摘要:
A medium-access-control (MAC) scheduler, according to one embodiment of which a station of a wireless network evaluates data throughputs corresponding to three different transmission configurations for transmission of a packet over a first of that station's wireless links. The first and second of those transmission configurations have the packet encoded in the first and second tiers, respectively, of a two-tier signal. The third transmission configuration has the packet encoded as a conventional single-tier signal. For each of the first and second transmission configurations, the station selects a second of that station's wireless links for transmission of at least a second packet, with the first and second packets encoded in different respective tiers of the two-tier signal. The station varies power allocation between the first and second tiers to optimize data throughput for each of the first and second transmission configurations and selects from the first, second, and third transmission configurations one resulting in the highest data throughput.
摘要:
Embodiments of the claimed subject matter provide an approach to managing the power state of wireless network devices in a wireless network. Embodiments include a process for modifying the scheduling of data distribution device by referencing the data buffer in an access point for data intended for a wireless network client operating under a power-saving mode, and re-arranging the distribution queue of the access point to be granted priority for a time which coincides with the delivery of a polling beacon to the power-saving wireless client. Other embodiments include a method to create virtual access points for a particular usage, and to leverage access points in a wireless network for particular usages of devices in range.
摘要:
A traffic sensing system for collecting information on traffic conditions is provided. A traffic sensing system includes a traffic sensing server and a mobile traffic sensing device that sends traffic reports to the traffic sensing server. An MTS device may use an accelerometer integrated into a smart phone to detect potholes, to detect when the vehicle is braking, to detect whether the MTS device is being transported via a vehicle or a pedestrian, to detect horns sounding, and so on. The MTS device reports the various conditions to the traffic sensing server for accurate assessment of traffic conditions at stretches of road through which vehicles transporting MTS devices travel.
摘要:
Portable and/or mobile IP hosts desiring to connect to the Internet can dynamically acquire a home address and other configuration information through DHCP when powering up in a foreign network. A two-stage configuration procedure is used. First, the mobile host uses the M-IP protocol to establish contact with an addressing element, referred to as a bootstrapping agent, that is usually co-located with a M-IP Home Agent, and that allocates a temporary home address for the mobile host. The temporary address is used to create a temporary tunnel. Second, this temporary tunnel is used as the communication vehicle over which standard DHCP transactions take place. The present invention is thus arranged to use a) M-IP as the signaling mechanism for reaching the home network and dynamically allocating a temporary home address for the mobile host; and b) DHCP to allocate a permanent home address and any other configuration state for the mobile host.
摘要:
A routing protocol, according to one embodiment of which a first station of a wireless network monitors its outgoing transmissions corresponding to a traffic flow for occurrence of multi-tier signals and for ability to achieve a specified minimum transmission rate. Based on the monitoring, the first station may transmit an outgoing solicitation message that identifies the monitored traffic flow as a candidate for rerouting. Upon receipt of the solicitation message, a second station of the wireless network evaluates whether rerouting of the monitored traffic flow through the second station is capable of increasing data throughput for that traffic flow without decreasing data throughputs for other traffic flows presently handled by the second station. Based on this evaluation, the second station may transmit to the first station an offer to reroute the monitored traffic flow. The first station, in turn, evaluates this offer, e.g., by comparing its benefits with those of alternative offers that the first station might have received from other stations of the wireless network in response to the solicitation message. Based on the latter evaluation, the first station may reroute the monitored traffic flow through the station whose offer is deemed preferable.
摘要:
The amount of TCP/IP packets which can be sent from an Internet network to a wireless network is maximized by modifying a receive window value of an acknowledgment (ACK) before the ACK is sent on to a source of data packets within the Internet network. The receive window value is modified to take into consideration delay and rate variations which occur in the wireless network.
摘要:
A system that enables end-to-end networking within CDMA oriented networks. Several base stations operating within the CDMA oriented network simultaneously receive data from the same mobile unit. A distributed algorithm operating within each of the base stations monitors the reception of the data from the mobile unit, as well as commands/instructions from other base stations. One of the base stations is appointed as a dominant base station. The appointment of a dominant base station can be done randomly or based on the quality of data being received by the base station. When the dominant base station detects a decrease in the quality of received data from the mobile unit, the dominant base station instructs the remainder of the base stations to forward any data received from the mobile to the dominant base station. If the quality of data received by another base station is greater than the quality of data received by the dominant base station, the dominant base station will inform the alternate base station that it is now the dominate base station. If the dominant base station determines that the quality of data received exceeds a particular threshold, the dominant base station will instruct the other base stations to cease reception of data from the particular mobile unit.
摘要:
Estimates are provided for the number of links needed in a Internet Protocol-Radio Access Network (IP-RAN) to ensure the IP-RAN is resilient to base station and radio network controller type failures.
摘要:
The amount of TCP/IP packets which can be sent from an Internet network to a wireless network is maximized by modifying a receive window value of an acknowledgment (ACK) before the ACK is sent on to a source of data packets within the Internet network. The receive window value is modified to take into consideration delay and rate variations which occur in the wireless network.
摘要:
A General Packet Radio Service (GPRS) Accessed Extended Mobile Internet Protocol (EMIP) [G-EMIP] network is provided for wireless mobile device access to external packet data networks. Domains are defined to incorporate a subnet of standard GPRS and EMIP network entities accessed through a Domain Router. Packet access at the radio interface is provided using the base station portion of a GPRS network. Wireless link specific processing is relegated to this potion of the G-EMIP network. EMIP is utilized as a backbone network to provide mobility and service management and interconnection to external networks. A GPRS-IP Interworking entity (GII) interworks IP and GPRS protocols between GPRS and IP addressable network entities (i.e., translates messages of each protocol to corresponding messages of the other protocol). Mobility-related functionality is handled at the IP (network) layer. Mobile IP is used to support the macro-mobility and Handoff-Aware Wireless Access Internet Infrastructure (HAWAII) is used to support micro-mobility and paging. The Domain Router provides packet service management and interacts with a Home Location Register/Authentication Center, which provides GRPS registration, authentication and encryption.