摘要:
A method is provided for scheduling transmission resources to a mobile station served by a plurality of base stations. According to the method of the invention, a centralized scheduler is provided at a network node operative to serve each of the plurality of base stations and the centralized scheduler acts to prioritize scheduling of transmission resources to the mobile station as a function of feedback information respecting data received by the mobile station from each of at least two of the plurality of base stations.
摘要:
A method is provided for scheduling transmission resources to a mobile station served by a plurality of base stations. According to the method of the invention, feedback information respecting data received by the mobile station from each of at least two of the plurality of base stations is received by the each of the plurality of base stations. An inference is then drawn at a second of the plurality of base stations of throughput parameters respecting a transmission channel between a first of the plurality of base stations and the mobile station. Transmission resources for the mobile station are then scheduled by the second base station as a function of the inferred throughput parameters.
摘要:
A method is provided for scheduling transmission resources to a mobile station served by a plurality of base stations. According to the method of the invention, feedback information respecting data received by the mobile station from each of at least two of the plurality of base stations is received by the each of the plurality of base stations. An inference is then drawn at a second of the plurality of base stations of throughput parameters respecting a transmission channel between a first of the plurality of base stations and the mobile station. Transmission resources for the mobile station are then scheduled by the second base station as a function of the inferred throughput parameters.
摘要:
A wireless communication system (20) includes a wireless network (30) that selectively modifies an aggregation of voice over internet protocol wireless transmissions. In one example, a mobile station geometry provides an indication whether modification of the aggregation is desirable. For example, a mobile station with a better geometry allows for a higher level of aggregation. Another disclosed example includes determining a current cell load condition and increasing the amount of aggregation and the level of aggregation as cell load conditions increase. Another disclosed technique includes staggering the scheduling of aggregated packets to avoid delays at a scheduler. One or more of the disclosed techniques may be used to efficiently transmit voice over internet protocol communications.
摘要:
An apparatus and a method for managing resources for efficient packet data transmission. More specifically, there is provided a method for allocating transmission resources in a base station comprising determining a largest supportable packet size for a highest priority user, wherein the determination is based at least partially on the available modulation types, a total number of codes available for packet transmission, a total amount of available transmission power available for packet transmission, and frame durations supported by a base station.
摘要:
Automated secure registration techniques for communication devices are provided which address the problem of allowing multiple clients to gain access to one system, and thus provide a solution to the “reverse single sign-on” problem. For example, a method for registering a group of two or more communication devices in a communication network comprises the following steps. A group challenge message is sent from a network device to the group of two or more communication devices. The network device receives one or more response messages to the group challenge respectively from one or more of the group of two or more communication devices, wherein the response message from each of the responding communication devices in the group comprises a group credential corresponding to the group.
摘要:
Principles of the invention provide one or more secure key management protocols for use in a communication environment such as a conferencing system. For example, a method for managing a conference between two or more parties in a communication system comprises the following steps. An identity based authenticated key exchange operation is performed between a conference management element of the communication system and each of the two or more parties seeking to participate in the conference, wherein messages exchanged between the conference management element and the two or more parties are encrypted based on respective identities of recipients of the messages, and further wherein the conference management element receives from each party during the key authentication operation a random key component that is computed based on a random number selected by the party. The conference management element sends to each party a set comprising the random key components computed by the parties. The conference management element receives from each party a random group key component, wherein the random group key component is computed by each party via a computation based on the random number used by the party during the key authentication operation and the random key components computed by a subset of others of the two or more parties seeking to participate in the conference. The conference management element sends to each party a set comprising the random group key components computed by the parties such that each party can compute the same group key for use in communicating with each other party through the conference management element.
摘要:
Automated secure registration techniques for communication devices are provided which address the problem of allowing multiple clients to gain access to one system, and thus provide a solution to the “reverse single sign-on” problem. For example, a method for registering a group of two or more communication devices in a communication network comprises the following steps. A group challenge message is sent from a network device to the group of two or more communication devices. The network device receives one or more response messages to the group challenge respectively from one or more of the group of two or more communication devices, wherein the response message from each of the responding communication devices in the group comprises a group credential corresponding to the group.
摘要:
Principles of the invention provide one or more secure key management protocols for use in communication environments such as a media plane of a multimedia communication system. For example, a method for performing an authenticated key agreement protocol, in accordance with a multimedia communication system, between a first party and a second party comprises, at the first party, the following steps. Note that encryption/decryption is performed in accordance with an identity based encryption operation. At least one private key for the first party is obtained from a key service. A first message comprising an encrypted first random key component is sent from the first party to the second party, the first random key component having been computed at the first party, and the first message having been encrypted using a public key of the second party. A second message comprising an encrypted random key component pair is received at the first party from the second party, the random key component pair having been formed from the first random key component and a second random key component computed at the second party, and the second message having been encrypted at the second party using a public key of the first party. The second message is decrypted by the first party using the private key obtained by the first party from the key service to obtain the second random key component. A third message comprising the second random key component is sent from the first party to the second party, the third message having been encrypted using the public key of the second party. The first party computes a secure key based on the second random key component, the secure key being used for conducting at least one call session with the second party via a media plane of the multimedia communication system.
摘要:
A method for securing at least one message transferred in a communication system from a first computing device to a second computing device in a peer-to-peer manner. At the first computing device, an identity based authenticated key exchange session is established with a third computing device operating as a peer authenticator. The identity based authenticated key exchange session has an identity based authenticated session key associated therewith. The first computing device obtains from the third computing device a random key component of the second computing device, wherein the random key component of the second computing device is encrypted by the third computing device using the identity based authenticated session key prior to sending the random key component of the second computing device to the first computing device. A peer-to-peer messaging key is computed at the first computing device using the random key component of the second computing device.