摘要:
Systems and methods are provided for routing internet protocol (IP) traffic flows when connected to a mobile network and a local network. A wireless transmit and receive unit (WTRU) determines whether to offload an IP traffic flow from the mobile network to the local network based on the destination address of the IP traffic flow. When the destination address is local, the WTRU routes the IP traffic flow through local network. The WTRU determines whether to offload IP traffic to the local network based on the stability state of the local network When the local network connection is sufficiently stable for the application associated with the IP traffic, the IP traffic is offloaded to the local network by selecting the local IP address as the source IP address.
摘要:
A communication network's bandwidth may be managed using bandwidth management (“BWM”) and/or bandwidth aggregation (“BWA”) techniques. For example, packets of traffic may be inspected to identify a video stream and/or video sub-streams. The video sub-streams may be partitioned for transmission. For example, the video sub-streams may be partitioned based on a characteristic and/or policies associated therewith. One or more radio access technologies (“RATs”) may be selected for transmitting the video sub-streams. The one or more RATs may be selected according to one or more policies for managing the bandwidth associated with the video. The video sub-streams may be transmitted via a single RAT or a plurality of aggregated RATs.
摘要:
A multi radio access technology layer (MRL) is a convergence layer solution, located between the protocol layers and the technology-dependent MAC layers. The MRL layer is technology independent and uses the information received from the underlying technologies to select the most appropriate uplink and downlink technologies to match the respective service requirements.
摘要:
A method and apparatus is used for generating a perfectly random secret key between two or more transceivers in a wireless communication network. In a point-to-point system, both transceivers produce an estimate of the channel impulse response (CIR) based on the received radio signal. The CIR estimation is synchronized and may include error correction and detection. A long secret key of bits is generated from a digitized version of the CIR estimate, from which a perfectly secret encryption key is derived by privacy amplification.
摘要:
A communication network's bandwidth may be managed using bandwidth management (“BWM”) and/or bandwidth aggregation (“BWA”) techniques. For example, packets of traffic may be inspected to identify a video stream and/or video sub-streams. The video sub-streams may be partitioned for transmission. For example, the video sub-streams may be partitioned based on a characteristic and/or policies associated therewith. One or more radio access technologies (“RATs”) may be selected for transmitting the video sub-streams. The one or more RATs may be selected according to one or more policies for managing the bandwidth associated with the video. The video sub-streams may be transmitted via a single RAT or a plurality of aggregated RATs.
摘要:
A secret stream of bits begins by receiving a public random stream contained in a wireless communication signal at a transmit/receive unit. The public random stream is sampled and specific bits are extracted according to a shared common secret. These extracted bits are used to create a longer secret stream. The shared common secret may be generated using JRNSO techniques, or provided to the transmit/receive units prior to the communication session. Alternatively, one of the transmit/receive unit is assumed to be more powerful than any potential eavesdropper. In this situation, the powerful transmit/receive unit may broadcast and store a public random stream. The weaker transmit/receive unit selects select random bits of the broadcast for creating a key. The weaker transmit/receive unit sends the powerful transmit/receive unit the selected bit numbers, and powerful transmit/receive unit uses the random numbers to produce the key created by the weaker transmit/receive unit.
摘要:
A method and apparatus for a secondary wireless transmit/receive unit (WTRU) to use of secondary cellular spectrum are provided. The secondary WTRU monitors transmissions of a primary WTRU; determines whether to provide assistance to the primary WTRU; and in response to a determination to provide assistance, performs cooperative communications with the primary WTRU for its transmission of data to a base station. If the assistance results in the data being transmitted to the base station faster than it would have with out assistance, the secondary WTRU may utilize uplink resources originally intended for the primary WTRU.
摘要:
A method of data transfer between wireless transmit/receive units (WTRUs) is described. The WTRUs may be within a given geographic area of each other or in communication with the same network. Location information relating to the WTRUs may be determined. The location information may be presented to a user of the WTRU. Data may be transferred from one WTRU to a target WTRU based on user input. The WTRU may determine the target WTRU based on user input and/or location information. The user input may be a gestural input. The gestural input may be received via a display or touchscreen. The user input may identify a given action or identify a particular file for transfer. The WTRU may receive data from the target WTRU.
摘要:
A secret stream of bits begins by receiving a public random stream contained in a wireless communication signal at a transmit/receive unit. The public random stream is sampled and specific bits are extracted according to a shared common secret. These extracted bits are used to create a longer secret stream. The shared common secret may be generated using JRNSO techniques, or provided to the transmit/receive units prior to the communication session. Alternatively, one of the transmit/receive unit is assumed to be more powerful than any potential eavesdropper. In this situation, the powerful transmit/receive unit may broadcast and store a public random stream. The weaker transmit/receive unit selects select random bits of the broadcast for creating a key. The weaker transmit/receive unit sends the powerful transmit/receive unit the selected bit numbers, and powerful transmit/receive unit uses the random numbers to produce the key created by the weaker transmit/receive unit.
摘要:
A method of data transfer between wireless transmit/receive units (WTRUs) is performed by a sending communication device soliciting environment information relating to active communication devices operating within the local area of the WTRU. The local area of the WTRU may be determined by an environment variable that may be configured to indicate a search radius. Within the local area, information relating to active candidate WTRUs is received through a communication peripheral. User actions on the user interface are converted to electromechanical signals which act as an input along with the environment information to select a target WTRU from the candidate WTRUs to receive the data transfer. The environment information and user input are used to uniquely discriminate the target WTRU as the intended recipient of the data transfer. Transmission instructions are generated based on the solicited information and the user input.