摘要:
Apparatuses may stay synchronized with a network via a beacon signal transmitted at a set interval. Communication-related activities may be planned around instances when beacon signals are expected, which may also be known as a target beacon transmission time (TBTT). Scanning opportunities, which are periods of time during which apparatuses may perform passive scanning, may be planned based on an interfere multiple of a network beacon signal interval. Apparatuses may, upon realizing a scanning opportunity, opt either to utilize the scanning opportunity or to participate in network beaconing. In example scenarios where apparatuses opt to utilize scanning opportunities, apparatuses may prepare a network information message and then enter a passive scanning mode. Apparatuses may remain in the passive scanning mode for the duration of the scanning opportunity, reacting when messages are received from devices outside of the network by transmitting the network information message.
摘要:
Method, apparatus, and computer program product example embodiments exchange information between wireless devices for joining. In example embodiments, a method comprises receiving wireless messages, each of the wireless messages including a first timing synchronization function value of a respective one of candidate beacon groups from which the wireless messages are sent; calculating a first difference between a selected target timing synchronization function value and a timing synchronization function value of the apparatus; receiving subsequent wireless messages, each of the subsequent wireless messages including a second timing synchronization function value of a respective one of the candidate beacon groups from which the subsequent wireless messages are sent; calculating second differences between the subsequently received second timing synchronization function values and the timing synchronization function value of the apparatus; and selecting a target beacon group for joining having a second difference within a predefined threshold from the first difference.
摘要:
Apparatuses may stay synchronized with a wireless network utilizing a diluted beacon interval that is an integer multiple of a network beacon period signal being transmitted at a set interval. Diluted beacon intervals may reduce communication burden, but may also cause periods of inactivity that allow apparatuses to become unsynchronized with the network. Apparatuses may be active in the network during an awake window wherein a beacon may be transmitted. A set time may also be set during the awake window may delineate a period of time after which any beacon signal received from another apparatus is deemed to be late. Receiving late beacon signals in the apparatus may trigger the transmission of additional beacon signals to help the other apparatuses that transmitted late beacons become resynchronized with the network.
摘要:
Apparatuses may stay synchronized with a network via a beacon signal transmitted at a set interval. Communication-related activities may be planned around instances when beacon signals are expected, which may also be known as a target beacon transmission time (TBTT). Scanning opportunities, which are periods of time during which apparatuses may perform passive scanning, may be planned based on an interfere multiple of a network beacon signal interval. Apparatuses may, upon realizing a scanning opportunity, opt either to utilize the scanning opportunity or to participate in network beaconing. In example scenarios where apparatuses opt to utilize scanning opportunities, apparatuses may prepare a network information message and then enter a passive scanning mode. Apparatuses may remain in the passive scanning mode for the duration of the scanning opportunity, reacting when messages are received from devices outside of the network by transmitting the network information message.
摘要:
Transmission of delay tolerant data. An apparatus includes a processor configured to classify data, on the basis of its delay requirement, into delay tolerant data and into delay critical data, and to control transmission of the delay tolerant data with a transmitter in such a manner that the transmission of the delay tolerant data is timed to coincide with transmission of the delay critical data.
摘要:
In a non-limiting and example embodiment, a method is provided for controlling usage of prioritized radio channels, comprising: detecting (310), by a secondary user apparatus, an interference limitation of a first radio channel for which a primary user apparatus has priority over the secondary user apparatus, selecting (320), by the secondary user apparatus, the first radio channel for communication with another apparatus to a first direction after detecting the interference limitation, and selecting (330), by the secondary user apparatus, a second radio channel for communication with the other apparatus to a second direction, opposite to the first direction.
摘要:
In a non-limiting and example embodiment, a method is provided for controlling usage of prioritized radio channels, comprising: detecting (310), by a secondary user apparatus, an interference limitation of a first radio channel for which a primary user apparatus has priority over the secondary user apparatus, selecting (320), by the secondary user apparatus, the first radio channel for communication with another apparatus to a first direction after detecting the interference limitation, and selecting (330), by the secondary user apparatus, a second radio channel for communication with the other apparatus to a second direction, opposite to the first direction.
摘要:
Transmission of delay tolerant data. An apparatus includes a processor configured to classify data, on the basis of its delay requirement, into delay tolerant data and into delay critical data, and to control transmission of the delay tolerant data with a transmitter in such a manner that the transmission of the delay tolerant data is timed to coincide with transmission of the delay critical data.
摘要:
An apparatus, including a determining unit for determining one or more applicable radio selections including one or more radio interfaces for use by one or more communication applications, a ranking unit for ranking the applicable radio selections to an order of superiority according to a predefined ranking criterion, and a selecting unit for selecting a radio selection, of the one or more applicable radio selections, for use by the one or more communication applications on the basis of the order of superiority of the radio selections.
摘要:
A method for security for inter-RAT carrier aggregation is disclosed. The method includes encrypting a message using an encryption technique for a first RAT. The method also includes sending, to a UE, at least a portion of the encrypted message using a different, second RAT. Sending using the second RAT does not further encrypt the at least a portion of the encrypted message. The method further includes receiving the at least a portion of the message encrypted using the first RAT protocol. Receiving uses the second, different RAT. The method also includes decrypting the at least a portion of the message using the first RAT protocol. Apparatus and computer readable media are also described.