Abstract:
In a spread spectrum digital radiocommunication receiver, a first estimate of a symbol transmitted by a sender is calculated by applying to a radio signal received a processing taking into account a number N of propagation paths from the sender, a parameter of reliability of the first estimate is evaluated, and when the reliability parameter evaluated does not satisfy a confidence criterion, a second estimate of the symbol is calculated by taking into account at least one (Nnull1)-th propagation path from the sender in the processing applied to the radio signal received.
Abstract:
The present invention provides a service node capable of coordinating call processing for incoming calls intended for any one of multiple telephony devices of a given entity, such as a business or individual user. Switching devices, such as traditional telephony switches or internetworked gateways controlling call routing, are configured to interact with the service node to determine how to handle incoming calls to the telephony devices that they serve. Through a variety of techniques, the entity can dynamically instruct the service node how to route incoming calls, and preferably, upon putting those instructions into effect, the service node will send an alert to the entity. The instructions are used by the service node to create call processing rules for the switching devices to apply to an incoming call intended for any of the entity's telephony devices.
Abstract:
Distributed security for industrial networks is achieved through the implementation of Security Policy Implementation Points (SPIPs) on the network to apply security policy in a distributed fashion to prevent network users from taking action in particular areas of the network. The SPIP integrates with network services to perform authentication and authorization services on behalf of particular factory machines, groups of factory machines, and other industrial network resources. The SPIP also maintains a local access policy to enable emergency access to the factory machines as well as enable local access to attendant programmable logic controllers. The SPIP also includes audit functionality to enable the SPIP to record local accesses and network accesses to maintain a log of users and network devices that have interfaced with the SPIP. The SPIP may also support VPNs, encryption, compression, and numerous other functions to engage in communications on the network.
Abstract:
A multi-staged services policer implements multiple policies, at an edge device of network, on the data traffic of a single customer. In such a multi-staged services policer, services policers in a given stage may receive information from policers in subsequent stages. This information may be used when policing in the given stage.
Abstract:
The present invention provides an effective way to create a virtual MIMO transmission system using mobile terminals that have only one transmit path and antenna. This is accomplished by assigning mobile terminals to a group and assigning certain shared resources and user-specific resources to those mobile terminals in the group. In a synchronized fashion, the mobile terminals will provide uplink transmission in concert, as if they were a single entity having multiple transmission paths and antennas. Preferably, the shared resources bear on how the data is transmitted, and the user-specific resources relate to pilot signals. The data transmitted may be encoded in any number of ways, and in one embodiment, the mobile terminals may relay their information to each other, such that uplink transmissions can incorporate STTD decoding or other space-time codes. The invention is applicable to virtually any multiple access technology, including OFDM, TDMA, and CDMA, preferably synchronous CDMA.
Abstract:
A technique for sharing multimedia sessions between users that share a directory number allows incoming calls to be routed to both phones. Once one party picks up, the other party is alerted to this fact. Both parties may then exchange multimedia information to help in the handling and disposition of the call.
Abstract:
A cellular mobile radio network includes base stations, a packet control unit capable of communicating with a radio terminal via two or more base stations, and routing means for routing data between a remote unit and the packet control unit. The data transmitted by the remote unit to the terminal are stored temporarily in the packet control unit. The remote unit is adapted to receive from the terminal acknowledgments relating to transmitted data segments and to retransmit data segments that have not been acknowledged on the expiry of a retransmission time depending on the received acknowledgments. Data segments are transmitted from the remote unit to the terminal via a first base station connected to the packet control unit. In response to a request for communication transfer to a second base station connected to the packet control unit, only a portion of the data stored temporarily in the packet control unit is retransmitted to the terminal via the second base station.
Abstract:
The present invention facilitates a handoff between cellular and wireless local area networks (WLANs). To facilitate a WLAN interface with the cellular network, a proxy packet control function (P-PCF) establishes a data tunnel to a packet data serving node (PDSN), as well as a WLAN association with a mobile terminal. The WLAN association is a tunnel, and is preferably implemented via an Access Router acting as a liaison between the proxy PCF and an Access Point. The Access Router and the proxy PCF establish an IP tunnel, which carries the WLAN user's PPP traffic. Handoffs between the cellular and WLAN networks are facilitated by effecting a same-PDSN, inter-PCF handoff wherein the communication session with the mobile terminal is effectively changed from between the PDSN and the proxy PCF to between the PDSN and a PCF associated with a base station controller facilitating the cellular access, and vice versa.
Abstract:
Call Control entities in a network communicate between themselves by amending call processing messages to include encrypted network information. As such, a call may be established whose path through the network is dependent on the paths of other calls. Information of a scope larger than a Call Controller normally possesses can, as a result of this communication, be made available to Call Controllers for constraining call establishment. This information could relate to other calls and connections associated with those other calls. The information may also relate to gateways in and to adjacent networks and the Call Controllers in the adjacent networks that are related to the current Call Controller.