Abstract:
A network synchronization method designed to provide synchronization of multiple networks and devices. This invention provides a specific method for determining which nodes are responsible for network synchronization as nodes fail or cannot see each other due to conditions on the network. This allows for fault tolerance in a network in which conditions change dynamically. In addition, this invention uses synchronization codes and network numbers to isolate separate networks using the same physical medium, thus allowing sharing of network resources.
Abstract:
A bandwidth allocation method and system designed to provide efficient bandwidth utilization based on data priority and needs of network nodes. This invention provides a specific design for dynamically creating, deleting, resizing, and reclaiming network channels based on priority and the needs of existing connections within a network or within multiple networks. Additionally, this invention provides a process to make channels and their encryption keys persistent through the creation of virtual channels which are made active when data needs to be transferred.
Abstract:
A network access system designed to provide efficient access to nodes using a communication channel based on the needs of the system. This invention provides a specific design for token based access scheme which allows access based on priority, time, and data requirements. Also included is a unique collision detection and token granting mechanism. These designs provide for nodes to efficiently request and gain access to network bandwidth and are adaptive to allow for different data types such as voice, video, control, and data over networks such as power line or wireless.
Abstract:
A data networking system designed to provide efficient yet reliable transportation of data across a time division multiplexed network. This invention allows for redundantly sending and resending of segments in a dynamic manner. In addition, segments are fragmented, resized and sent with low overhead due to dynamic header sizes, segment sizes, forward error correction, and cyclic redundancy checks. The result is a very adaptive network that meets the demanding requirements of networks such as power line and wireless while still being able to transport data for voice, audio, video, computer, control, and the like.
Abstract:
A network security system designed to provide per-packet encryption based on an encryption key identifier and an associated encryption key. Packets or groups of packets are encrypted based on information that relates to the packet such as service type, network number, and the like. This encryption criterion is associated with an encryption key and encryption key identifier. When a packet contains the certain criteria, the packet is encrypted using the encryption key. The packet is sent across the network using the encryption key identifier and the encrypted payload. The targeted nodes decrypt the packet using the reverse process.
Abstract:
Apparatus and methods of implementing code space search of received signals are described herein. A code space search is implemented as a searcher that perform a subtask that is dynamically reconfigurable at each boundary of an initial integration time. Each particular subtask sets forth a programmable configuration of coherent integration hypothesis that are performed during the initial integration time. The searcher stores the results of the coherent integration hypothesis in a first portion of memory. A search accelerator operates on the initial integration results. The search accelerator can perform coherent integration of various frequency bins of different timing hypothesis, can generate energy values of the coherent integration results, and can generate a non-coherent energy summation. The energy values of the coherent integrations and non-coherent energy summations are stored in a second portion of memory. The ability to reconfigure the subtasks and accelerator operation provides flexibility in search space dimensions.
Abstract:
Methods and apparatus are provided for use in devices adapted to receive signals from at least one satellite positioning system (SPS). As part of at least one search for a transmission from a space vehicle (SV) associated with the SPS, the methods and apparatuses may correlate a code associated with the SV with a received signal to establish a plurality of correlation values, sample at least a portion of the correlation values during the search, and selectively transitioning the search early or prematurely based, at least in part, on at least one of the sampled correlation values.
Abstract:
A method and system of testing an electronic device can be performed by estimating the die temperature using correlation data previously collected for other electronic devices. In one embodiment, correlation data can include (1) die temperatures measured and (2) currents drawn by the electronic devices, testing voltages for the electronic devices, or powers consumed by the electronic devices during the testing. The correlation data can be used to generate an equation or be stored in a table. A method of testing a subsequent electronic device can include testing the subsequent electronic device. The method can also include estimating a die temperature for the subsequent electronic device during testing, wherein the die temperature can be estimated at least in part using a current drawn by the subsequent electronic device, a testing voltage for the subsequent electronic device, or a power consumed by the subsequent electronic device.
Abstract:
A method for reducing call dropping rates in a multi-beam communication system. The multi-beam communication system includes a user terminal, a gateway, and a plurality of beam sources, where each beam source projects a plurality of beams, and where a communication link between the user terminal and the gateway is established on one or more beams. The method according to the present invention relies on a messaging protocol between the gateway and the user terminal. Based on messages sent from the user terminal to the gateway, preferably on a preselected periodic basis, the gateway can determine the more desirable beam(s) for transmitting data or information to the user terminal. The messages sent from the user terminal to the gateway contain values representing beam strengths as measured at the user terminal. The gateway uses the user terminal measured beam strengths to select the beams that should be used for transmitting data or information to the user terminal. The beams that should be used are the beams that if used will decrease the call dropping rates and provide a desired level of beam source diversity.
Abstract:
In a radio frequency (RF) receiver, a receiver RF chain is tuned to a first (e.g., global positioning system (GPS)) channel to permit receipt of a first (e.g., GPS) signal over the first (e.g., GPS) channel on the receiver RF chain during a first time duration. The receiver RF chain is tuned to a second (e.g., cellular page) channel to permit receipt of a second (e.g., cellular page) signal over the second (e.g., cellular page) channel on the receiver RF chain during a second time duration, following the first time duration. The first (e.g., GPS) signal is processed during the first time duration and the second time duration, without any apparent interruption of the first (e.g., GPS) signal during the second time duration. The processing, for example, provides a bridge signal (e.g., an estimated GPS signal on the receiver RF chain) during the second time duration.