摘要:
A decoding system processes a received vector r to produce a soft symbol information vector output s including a reliability value for each received code symbol. From the reliability values, clusters of symbols within the received vector r having low reliability are identified and detected. Responsive thereto, the received vector r is permuted to scatter the low reliability symbols within each detected low reliability cluster throughout a given codeword. A decoding generator matrix G is also correspondingly permuted is response to the detection of low reliability clusters of symbols. Utilizing a trellis obtained from the permuted decoding generator matrix G', the permuted received vector r' is then sequentially or otherwise suboptimally decoded.
摘要:
A coding system is disclosed wherein the receive side includes a decoder capable of producing, in addition to the hard information decoded output, either or both symbol and/or bit soft information values. For a certain information bit position, a value proportional to the joint probability that a received symbol and the set of all hypothesized transmitted codewords that led to the estimated or detected hard information output is calculated. The calculated probabilities with respect to plural codewords having a zero in that certain information bit position are compared to the calculated probabilities with respect to the plural codewords having a one in that certain information bit position. The result of the comparison provides an indication of whether the hard information output in that same information bit position is more likely a one or a zero. The output soft information values are further processed in comparison to a preset threshold, with instances exceeding the threshold triggering block rejections and/or retransmissions.
摘要:
A source sequence of information symbols is encoded according to each of a plurality of codes to produce a plurality of encoded sequences of symbols, a respective one of the plurality of codes producing a respective one of the plurality of encoded sequences of symbols from the source sequence of information symbols. The plurality of encoded sequences of symbols are combined to produce a sequence of communications symbols. The sequence of communications symbols is processed to produce a communications signal which is then communicated over a communications medium. The communicated communications signal is processed to produce an estimate of the source sequence of information symbols. The source sequence is preferably encoded according to a first error correction code to produce a first encoded sequence of symbols, and encoded according to a second error correction code to produce a second encoded sequence of symbols. The first and second encoded sequences of symbols preferably are multiplexed to produce the sequence of communications symbols. The first error correction code preferably comprises a random error correction code such as a binary convolutional code, while the second error correction code preferably comprises a burst error correction code, for example, a nonbinary convolutional code such as a dual-k convolutional code, thereby providing random and burst error correction capability.
摘要:
The concepts relate to broadcasting white space utilization. One example can interact with a wireless device that is configured to obtain authorization to use a set of radio white space frequencies in accordance with one or more constraints. The example can obtain an individual radio white space frequency and associated individual constraints. This example can also utilize the individual radio white space frequency for network access independent from the wireless device that is configured to obtain the authorization.
摘要:
A wireless peer-to-peer protocol that supports fast and low power joining to an existing group. The protocol may be an extension of a peer-to-peer protocol that supports a sleep state for a device controlling the group. When a device is seeking to join a group at a time when the controlling device is in a sleep state, another device that has information about the controlling device may provide information to the joining device that may then be used by the joining device to more quickly, and using less power, synchronize with the controlling device. The information may include information about a channel used by the controlling device or about timing of availability of the controlling device. The information may also reveal whether the group provides a service being sought by the joining device or may otherwise influence whether the joining device will attempt to join a group.
摘要:
A computing device configured for wireless communication may effectively control adaptation to channel conditions. The device may be configured to identify and classify conditions impacting performance of a channel so that appropriate adaptations may be made. Interference may be detected by correlating received signal strength and packet errors. High received signal strength correlated to a high packet error rate may signify presence of a source of interference. Once a source of interference is detected, other criteria may be used to determine the nature of the interference so that an adaptation that is minimally disruptive of applications can be selected. Additionally, channel degradation may be predicted by monitoring trends in error rates, including Forward Error Correction rates, and adaptation may be used before packet error rates exceed an unacceptable level.
摘要:
A wireless access point in a wireless network that may be adapted to transmit location data indicating its location to other devices within range, including other wireless access points and client devices. In some embodiments of the invention, the location data may be embedded in a control message or announcement transmission transmitted by the wireless access point, or other message conventionally used to broadcast network characteristics necessary for a client device to establish a connection to the wireless access point. In terms of the Open Systems Interconnect (OSI) layered model of a network, layer 2 control messages, including beacons, probe responses, or other suitable transmissions may be used for control messages or announcement transmissions. The other wireless access points and client devices may receive the location data broadcast by the wireless access point without establishing a connection to the client device. Devices receiving the location data may use the received location data to determine their own locations, and may provide the determined locations to consumers of location data.
摘要:
The concepts relate to radio white space utilization. One example can measure a potential radio white space frequency. The example can also communicate results of the measuring for other devices and receive other results from the other devices relating to the potential radio white space frequency. The method can further determine whether the potential radio white space frequency is actually an available radio white space frequency based upon the results and the other results.
摘要:
A mechanism for a wireless device to obtain access to network connectivity through a WAN-enabled device. The wireless device may use peer-to-peer communication to request the WAN-enabled device enter a mode in which it serves as an access point to its WAN. The wireless device may then associate with the WAN-enabled device in its role as an access point to access connectivity services. Such a capability may be used, for example, to allow a wireless computing device to gain access to the Internet through a smartphone or other device that has Internet access, and can also be configured to communicate in accordance with the Wi-Fi and Wi-Fi Direct standards.
摘要:
Guest user are enabled to access network resources through an enterprise network using a guest user account. A guest user account may be created for a guest for a limited time. Guest account credentials of the guest account may be provided to the guest to use the guest account using any of a variety of techniques described herein, for example, by scanning a guest access card, credit card or mobile telephone of guest user, and providing the guest account credentials to the user based on the information obtained. A guest access management server may be configured to generate and maintain guest accounts, authenticate guest users, and track and log guest activity. A VLAN technology may be used to separate guest traffic from host enterprise traffic on the host enterprise network. After a guest user is authenticated, communications to and from the guest user may be routed to a guest VLAN.