Abstract:
Disclosed herein are methods and systems for node operation according to network-wide resource-allocation schedules. One embodiment takes the form of a method carried out by a given node within an ad-hoc wireless network, which includes a controller node for a current time period. The method includes obtaining one or more air-interface resource requests for the current time period, where each obtained resource request indicates a requesting node and a requested resource. The method further includes using a network-standard algorithm for deriving a network-wide resource-allocation schedule for the current time period based at least in part on the obtained resource requests. The method further includes verifying the derived resource-allocation schedule based at least in part on a verification value derived by the controller node from the network-wide resource-allocation schedule using a network-standard verification function. The method also includes operating according to the verified resource-allocation schedule for the current time period.
Abstract:
A method and deployable cell are provided that validate a deployable cell to be fully operational. Upon powering up, the deployable cell is established as operational in a restricted mode. When an attach request is received from a mobile device at the deployable cell, the deployable cell determines if the mobile device making the attachment request is a supervising device. If so, the operational status of the deployable cell is changed from restricted mode with limited capabilities to fully operational mode.
Abstract:
A method and apparatus for provisioning subscriber information to a deployable network in a wirelress communication system. One exemplary embodiment provides a method providing subscriber information to a deployable network including a deployable user subscription database. The method includes determining, by a controller, a location for the deployable network. The method further includes determining, by the controller, a geofence around the location. The method further includes identifying, by the controller, at least one mobile device that may be involved in responding to the incident. The method further includes determining, by the controller, authentication information required for the at least one mobile device to connect to the deployable network. The method further includes conveying, by the controller via a wireless data network, the authentication information to a deployable user subscription database.
Abstract:
A Long Term Evolution (LTE) Concentrator and Distributor system and method extends geographical coverage while minimizing Evolved Node B (eNB) deployments. The system and method use a distributed array of Wide Band Receiver Transmitter (WBRT) devices (i.e., RF Heads, RFH, including antennas) connected via wide-band links to a central standard LTE eNB through a novel LTE Concentrator-Distributor (LTE-CD) which is an uplink (smart optimal) concentrator and downlink simulcast distributor. The eNB downlink signal (baseband or modulated RF) is distributed in synchronization (simulcast) through the LTE-CD to all WBRTs for downlink simulcast transmission to all UEs in the coverage area. The WBRTs receive uplink signals from user equipment, UE, devices in a coverage area, send the uplink signals (baseband or modulated RF) to the LTE-CD which optimally combines all received signals into one best uplink signal that is sent (in baseband or modulated RF) to the eNB.