摘要:
A mobile terminal is carried by a moving object, and the mobile station is configured to perform wireless communications with a base terminal from among a plurality of base stations. The mobile station acquires a communication status between itself and at least a first base station and a second base station from among the plurality of base stations. The mobile station performs wireless communications with a base station from among the first base station and the second base station of which the communication status satisfies a communication condition that is most distant.
摘要:
A mobile terminal is carried by a moving object, and the mobile station is configured to perform wireless communications with a base terminal from among a plurality of base stations. The mobile station acquires a communication status between itself and at least a first base station and a second base station from among the plurality of base stations. The mobile station performs wireless communications with a base station from among the first base station and the second base station of which the communication status satisfies a communication condition that is most distant.
摘要:
A wireless communication authentication program whereby a slave station in a small-scale wireless LAN system can be authenticated by a simple procedure. A wireless communication authentication device periodically increments a first system timer value (Step S1) for which an optional numerical value is set beforehand. A wireless communication device sets therein a second system timer value (Step S2) so as to coincide with the first system timer value and periodically increments the second system timer value (Step S3). The wireless communication device transmits an authentication request command including a third system timer value (Step S4), and the wireless communication authentication device compares the third system timer value included in the authentication request command with the first system timer value thereof assumed at the time of reception of the command (Step S6). In accordance with the comparison result, the wireless communication authentication device determines whether to authenticate the wireless communication device.
摘要:
If a radio LAN apparatus moves from a communication range of a first access point to a communication range of a second access point, and if communication link between the radio LAN apparatus and the first access point is broken, a memory control section stops transmitting data to the first access point. At this time, data to be transmitted to the first access point are not deleted from memory. After the radio LAN apparatus enters the communication range of the second access point, the memory control section resumes transmission of the data stored in the memory. Thereafter, the next data are transmitted. Thus, the data is transmitted in proper sequence.
摘要:
If a radio LAN apparatus moves from a communication range of a first access point to a communication range of a second access point, and if communication link between the radio LAN apparatus and the first access point is broken, a memory control section stops transmitting data to the first access point. At this time, data to be transmitted to the first access point are not deleted from memory. After the radio LAN apparatus enters the communication range of the second access point, the memory control section resumes transmission of the data stored in the memory. Thereafter, the next data are transmitted. Thus, the data is transmitted in proper sequence.
摘要:
A wireless communication authentication program whereby a slave station in a small-scale wireless LAN system can be authenticated by a simple procedure. A wireless communication authentication device periodically increments a first system timer value (Step S1) for which an optional numerical value is set beforehand. A wireless communication device sets therein a second system timer value (Step S2) so as to coincide with the first system timer value and periodically increments the second system timer value (Step S3). The wireless communication device transmits an authentication request command including a third system timer value (Step S4), and the wireless communication authentication device compares the third system timer value included in the authentication request command with the first system timer value thereof assumed at the time of reception of the command (Step S6). In accordance with the comparison result, the wireless communication authentication device determines whether to authenticate the wireless communication device.
摘要:
A network device is connected to another network device over a network and performs multicast transmission and reception over the network. The network device stores in a storage unit in a corresponding manner a drop address that uniquely identifies data to be dropped from the network and control data that indicates whether dropped data is to be forwarded or deleted. The network device drops the data based on the drop address, and then either forwards or deletes the dropped data based on the control data.
摘要:
A multicast network system is provided with a multicast network unit that delivers data between independent multicast network domains. The multicast network unit includes an extraction part for extracting a multicast delivery destination address from received data, a holder part for holding conversion data where the multicast delivery destination address corresponds to a delivery source address, and a judgment part for judging whether the multicast delivery destination address is held and outputting the result of a judgment. The multicast network unit also includes a filtering part which, when the result of the judgment is holding, converts the multicast delivery source address to an arbitrary delivery destination address and, when it is non-holding, discards the received data. The multicast network unit further includes a transmitter part for transmitting data containing the converted multicast address to the domain.
摘要:
A method is disclosed for setting a master node of a ring network that has adjacently connected nodes situated on rightward and leftward lines of a bidirectional transmission channel. The method includes the steps of: counting the number of nodes interposed between a designated node and each node other than the designated node on the rightward and leftward lines of the bidirectional transmission channel; and setting one of the nodes as the master node. The master node satisfies a relation of, NHC_L=NHC_R or NHC_L=NHC_R-1, wherein NHC_L is the number of interposed nodes counted from the leftward line, and NHC_R is the number of interposed nodes counted from the rightward line.
摘要:
A network device is connected to another network device over a network and performs multicast transmission and reception over the network. The network device stores in a storage unit in a corresponding manner a drop address that uniquely identifies data to be dropped from the network and control data that indicates whether dropped data is to be forwarded or deleted. The network device drops the data based on the drop address, and then either forwards or deletes the dropped data based on the control data.