要:
Systems and methods for dynamic white space management are described. First, local handling of channel queries, in which a channel query by a white space device (WSD) is handled by a local dynamic spectrum management (DSM) server, if the DSM server has all the information necessary for providing a response to the channel query. Second, a search extension, in which a WSDB passes part of a search for available channels to a local DSM server. Third, assisting of an available channel calculation, in which a DSM server provides spectrum sensing information to WSDBs to improve the available channel calculation within the WSDBs. And fourth, dynamic bandwidth management to meet the coexistence requirements. In addition, the content of the messages and procedures that enable the above value-adding functions and interactions with the WSDB systems are described.
摘要:
A method and apparatus for generating physical layer security keys is provided. Channel impulse response (CIR) measurements are recorded. Each CIR measurement is associated with a time-stamp. Where possible, the time-stamps are paired with time-stamps that are associated with another plurality of CIR measurements. The CIR data associated with the paired time-stamps is aggregated. Each of the aggregated CIR measurements is aligned, and at least one CIR measurement is selected for use in secret key generation.