摘要:
A multiple mode data communication system and method provides the flexibility to schedule wireless unit transmissions and/or allow the wireless unit to transmit autonomously. In certain embodiments, the wireless units can transmit autonomously and/or use scheduling depending on the data rate, the length of the data packet or the type of data. For example, the wireless units can transmit autonomously at lower data rates and use scheduling at higher data rates. Thus, the multiple mode system enables wireless unit transmissions to be scheduled and/or be transmit autonomously, and wireless units can simultaneously operate in different scheduling and/or autonomous modes. Depending on the embodiment, the system can provide even greater flexibility in operation by permitting wireless units to be scheduled by a single base station, scheduled by a multiplicity of base stations simultaneously or otherwise, via coordination between base stations, scheduled by a multiplicity of base stations in an uncoordinated and asynchronous manner, allowed to transmit autonomously, and/or allowed to transmit autonomously under base station supervision (i.e. rate control/adjustment by the base station). Additionally, a forward and/or reverse link control channel structure is provided which can be used to implement the multiple mode data communication system and/or support various features enabling increased throughput over a shared data channel in a wireless communications system.
摘要:
Data rate determination is provided in a system where the available power fraction and available Walsh codes in each active leg are dynamically changing over time. This method adapts the rate (modulation and coding) based on the combined resource (power & code space) levels seen at each cell. The method results in maximization of the rate supportable by each cell given their resource constrained situation while meeting the constraints of target packet or frame error rate and orthogonality. Furthermore, improved fast cell selection by the mobile results due to this approach that is based on knowledge of combined resource (power & code space) levels across the cells in the active set.
摘要:
A method of scheduling data communication over an uplink. The method enables two or more users seeking to transmit data over the uplink to be scheduled in response to their path loss. The user having the most attractive determined path loss among the two or more users seeking to transmit data over the uplink us scheduled first. Thereafter, the next user having the next most attractive path loss among the remaining users may be subsequently scheduled if the total noise rise leftover is greater than zero. This process repeats so long as or until the total noise rise leftover is about zero.
摘要:
Disclosed is a method of integrating voice and data services onto a same frequency channel using available transmit power information to determine data rates, wherein the available transmit power information indicates an amount of transmit power available for future data transmissions over one or more data channels. In a “distributed” embodiment, a transmitter or base station transmits, via a forward link, an available power message to a receiver or mobile-telephone indicating an amount of available transmit power at some future time t+z. The mobile-telephone performs signal-to-interference measurements corresponding to the received forward link and received interference, and uses such signal-to-interference measurements and the available power message to determine a data rate that can be supported by the mobile-telephone. Preferably, the determined data rate corresponds to a maximum data rate at which a minimum level of quality of service can be achieved at the mobile-telephone. In a “centralized” embodiment, the mobile-telephone transmits the signal-to-interference measurements to the base station, and the base station determines the data rate based on the available transmit power at future time t+z.
摘要:
Efficient data communication in wireless communication system is provided by using centralized control of data communications, such as packet switched services, over the uplink channel (mobile station (MS) to base station (BS)). A multiple access protocol is used where packet data mobile stations make requests for uplink channel resources. The request messages transmitted by the MSs inform the BS of service parameters. Examples of such service parameters are available transmit power at the MS, the amount of data to transmit and Quality of Service (QoS). The BS then processes the received request messages and performs interference management calculations to determine the portion of the BS's receive power budget that can be allocated to the data user requesting service. These calculations are used to control the amount of interference seen at the base station, to assign a data rate to the user and to aid scheduling algorithms in computing service order priorities. Any scheduling algorithm may be used; for example, scheduling may be based on the amount of data to be transmitted, the age of the data or the service priority associated with the mobile station. The interference control is used to prevent the occurrence of catastrophic levels of interference while maximizing the utilization of resources on the uplink.
摘要:
A method is provided a wireless system for optimizing network throughput in a wireless communication system. More particularly, the methodology of the invention evaluates the both individual user data throughput as well as the data throughput of a larger user population, in determining the base station to which a user should attach when entering the wireless system. In an alternate embodiment, the invention methodology evaluates such individual user data throughput and the user population throughput in determining whether or not to handoff a data session for a user from one base station to the other.
摘要:
The present invention provides a method for encoding messages. The method includes identifying at least a first plurality of messages indicative of a corresponding first plurality of data transmission rates and a second plurality of messages indicative of a corresponding second plurality of data transmission rates based on a prior transmitted message, where the first and second pluralities of messages are unequal. The method also includes transmitting a message from one of at least the first and second pluralities of messages.
摘要:
In a wireless network or other communication system, admission of users to the system involves use of a first scheduler, which makes actual scheduling decisions for admitted users, and a second scheduler, which emulates the operation of the first scheduler. The first scheduler is configured to manage access to network resources for users already admitted to the system. The first scheduler is coupled to an admission control module which contains the second scheduler. The second scheduler, also referred to herein as a virtual scheduler, emulates operation of the first scheduler, under an operating scenario involving admission of at least one additional user to the system, in order to generate a performance metric. The performance metric is used to make an admission control decision regarding admission of the at least one additional user to the system.
摘要:
In a wireless network or other communication system, admission of users to the system is based on predicted scheduling gain. A scheduler is configured to manage access to network resources for users already admitted to the system. An admission control module is coupled to the scheduler, and determines a predicted scheduling gain of the scheduler under an operating scenario involving admission of at least one additional user to the system. The predicted scheduling gain is processed to generate at least one performance metric which is used to make an admission control decision regarding admission of the at least one additional user to the system.
摘要:
There can be problems with the security of social networking communications. For example, there may be occasions when a number of friends wish to communicate securely through a social network infrastructure, such that non-trusted 3rd-party entities, such as a Social Network Operator or host that provides the application infrastructure, does not overhear the communication. In response to the above problems, embodiments presented propose a set of innovative, lightweight solutions, considering that in certain scenarios the Social Network Operator may not be a trusted entity. Embodiments of the present invention are directed to methods and apparatuses for secure information sharing in social networks using random keys.