摘要:
In a communication system that utilizes DMT technology to couple a primary site (102) to a plurality of secondary sites (104-108), carrier channel allocations may be updated as follows. At periodic intervals, the primary site requests updating bit loading information from the secondary sites. Upon receiving the updated bit loading information, the primary site (102) determines an updated call bit loading table for each active call. From this, the primary site (102) determines whether current carrier channel allocation provides sufficient bandwidth. When the current carrier channel allocation does not provide the sufficient bandwidth, the primary site modifies the current carrier channel allocation to meet the bandwidth requirements.
摘要:
In a communication system that utilizes DMT technology to couple a primary site (102) to a plurality of secondary sites (104-108), the primary site (102) and each of the secondary sites (104-108) includes a DMT receiver. Such a DMT receiver includes a discrete multi-tone decoder that receives a time domain discrete multi-tone symbol and produces an ordered data stream based on bit loading information and a data de-formatter, operably coupled to the discrete multi-tone decoder, wherein the data de-formatter receives the ordered data stream and produces a recovered data stream based on carrier channel allocation information.
摘要:
In a communication system utilizing DMT technology to couple a primary site (102) to a plurality of secondary sites (104-108), infrastructure control channels are established in the following manner. Having obtained a plurality of site bit loading tables, the primary site (102) generates a control channel bit loading table from the plurality of site bit loading tables. From the control channel bit loading table, the primary site selects at least one carrier channel to function as the control channel. The selection is based on bandwidth requirements for the control channel.
摘要:
In a communication system that employs DMT technology to couple a primary site (102) to a plurality of secondary sites (104-108), call support infrastructure is obtained as follows. Having received a call request, the primary site (102) identifies targeted subscribers and target secondary sites, i.e., the secondary sites having a targeted subscriber affiliated therewith. Next, the primary site determines a call bit loading table from the site bit loading tables of the target secondary sites. Having done this, the primary site selects, based on bandwidth requirements of the call, at least one carrier channel to provide the infrastructure support for the call.
摘要:
A data stream provided to a DMT transmitter (114) is altered to produce an ordered data stream. The ordered data stream is produced by storing the data stream using a first addressing scheme, and then reading the data using a second addressing scheme. The ordered data stream is then converted in to a DMT symbol which is transmitted to a DMT receiver (112). The DMT receiver (112), using the first and second addressing schemes, recovers the ordered data stream and then the original data stream.
摘要:
A communication system (100) includes a primary site (102) coupled to a plurality of secondary sites (104-108) using DMT technology. The primary site (102) includes a controller, a data multiplexing switch, a Discrete Multi-Tone transmitter, and a Discrete Multi-Tone receiver. Each of the secondary sites (104-108) includes a site controller, a subscriber interface, and a secondary Discrete Multi-Tone receiver.
摘要:
In a communication system that utilizes DMT technology to couple a primary site (102) to a plurality of secondary sites (104-108), the primary site (102) and each of the secondary sites (104-108) includes a DMT transmitter. Such a DMT transmitter includes a discrete multi-tone encoder that receives an ordered data stream and produces an encoded data stream based on bit loading information, and a data formatter operably coupled to the discrete multi-tone encoder, wherein the data formatter receives transmit data entries and produces the ordered data stream based on carrier channel allocation information.
摘要:
In a communication system that utilizes DMT technology to couple a primary site (102) to a plurality of secondary sites (104-108), carrier channel allocations may be performed as follows. When a call request is received, the primary site (102) determines the number of required bits based on the bandwidth requirements of the call. Next, the primary site (102) determines whether the maximum bit loading of a given carrier channel exceeds the number of required bits. If yes, the primary site allocates a carrier channel having a bit loading that most closely matches the number of required bits. If no, the primary site allocates the carrier channel having the maximum bit loading to the call, then calculates a remaining number of required bits. From here, the primary site repeats the above process until a sufficient number of carrier channels have been allocated to the call.
摘要:
Preventing unauthorized monitoring of wireless data transmissions is accomplished by routing requests for data, from communication units (114) operating on wireless communication systems (101), to a security gateway (103) which determines a transmission security level, based on the type of data requested, the identity of the data requester, and the identity of the database containing the requested data. Once this is determined, the security gateway (103) establishes a secure communication with the communication unit according to the transmission security level. If the secure communication was successful, the security gateway (103) routes the requested data to the communication unit (114).
摘要:
Detection of illicit radio frequency (RF) data transmissions is accomplished by employing an RF security monitor (120) positioned within the transmission range of a wireless communication system (101). As a first RF node (109) communicates data to a second RF node (111 ) via an RF communication path (115), the RF security monitor (120) monitors this communication to determine whether it is an illicit RF data communication. Illicit RF data communications may include, but are not limited to, a particular data type that should not be transmitted over a wireless channel, or data transmitted with an improper security level. When an illicit RF data communication occurs, the RF security monitor (120) sends a message to a data distributor (104) informing the data distributor (104) of the illicit RF transmission. Typically, the data distributor (104) will respond with an instruction as to how this and subsequent illicit RF transmissions are to be handled.