摘要:
Methods and apparatus are disclosed for using error detection techniques, such as Forward Error Correction techniques, to predict the degradation below a certain threshold of an ability to accurately convey information on a communication channel, for example, to predict a failure of the communication channel. In response, transmission and/or reception of information on the channel may be adapted, for example, to prevent the degradation below the threshold, e.g., prevent channel failure. Predicting the degradation may be based, at least in part, on data transmission error information corresponding to one or more blocks of information received on the channel and may include determining an error rate pattern over time. Based on these determinations, the degradation below the threshold may be predicted and the transmission and/or reception adapted. Adapting may include initiating use of a different error encoding scheme and/or using an additional communication channel to convey information.
摘要:
Guest user are enabled to access network resources through an enterprise network using a guest user account. A guest user account may be created for a guest for a limited time. Guest account credentials of the guest account may be provided to the guest to use the guest account using any of a variety of techniques described herein, for example, by scanning a guest access card, credit card or mobile telephone of guest user, and providing the guest account credentials to the user based on the information obtained. A guest access management server may be configured to generate and maintain guest accounts, authenticate guest users, and track and log guest activity. A VLAN technology may be used to separate guest traffic from host enterprise traffic on the host enterprise network. After a guest user is authenticated, communications to and from the guest user may be routed to a guest VLAN.
摘要:
A computing device having a software defined radio (SDR) wireless network interface is automatically configured to support a wireless service in response to a request from the user to access the service. The computing device may determine the appropriate profile and obtain it by querying a remote database. The query may indicate the computing device's current location, though location information may alternatively be determined by a server coupled to the database. The communication profile is downloaded from the remote database using an existing or available network connection. The software defined radio is configured with the communication profile and is used to access an available wireless service. Content obtained from the wireless service is presented through a user interface of the computing device.
摘要:
A computing device with a software defined radio. The software defined radio has an architecture with separate components to provide control functions and data processing functions. The control components configure the data processing components so that the software defined radio provides desired operating characteristics. To facilitate programming the software defined radio to communicate according to one or more wireless technologies, the computing device may include a library of wireless technology specifications. By accessing a technology specification in the library, the control components can determine an appropriate configuration of the data processing components for a selected wireless technology. The data processing components may be hardware or software and, if hardware and software components are available to perform a data processing function, the control components may select between the hardware and software components depending on throughput, processor loading or other criteria.
摘要:
A protocol for operation of wireless devices enables a wireless device to remotely and securely invoke a service on a target wireless device without requiring the user of the target wireless device to take any action and without requiring the target wireless device to use power unnecessarily. Mutual authentication is executed while the target wireless device remains in a low power discoverable mode. The discoverable mode includes discovery windows separated by inactive windows when the radio of the target wireless device is powered down.
摘要:
A computing device with a software defined radio. The software defined radio has an architecture with separate components to provide control functions and data processing functions. The control components configure the data processing components so that the software defined radio provides desired operating characteristics. To facilitate programming the software defined radio to communicate according to one or more wireless technologies, the computing device may include a library of wireless technology specifications. By accessing a technology specification in the library, the control components can determine an appropriate configuration of the data processing components for a selected wireless technology. The data processing components may be hardware or software and, if hardware and software components are available to perform a data processing function, the control components may select between the hardware and software components depending on throughput, processor loading or other criteria.
摘要:
A protocol for operation of wireless devices enables a wireless device to remotely and securely invoke a service on a target wireless device without requiring the user of the target wireless device to take any action and without requiring the target wireless device to use power unnecessarily. Mutual authentication is executed while the target wireless device remains in a low power discoverable mode. The discoverable mode includes discovery windows separated by inactive windows when the radio of the target wireless device is powered down.
摘要:
The concepts relate to broadcasting white space utilization. One example can interact with a wireless device that is configured to obtain authorization to use a set of radio white space frequencies in accordance with one or more constraints. The example can obtain an individual radio white space frequency and associated individual constraints. This example can also utilize the individual radio white space frequency for network access independent from the wireless device that is configured to obtain the authorization.
摘要:
A wireless peer-to-peer protocol that supports fast and low power joining to an existing group. The protocol may be an extension of a peer-to-peer protocol that supports a sleep state for a device controlling the group. When a device is seeking to join a group at a time when the controlling device is in a sleep state, another device that has information about the controlling device may provide information to the joining device that may then be used by the joining device to more quickly, and using less power, synchronize with the controlling device. The information may include information about a channel used by the controlling device or about timing of availability of the controlling device. The information may also reveal whether the group provides a service being sought by the joining device or may otherwise influence whether the joining device will attempt to join a group.
摘要:
A computing device configured for wireless communication may effectively control adaptation to channel conditions. The device may be configured to identify and classify conditions impacting performance of a channel so that appropriate adaptations may be made. Interference may be detected by correlating received signal strength and packet errors. High received signal strength correlated to a high packet error rate may signify presence of a source of interference. Once a source of interference is detected, other criteria may be used to determine the nature of the interference so that an adaptation that is minimally disruptive of applications can be selected. Additionally, channel degradation may be predicted by monitoring trends in error rates, including Forward Error Correction rates, and adaptation may be used before packet error rates exceed an unacceptable level.