摘要:
A method and system for fast setup of group Voice over Internet Protocol (VoIP) communications. The method and system provide a lower VoIP signaling overhead and a faster setup-time of group calls such as N-way audio and/or audio-video conference calls. Multi-party VoIP connections are quickly set-up over one or more virtual communications channels established between plural network devices using a session layer application, one or more group transport layer ports and a broadcast destination network address.
摘要:
Disclosed examples of secure communications involve generating, by a mobile communication network device, a shared secret data having a length of M units. A first operation on groups of one of N units of a randomly generated base shared secret data and one of a plurality of secret values thereby generates a plurality of first operation results. A second operation on a select plurality of the first operation results generates a plurality of second operation results. The randomly generated base shared secret data can have a length of N units, where N is less than M. The shared secret data is constructed from at least one of the first operation results and the plurality of second operation results.
摘要:
A mobile radio communication system is disclosed in which personality information for a radio can be modified in order to permit the radio to roam from one broadcast region to another. Since each broadcast region is serviced by a different gateway, the radios within that region use particular personality information in order to communication with it. When the radios roam from one region to another, the radios request new personality information relevant to the destination region. Each radio uses local identification data to uniquely identify the radio within the system. When the radio roams, the gateway provides the radio with new local identification data relevant to the destination region. The local identification data for each radio in a given region is mapped by the gateway in a memory such that available local identification data can be re-assigned to radios that roam into the gateway region. Then, when the radio leaves the region, the local identification data that was given to the radio is de-allocated such that it is then available to another radio that roams into the region.
摘要:
Disclosed examples of secure communications involve generating, by a mobile communication network device, a shared secret data having a length of M units. A first operation on groups of one of N units of a randomly generated base shared secret data and one of a plurality of secret values thereby generates a plurality of first operation results. A second operation on a select plurality of the first operation results generates a plurality of second operation results. The randomly generated base shared secret data can have a length of N units, where N is less than M. The shared secret data is constructed from at least one of the first operation results and the plurality of second operation results.
摘要:
Content may be transmitted to mobile devices, in a network, using a Multimedia Broadcast Multicast Services (MBMS) multicast technique over wireless interfaces in the network. In one implementation, network elements in the network may receive feedback about the MBMS multicast transmission, where the feedback relates to a quality of the content, as received by the one or more mobile devices, or to the quality of the radio channel. The devices may determine whether to modify transmission parameters relating to the MBMS multicast transmission and may determine whether to retransmit lost data, corresponding to the content, to the mobile devices. The lost data may be retransmitted as a unicast transmission or a multicast transmission.