摘要:
Forward error correction is used in conjunction with detection of a start frame delimiter (SFD) to provide flexibility and to reduce missed instances of an SFD. Candidate SFDs in an incoming signal are identified using a lower-than-normal detection threshold, and corresponding markers are stored in a buffer. For each stored marker, a physical layer header following the candidate SFD is decoded with error-correction techniques, to determine whether uncorrectable errors exist. If so, the candidate is discarded and the next candidate is evaluated. If no uncorrectable errors exist, the candidate is declared a valid SFD, and the remaining signal is decoded. Dual detection thresholds can be employed in networks that permit both error-encoded and non-coded packets. A technique for selecting SFD patterns that facilitate higher performance is also disclosed.
摘要:
Forward error correction is used in conjunction with detection of a start frame delimiter (SFD) to provide flexibility and to reduce missed instances of an SFD. Candidate SFDs in an incoming signal are identified using a lower-than-normal detection threshold, and corresponding markers are stored in a buffer. For each stored marker, a physical layer header following the candidate SFD is decoded with error-correction techniques, to determine whether uncorrectable errors exist. If so, the candidate is discarded and the next candidate is evaluated. If no uncorrectable errors exist, the candidate is declared a valid SFD, and the remaining signal is decoded. Dual detection thresholds can be employed in networks that permit both error-encoded and non-coded packets. A technique for selecting SFD patterns that facilitate higher performance is also disclosed.
摘要:
Systems and methods for multimode signal acquisition. The systems include a multimode receiver that is configured to determine a communication mode for a received signal. The receiver includes, for example, one or more analysis modules for analyzing a characteristic of a portion of the received signal (e.g., a preamble). The receiver samples the received signals and one or more analysis modules perform frequency analysis on the digital form of the received signal (e.g., using a Goertzel algorithm). The outputs of the analysis modules are then provided to a classification module. The classification module compares, for example, a power spectral density (“PSD”) value for one or more frequencies of interest specific to the different communication modes to predetermined PSD values at those frequencies to determine the communication mode. The receiver is then configured for the full acquisition of signals transmitted using the determined communication mode.
摘要:
A method of receiving a bitstream. The method includes receiving a sequence of bits of a bitstream, assigning a confidence level to each bit in the sequence of bits, maintaining a running confidence level of the sequence of bits as the bits are received, comparing the running confidence level to a threshold, terminating reception of the bitstream when the running confidence level is below the threshold, and requesting retransmission of the bitstream. Wherein the reception of the bitstream and the requesting of retransmission of the bitstream occurs prior to the entire bitstream being received.
摘要:
A wireless communication network system includes a plurality of nodes. Each node from the plurality of nodes includes a plurality of communication modules. Each module includes a modem and is configured to operate according to a communication protocol. Each communication module is configured to monitor its own communication parameter data and to cooperate with companion modules of a node by sharing communication parameter data, for instance through a coordination unit. Each communication module is further configured to allow, preferably according to a predefined set of rules, communication using a protocol of one communication module by utilizing a band associated with a companion module. The sharing of communication parameter data between modules may be continuous sharing or periodic sharing.
摘要:
To provide overall security to a utility management system, critical command and control messages that are issued to components of the system are explicitly approved by a secure authority. The explicit approval authenticates the requested action and authorizes the performance of the specific action indicated in a message. Key components of the utility management and control system that are associated with access control are placed in a physical bunker. With this approach, it only becomes necessary to bunker those subsystems that are responsible for approving network actions. Other management modules can remain outside the bunker, thereby avoiding the need to partition them into bunkered and non-bunkered components. Access to critical components of each of the non-bunkered subsystems is controlled through the bunkered approval system.
摘要:
A mobile device communicates with an authenticator affiliated with a recharging facility, to identify itself. To confirm that the mobile device is connected to the correct facility, the authenticator instructs the mobile device to draw electrical charge according to an identifiable pattern. Upon detecting a charge being drawn according to that pattern, the authenticator has confirmation that the identified device is connected to the facility, and permits the charging to proceed. The amount of electricity drawn during the charging procedure can be metered, and then billed to a party associated with the identified mobile device.
摘要:
To provide overall security to a utility management system, critical command and control messages that are issued to components of the system are explicitly approved by a secure authority. The explicit approval authenticates the requested action and authorizes the performance of the specific action indicated in a message. Key components of the utility management and control system that are associated with access control are placed in a physical bunker. With this approach, it only becomes necessary to bunker those subsystems that are responsible for approving network actions. Other management modules can remain outside the bunker, thereby avoiding the need to partition them into bunkered and non-bunkered components. Access to critical components of each of the non-bunkered subsystems is controlled through the bunkered approval system.
摘要:
An apparatus and method for interference cancellation using software or low speed hardware. Antenna signals are received and selected. After selection, interference cancellation processing is applied. In one embodiment, the signal is a spread spectrum signal and selection includes despreading the signal. In one example, the interference cancellation processing includes a phase rotation step and a magnitude manipulation step.
摘要:
A mobile device communicates with an authenticator affiliated with a recharging facility, to identify itself. To confirm that the mobile device is connected to the correct facility, the authenticator instructs the mobile device to draw electrical charge according to an identifiable pattern. Upon detecting a charge being drawn according to that pattern, the authenticator has confirmation that the identified device is connected to the facility, and permits the charging to proceed. The amount of electricity drawn during the charging procedure can be metered, and then billed to a party associated with the identified mobile device.