摘要:
A method for reporting a power outage to a communications controller includes detecting the power outage, and selecting a transmission slot from a plurality of transmission slots in order to report the power outage to the communications controller, the transmission slot selected according to a non-uniform probability distribution function, the non-uniform probability distribution function is monotonic with time after the power outage. The method also includes transmitting a first power outage indicator to the communications controller in the transmission slot selected.
摘要:
Communication nodes, acting as intermediate routers for communication packets transmitted between a source node and a destination node, are provided with different access rights to the fields of the routed communication packets. Routes of intermediate routers between the source node and the destination node are discovered and the identities of intermediate routers on the discovered routes are collected. The aggregate trust levels of the intermediate routers are computed allowing the most trusted route to be selected. Encryption keys are securely distributed to intermediate routers on the most trusted route based on the trust level of the intermediate routers and fields of the communication packets are encrypted with encryption keys corresponding to the assigned trust level. Intermediated nodes are thereby prevented from accessing selected fields of the communication packets.
摘要:
A method and apparatus for synchronizing a node (200) within an ad-hoc communication system (100) is described herein. During operation all nodes periodically broadcast a synchronization beacon for other nodes to utilize for synchronization when a coordinating access point (node) is unavailable. A particular node's synchronization beacon will have an associated “tier” number that is incremented from the tier number of the beacon used to synchronize the particular node. In the absence of an access point, a node that joins the ad-hoc communication system will listen for synchronization beacons transmitted by other nodes. If synchronization beacons are heard, the node will synchronize with a beacon having a lowest tier. The node will then broadcast its own beacon having its tier number incremented from the lowest tier beacon heard.
摘要:
A method and apparatus for bi-direction training in D2D/cellular networks. An embodiment method includes sending training symbols to sense interference from the cellular UEs, calculating an interference subspace from the cellular UE to each of the D2D UEs, calculating an orthogonal projection matrix based on the interference subspace calculated, and iteratively updating receive filters through forward training and transmit beamformers through backward training after the orthogonal projection matrix is calculated to align the D2D UEs. In an embodiment, training symbols are sent to sense interference from the cellular UE.
摘要:
The proposed method and apparatus reduces an amount of power required for nodes to both transmit and receive messages. In particular, broadcast packets are sent in an awake period (ATIM window) if the length of these messages is small. Because these packets do not need acknowledgment or they do not expect immediate reply, they may be broadcast in the ATIM window. Since all nodes are awake during the ATIM window, nodes may receive messages during this period of time which they ordinarily would need to stay awake to receive in the sleep period (post ATIM window).
摘要:
A method and apparatus for channel assignment within an ad-hoc communication system utilizing multiple channels is provided herein. Individual nodes receive and send route-request (RREQ) packets on all channels rather than a single channel. Each route-request packet comprises a first and a second table. The first table comprises a channel state for the link and the second table comprises a channel quality metric for the link. Each node updates the channel state and channel quality tables and forwards them in the RREQ packet as part of the route-discovery process. When channel selection is made, the channel selection is based on the channel state and the channel quality tables.
摘要:
A method for transmitting to a plurality of responder stations includes transmitting a first direct link setup request message to a first responder station via an access point, the first direct link setup request message including a first group identifier, the first group identifier being received from a communications controller and being associated with the first responder station, and transmitting a second direct link setup request message to a second responder station via the access point, the second setup request message including a second group identifier, the second group identifier being received from the communications controller and being associated with the second responder station. The method also includes transmitting data to the first responder station and the second responder station in a single transmission.
摘要:
Communication nodes, acting as intermediate routers for communication packets transmitted between a source node and a destination node, are provided with different access rights to the fields of the routed communication packets. Routes of intermediate routers between the source node and the destination node are discovered and the identities of intermediate routers on the discovered routes are collected. The aggregate trust levels of the intermediate routers are computed allowing the most trusted route to be selected. Encryption keys are securely distributed to intermediate routers on the most trusted route based on the trust level of the intermediate routers and fields of the communication packets are encrypted with encryption keys corresponding to the assigned trust level. Intermediated nodes are thereby prevented from accessing selected fields of the communication packets.
摘要:
Communication nodes, acting as intermediate routers for communication packets transmitted between a source node and a destination node, are provided with different access rights to the fields of the routed communication packets. Routes of intermediate routers between the source node and the destination node are discovered and the identities of intermediate routers on the discovered routes are collected. The aggregate trust levels of the intermediate routers are computed allowing the most trusted route to be selected. Encryption keys are securely distributed to intermediate routers on the most trusted route based on the trust level of the intermediate routers and fields of the communication packets are encrypted with encryption keys corresponding to the assigned trust level. Intermediated nodes are thereby prevented from accessing selected fields of the communication packets.
摘要:
Communication nodes, acting as intermediate routers for communication packets transmitted between a source node and a destination node, are provided with different access rights to the fields of the routed communication packets. Routes of intermediate routers between the source node and the destination node are discovered and the identities of intermediate routers on the discovered routes are collected. The aggregate trust levels of the intermediate routers are computed allowing the most trusted route to be selected. Encryption keys are securely distributed to intermediate routers on the most trusted route based on the trust level of the intermediate routers and fields of the communication packets are encrypted with encryption keys corresponding to the assigned trust level. Intermediated nodes are thereby prevented from accessing selected fields of the communication packets.