摘要:
Example methods and apparatus to predict routing to maintain connectivity over a geographic area are disclosed. A disclosed example method involves selecting network connection configurations for subsequent connections of a wireless terminal to access networks and generating a listing of network connection locations based on the selected network connection configurations. The example method also involves sending the listing of network connection locations to a geographic navigation program to enable selecting a geographic route based on the network connection locations.
摘要:
Example methods and apparatus to access network connectivity information associated with predicted times are disclosed. A disclosed example method involves receiving network connectivity information and an associated start time indicative of a predetermined time commencing a requirement to use the network connectivity information for connecting a wireless terminal to an access network. The example method also involves in response to a time event based on the start time, using the network connectivity information to enable a connection change between the wireless terminal and the access network.
摘要:
Example methods and apparatus to provide network capabilities for connecting to an access network are disclosed. A disclosed example method involves receiving a request at a first access network of a first network type. The request is addressed to a database and requests network connectivity information for connecting a wireless terminal to a second access network of a second network type different from the first network type. The example method also involves sending a response to the wireless terminal via the first access network. The response includes the network connectivity information for connecting the wireless terminal to the second access network.
摘要:
Example methods and apparatus to authenticate requests for network capabilities for connecting to an access network are disclosed. A disclosed example method involves receiving a request at a first access network. The request requests network connectivity information for connecting a wireless terminal to a second access network. The example method also involves encapsulating the request in an authentication frame. The authentication frame indicates the request as a white space protocol frame. The authentication frame is sent to a database addressed in the request.
摘要:
Security in wireless communication networks that employ relay stations to facilitate communications between base stations and mobile stations is enhanced. In one embodiment, resource information provided to one or more relay stations from a base station or another relay station is encrypted prior to being delivered to the one or more relay stations. Only authorized relay stations are allocated an appropriate key necessary to decrypt the resource information. As such, only appropriate relay stations are able to access and use the resource information to effect communications directly or indirectly between the base stations and the mobile stations. In certain embodiments, the resource information is delivered between the various base and relay stations using either unicast or multicast delivery techniques.
摘要:
A method and transceiver in a secondary system for utilizing channel bandwidths allocated to a primary system. A secondary system transceiver receives a primary system signal, re-transmits a delayed version of the primary system signal, and communicates with secondary system equipment utilizing secondary system signals within at least part of a bandwidth of at least one channel of the primary system. The re-transmission of the primary system signal allows the use of primary system channels by the secondary system without adversely affecting the primary or secondary system users.
摘要:
The cellular system has a radio access network comprising base stations and a controller to which a wireless local area network is linked. A terminal is authenticated with the cellular system through the radio access network, and in response an authentication token allocated thereto. The allocated token is transmitted from the controller to the terminal through the radio access network. The allocated token and an identifier of the terminal are further transmitted from the controller to an authentication server accessible through said wireless network. The terminal is authenticated with the wireless network by verifying that the terminal possesses the token transmitted to said authentication server.