摘要:
A wireless communication method embeds service related information, including a version of a service associated with the service related information, within an initial wireless access message. The method may also include broadcasting the initial wireless access message including the embedded service related information. Another aspect of the present disclosure includes a wireless communication method that indentifies service related information embedded within an initial wireless access message. The method may also establish a connection with an access node of the wireless communication network to receive a service when a version of a service associated with the service related information satisfies a predetermined condition.
摘要:
Disclosed is a portable token device that may be used to assist a user in generating a PIN at one device and to then pass the PIN to another device such that the two devices can securely communicate with one another. The portable token device may include: an interface; and a processor. The processor may execute operations including: determining if a close proximity coupling through the interface to a first device has occurred; transmitting a PIN request to the first device; and obtaining a PIN. Further, the processor may determine if a close proximity coupling through the interface to a second device has occurred. If so, the processor may command transmitting the PIN to the second device. The second device may perform device registration with the first device based upon the received PIN.
摘要:
Methods and apparatus to a cross-layer approach to virtualized overlay on ad hoc networks are described. In one embodiment, a virtual address may be used to search for a (key,value) pair in a virtual overlay. Other embodiments are also described.
摘要:
In a network having a plurality of network devices communicating across the network, a method, includes performing a first scan of a first plurality of channels of the network, wherein the channels are scanned for a first scan time; identifying a list of one or more potentially available channels based on results of the first scan; performing a second scan of the network channels, the second scan scanning only those channels identified as potentially available channels based on the first scan, one of the each potentially available channel for a second scan time and wherein the second scan time is longer than the first scan time; and identifying an available channel based on results of the second scan and selecting the available channel for communication.
摘要:
According to various embodiments of the invention, a MAC protocol is presented that provides for coordinated communication in a personal area network. Further embodiments of the invention provide methods for aligning communications among multiple networks to reduce interference between the networks. Still further embodiments provide methods for communication frame formatting that allow prioritized access between a network coordinator and an end device while allowing the remaining end devices to communicate with the coordinator. In particular embodiments, the MAC protocol may be implemented in a BAN or WPAN.
摘要:
The present invention provides a storage device and a method for protecting its protected partition in which the storage device comprises a master boot record unit and a protected partition, the protected partition comprises an application data area and a system data area for storing application data and system data to be provided to a user, respectively, and the system data area is in a customized data format of nonstandard file system. With the storage device and the method for protecting its protected partition, security of system data in the protected partition of the storage device is enhanced.
摘要:
The present invention provides a storage device and a method for protecting its protected partition in which the storage device comprises a master boot record unit and a protected partition, the protected partition comprises an application data area and a system data area for storing application data and system data to be provided to a user, respectively, and the system data area is in a customized data format of nonstandard file system. With the storage device and the method for protecting its protected partition, security of system data in the protected partition of the storage device is enhanced.
摘要:
A new communication protocol based on a new physical interference model, and apparatuses and systems for implementing such protocols are described herein. The new communication protocol may be a new medium access control (MAC) protocol for a wireless network that uses different signal transmission powers for transmitting and receiving various MAC protocol packets.
摘要:
A method of communicating information in a communication network with a plurality of hierarchically addressed nodes includes receiving communication packets identifying 1-hop neighbor node addresses, a number of on-tree neighbors of neighbor nodes transmitting the received packets, and forwarding node addresses of forwarding nodes from which information in the received packets are to be rebroadcast. Further, the method includes identifying each 1-hop neighbor node which should be a forwarding node based on stored addresses and numbers of on-tree neighbors, and producing and transmitting a rebroadcast packet including addresses of forwarding nodes. A communication network system, a communication node in a communication network, and a computer program product include similar features. Communication packets embodied in an electromagnetic wave includes an address, a number of on-tree neighbors of neighbor nodes, and forwarding nodes from which the packets are to be rebroadcast.
摘要:
Methods and apparatus to a cross-layer approach to virtualized overlay on ad hoc networks are described. In one embodiment, a virtual address may be used to search for a (key,value) pair in a virtual overlay. Other embodiments are also described.