摘要:
Piggybacked acknowledgement/non-acknowledgement (PAN) bits in unreliable bit positions of a modulated symbol are swapped with data bits located in more reliable bit positions. In addition, a power offset value may be applied to the symbols containing the PAN bits.
摘要:
A method and apparatus for indicating a temporary block flow (TBF) to which a piggybacked acknowledgement/non-acknowledgement (PAN) field is addressed are disclosed. A sequence may be generated from a temporary flow identity (TFI) to which the PAN field is addressed and masked with a PAN check sequence (PCS). A radio block including a PAN field and a masked PCS is transmitted. The PCS may be masked with one of TFIs which is selected in accordance with a rule pre-agreed. A secondary identifier may indicate a TBF to which the PAN field is addressed. A special value may be used to represent all TBFs assigned and a secondary identifier may indicate a TBF to which the PAN field is addressed. A special value on the PAN field may be used for control purposes for indicating an action affecting a group of receiving stations listening to the radio block.
摘要:
A method and apparatus of providing a piggybacked positive acknowledgement/negative acknowledgement (ACK/NACK) (PAN) field indicator (PANI) and a polling indicator are disclosed. A combined field of a PANI bit, a relative reserved block period (RRBP) bit and an EGPRS supplementary polling (ES/P) field may indicate a polling scheme and a presence of a PAN field. Alternatively, the presence of the PAN field in the data block may be indicated by using a specific training sequence. Alternatively, a forward error correction (FEC) coding may be performed on the data block including the header, and the presence of the PAN field may be indicated by scrambling the encoded bits corresponding the header with a specific scrambling sequence. Alternatively, a header check sequence (HCS) may be generated and the presence of the PAN field is indicated by mixing a predetermined sequence with the HCS.
摘要:
A method and an apparatus for indicating a temporary block flow (TBF) to which a piggybacked acknowledgement/non-acknowledgement (PAN) field is addressed. A method and apparatus of performing receive processing to reduce the probability of false acceptance of erroneous PANs are also disclosed. A transmit station generates a PAN check sequence (PCS) and performs a channel coding on a PAN field and the PCS. The transmit station scrambles the encoded bits of the PAN field and the PCS with a TBF-specific scrambling code. Because of the scrambling, the PCS decoding at a receive station will pass if the data block is received by an intended receive station, while the PCS decoding will fail if received by a non-intended receive station. Alternatively, the scrambling may be performed before the channel coding. Alternatively, the transmit station may combine the PAN field and a temporary flow identity (TFI) to generate a PCS.
摘要:
A wireless communication method and apparatus for providing network advice to wireless transmit/receive units (WTRUs) are disclosed. Once start-up of a WTRU is initiated, the WTRU scans a network advice channel in a particular band, (e.g., 5.180 GHz-5.320 GHz). If a network advice frame is detected, the WTRU tunes to a channel indicated by the network advice frame and associates with a basic service set (BSS) operating on the channel indicated by the network advice frame. Otherwise, the WTRU scans another available network advice channel in the band.
摘要:
A method for determining uplink power requirements for a transceiver in a wireless communication system includes obtaining measurements from a beacon signal occupying a first timeslot in a frame; obtaining measurements from at least one additional channel having a known transmitted signal strength and occupying a second timeslot in the frame; and utilizing the measurements to determine a path loss estimate.
摘要:
The present invention is related to a method of selecting an enhanced uplink (EU) transport format combination (E-TFC). A scheduling grant payload (SGP) is set to the highest payload that may be transmitted. The SGP is calculated as follows: SGP = K e , ref · SG L e , ref · A ed , ref 2 · 10 Δ harq / 10 , where SG is a serving grant, Le,ref is the number of EU dedicated physical data channels (E-DPDCHs) used for a selected reference E-TFC, Ke,ref is the number of data bits of the reference E-TFC, Δharq is a hybrid automatic repeat request (HARQ) offset for a specific data flow to be transmitted as signaled by higher layers, and Aed,ref is a ratio derived from a parameter ΔE-DPDCH signaled by higher layers for the selected reference E-TFC.
摘要:
In a wireless communication system including a (STA) including a basic service set (BSS) timer and in communication with a mesh access point (MAP), and a network management (NM) entity wherein the MAP and NM entity include a mesh timer, a method and apparatus for coordinating timing comprises the STA transmitting a BSS timer information message to the MAP, wherein the BSS timer information message includes a BSS timer value. The MAP receives the BSS timer information message and modifies the message. The MAP forwards the modified message to the NM entity.
摘要:
High throughput channel operation in a mesh wireless local area network (WLAN) is disclosed. A mesh network comprises a plurality of mesh points and a network management entity (NME). The NME is configured to retrieve capability and configuration data from the mesh points. The NME configures at least one mesh point with respect to IEEE 802.11n channelization and legacy protection mode based on the capability and configuration data.
摘要:
The present invention is related to a method and system for deriving an encryption key using joint randomness not shared by others (JRNSO). Communicating entities generate JRNSO bits from a channel impulse response (CIR) estimate and the JRNSO bits are used in generation of an encryption key. The authentication type may be IEEE 802.1x or a pre-shared key system. In an IEEE 802.1x system, a master key, a pairwise master key or a pairwise transient key may be generated using the JRNSO bits. The encryption key may be generated by using a Diffie-Hellman key derivation algorithm.