摘要:
A communication system where radios without a normally available communication pathway to a spectrum management system (referred to as spoke radio devices) communicate with the spectrum management system by joining a network established by a hub radio device that has a prior registration with the spectrum management system. Once joined, the spoke may seek registration with the spectrum management system and, if appropriate, obtain a spectrum allocation from the spectrum management system. Also, once registered, spoke radio devices may form a network of their own.
摘要:
A communication system where radios without a normally available communication pathway to a spectrum management system (referred to as spoke radio devices) communicate with the spectrum management system by joining a network established by a hub radio device that has a prior registration with the spectrum management system. Once joined, the spoke may seek registration with the spectrum management system and, if appropriate, obtain a spectrum allocation from the spectrum management system. Also, once registered, spoke radio devices may form a network of their own.
摘要:
A central registration system provides channel maps of available spectrum channels to radio devices. The channel map indicates relative noise floor amounts among the available channels. For this purpose, an amount of predicted interference caused by high-power protected transmitters on each channel available to the requesting radio device for wireless communications is determined, where interference from primary channel and out-of-band emissions of the transmitters is considered.
摘要:
Systems and methods of providing network access information from one or more servers to a wireless device. The wireless device acquires information from the servers about available networks at a current location of the wireless device. The network information is based on a plurality of device parameters, network parameters and regulatory requirements that govern the operation of the wireless device. In addition, the wireless device may assess the acquired information for suitability for communications to be carried out by the wireless device.
摘要:
Systems and methods of providing network access information from one or more servers to a wireless device. The wireless device acquires information from the servers about available networks at a current location of the wireless device. The network information is based on a plurality of device parameters, network parameters and regulatory requirements that govern the operation of the wireless device. In addition, the wireless device may assess the acquired information for suitability for communications to be carried out by the wireless device.
摘要:
A central registration system provides channel maps of available spectrum channels to radio devices. The channel map indicates relative noise floor amounts among the available channels. For this purpose, an amount of predicted interference caused by high-power protected transmitters on each channel available to the requesting radio device for wireless communications is determined, where interference from primary channel and out-of-band emissions of the transmitters is considered.
摘要:
Network access for a secure network is transparently provided to a wireless device using a social networking type of framework. An operator of a secure wireless network may register the network and access credentials for the network with a network access management system. The operator also may configure network access settings, such as designating a sharing level, that permits wireless devices meeting access criteria for the sharing level to use the network. Electronic devices belonging to social media contacts, such as family members and friends, may be associated with the registered network. When the associated devices or other qualifying devices are within communication range of the network, a client function in the device may coordinate with the network access management system to provide network access to the devices. The coordination may take place through a network different than the secure network, such as a cellular network to which the electronic device has subscription access. The network access may be established in a manner that is transparent to the user of the electronic device.