摘要:
An optical network has an optical splitter connected to (1) a working optical subscriber unit (OSU) of a working circuit, (2) a protection OSU of a protection circuit, and (3) one or more optical network terminals (ONTs), where an ONT has (i) a working line termination (LT) unit of the working circuit and connected to the optical splitter via a working optical fiber and (ii) a protection LT unit of the protection circuit and connected to the optical splitter via a protection optical fiber. The present invention enables fast protection switching from the working circuit to the protection circuit. The arrival times of corresponding downstream cells are measured at both the working and protection LT units of the ONT, and information related to the arrival times is transmitted from the ONT to the protection OSU. A propagation delay value is generated based on the transmitted information for use by the protection OSU for communications with the ONT if and when protection switching is implemented upon detection of a failure in the working circuit.
摘要:
An optical network has an optical splitter connected to (1) a working optical subscriber unit (OSU) of a working circuit via a working optical fiber, (2) a protection OSU of a protection circuit via a protection optical fiber, and (3) one or more optical network terminals (ONTs), where the protection OSU has a protection burst mode receiver (BMR) configured to receive an upstream optical signal from the optical splitter. The algorithm determines whether the protection OSU is functioning improperly. A reset pulse is applied at the protection BMR at a particular timing position and an attempt is made to interpret the current upstream cell received at the protection BMR. This process is repeated using different timing positions for the BMR reset pulse until the current upstream cell is correctly interpreted, e.g., based on the correct identification of an ATM header error correction (HEC) byte in the upstream cell. If, after a specified number of cycles, no upstream cells are correctly interpreted, then the protection circuit is determined to have failed. In one embodiment, the algorithm is based on a cell delineation procedure implemented as a state machine.
摘要:
An optical network has an optical splitter connected to (1) a working optical subscriber unit (OSU) of a working circuit via a working optical fiber, (2) a protection OSU of a protection circuit via a protection optical fiber, and (3) one or more optical network terminals (ONTs). The present invention enables fast protection switching from the working OSU to the protection OSU. In one embodiment, the arrival times of corresponding upstream ranging reply PLOAM cells are measured at both the working and protection OSUs during ranging operations of the working OSU. In another embodiment, a cell delineation procedure is initiated at the protection OSU during normal, non-ranging operations of the working OSU to enable the protection OSU to correctly delineate upstream cells and the arrival times of corresponding upstream cells are then measured at both the working and protection OSUs. In either case, a propagation delay value is generated based on the measured arrival times for use by the protection OSU for communications with the one or more ONTs if and when protection switching is implemented upon detection of a failure in the working circuit, possibly without requiring the protection OSU to perform any ranging for the one or more ONTs.
摘要:
A mobile station can be authenticated by, for example, sending a challenge to a mobile station, and receiving a first authentication response from the mobile station through a wireless link, the first authentication response being generated based on the challenge and an authentication key stored at the mobile station. A second authentication response is generated based on the first authentication response. The second authentication response is provided to an IMS network for authenticating the mobile station to enable the mobile station to access the IMS network. In some examples, an authentication response of the mobile station is carried in an SIP message sent from the femtocell to a server that can authenticate the mobile station or forward the authentication response to another server that can authenticate the mobile station. Authentication of the mobile station can be performed as an integrated part of or separate from a registration process.
摘要:
In general, a method is described for handing off a communication session associated with a mobile device from a first network running a first technology to a second network running a second technology different from the first technology, the method comprising: establishing a communication channel with the mobile device through the first network; and enabling, through the communication channel, a handoff of the communication session associated with the mobile device from the first network to the second network.
摘要:
In addition to other aspects disclosed, through a non-secure network, one or more bidirectional secure logical connections are established between a mobile base station and a secure network interface.
摘要:
A radio node bridges a first communication session from an access terminal using a first communication protocol to a network using a second communication protocol, and requests that a second communication session between the access terminal and the network be established, the second communication session using the first communication protocol. The radio node receives instructions for the access terminal to join the second session and instructs the access terminal to transfer an active call from the first session to the second session.
摘要:
A method including wirelessly receiving a communication from a wireless device at a receiving device where the communication designated for transmission through the receiving device, recognizing a non-address portion of the communication as indicative of a command for the receiving device, and terminating the communication at the receiving device.