摘要:
Signal, e.g., message, security techniques are described for wireless systems. A first signal is received by an access node via a wireless link. The signal includes a first authenticator that was generated by the transmitting device, e.g., wireless terminal. The access node determines from an attribute of the signal at least some information known to both the access node and transmitting device but which was not transmitted as part of the message content. The determined information was used by the wireless terminal in generating the first authenticator. The access node sends at least a portion of the first signal including the first authenticator and the determined information to another entity. The entity compares the first authenticator to a second authenticator it generates from the determined information and a secure key which it shares with the transmitting device to determine if the first and second authenticators match.
摘要:
Location update techniques are described. A dormant mobile node updates its location information by sending a first message over a wireless link to an access node. The access node generates a second update message in response to the first message. The second message includes a mobile node identifier and, in some embodiments is directed to the mobile node. The second message is received by a tracking agent, which updates location information corresponding to the mobile node. In the case where second message is an IP message and is routed to the mobile node using Mobile IP, a Mobile IP home agent routes the second message to the mobile node's last point of network attachment where the tracking agent is located and intercepts the message. The tracking agent may send a response message to the access node sending the second message.
摘要:
Signal, e.g., message, security techniques are described for wireless systems. A first signal is received by an access node via a wireless link. The signal includes a first authenticator that was generated by the transmitting device, e.g., wireless terminal. The access node determines from an attribute of the signal at least some information known to both the access node and transmitting device but which was not transmitted as part of the message content. The determined information was used by the wireless terminal in generating the first authenticator. The access node sends at least a portion of the first signal including the first authenticator and the determined information to another entity. The entity compares the first authenticator to a second authenticator it generates from the determined information and a secure key which it shares with the transmitting device to determine if the first and second authenticators match.
摘要:
Location update techniques are described. A dormant mobile node updates its location information by sending a first message over a wireless link to an access node. The access node generates a second update message in response to the first message. The second message includes a mobile node identifier and, in some embodiments is directed to the mobile node. The second message is received by a tracking agent, which updates location information corresponding to the mobile node. In the case where second message is an IP message and is routed to the mobile node using Mobile IP, a Mobile IP home agent routes the second message to the mobile node's last point of network attachment where the tracking agent is located and intercepts the message. The tracking agent may send a response message to the access node sending the second message.
摘要:
Group communications methods and apparatus are described. Multiple modes of group communications signaling are supported. In a first mode, copies of packets are separately transmitted to each group member in a sector or cell. In a second mode a copy of a packet is directed to multiple group members at the same time. Transitions between the two modes may be determined as a function of the cost of operating in each of the modes in terms of system cost and/or the number of group members in a cell or sector being serviced by a transmitter.
摘要:
Signal, e.g., message, security techniques are described for wireless systems. A first signal is received by an access node via a wireless link. The signal includes a first authenticator that was generated by the transmitting device, e.g., wireless terminal. The access node determines from an attribute of the signal at least some information known to both the access node and transmitting device but which was not transmitted as part of the message content. The determined information was used by the wireless terminal in generating the first authenticator. The access node sends at least a portion of the first signal including the first authenticator and the determined information to another entity. The entity compares the first authenticator to a second authenticator it generates from the determined information and a secure key which it shares with the transmitting device to determine if the first and second authenticators match.
摘要:
Location update techniques are described. A dormant mobile node updates its location information by sending a first message over a wireless link to an access node. The access node generates a second update message in response to the first message. The second message includes a mobile node identifier and, in some embodiments is directed to the mobile node. The second message is received by a tracking agent, which updates location information corresponding to the mobile node. In the case where second message is an IP message and is routed to the mobile node using Mobile IP, a Mobile IP home agent routes the second message to the mobile node's last point of network attachment where the tracking agent is located and intercepts the message. The tracking agent may send a response message to the access node sending the second message.
摘要:
Techniques for efficiently sending reports in a wireless communication system are described. Reports may be sent repetitively in accordance with a reporting format. A terminal receives an assignment of a control channel used to send reports and determines a reporting format to use based on the assignment. The reporting format indicates a specific sequence of reports sent in specific locations of a control channel frame. The terminal generates a set of reports for each reporting interval and arranges the set of reports in accordance with the reporting format. The terminal repetitively sends a plurality of sets of reports in a plurality of reporting intervals. Reports may also be sent adaptively based on operating conditions. An appropriate reporting format may be selected based on the operating conditions of the terminal, which may be characterized by environment (e.g., mobility), capabilities, QoS, and/or other factors.
摘要:
A method for reducing the peak-to-average ratio in an OFDM communication signal is provided. The method includes defining a constellation having a plurality of symbols, defining a symbol duration for the OFDM communication signal, and defining a plurality of time instants in the symbol duration. A plurality of tones are allocated to a particular communication device, and a discrete signal is constructed in the time domain by mapping symbols from the constellation to the time instants. A continuous signal is generated by applying an interpolation function to the discrete signal such that the continuous signal only includes sinusoids having frequencies which are equal to the allocated tones.
摘要:
Wireless terminals and base stations support multiple modes of control channel operation wherein wireless terminals are allocated different amounts of uplink resources for reporting control information. A set of control channel segments is utilized by a wireless terminal to communicate uplink control information reports to its serving base station attachment point. Full tone and split-tone modes of control channel operation are supported. In full tone mode, a single wireless terminal is allocated each of the control channel segments associated with a single logical tone. In split tone mode, control channel segments associated with a single logical tone are allocated between different wireless terminals, with each of the multiple wireless terminals receiving a different non-overlapping subset of the control channel segments. Logical control channel tones can be dynamically reallocated for full-tone mode use or split tone mode use.