摘要:
An error management system and process can be used to identify an erroneous data packet in a data stream. In response to identifying the erroneous data packet, a subsequent valid data packet is located in the data stream. In one embodiment, a plurality of candidate locations of header checksum windows are searched and checked for a valid checksum. Multiple integrity checks of multiple header checksums can be used to reduce the probability of a false positive integrity check. In another embodiment, one or more information data fields can used for determining packet integrity by determining if the fields contain valid information bits.
摘要:
An error management system and process can be used to identify an erroneous data packet in a data stream. In response to identifying the erroneous data packet, a subsequent valid data packet is located in the data stream. In one embodiment, a plurality of candidate locations of header checksum windows are searched and checked for a valid checksum. Multiple integrity checks of multiple header checksums can be used to reduce the probability of a false positive integrity check. In another embodiment, one or more information data fields can used for determining packet integrity by determining if the fields contain valid information bits.
摘要:
An error management system and process can be used to identify an erroneous data packet in a data stream. In response to identifying the erroneous data packet, a subsequent valid data packet is located in the data stream. In one embodiment, a plurality of candidate locations of header checksum windows are searched and checked for a valid checksum. Multiple integrity checks of multiple header checksums can be used to reduce the probability of a false positive integrity check. In another embodiment, one or more information data fields can used for determining packet integrity by determining if the fields contain valid information bits.
摘要:
An error management system and process can be used to identify an erroneous data packet in a data stream. In response to identifying the erroneous data packet, a subsequent valid data packet is located in the data stream. In one embodiment, a plurality of candidate locations of header checksum windows are searched and checked for a valid checksum. Multiple integrity checks of multiple header checksums can be used to reduce the probability of a false positive integrity check. In another embodiment, one or more information data fields can used for determining packet integrity by determining if the fields contain valid information bits.
摘要:
For an example embodiment, a method for a communication device operating in a synchronous communication system is described. The method includes performing a listen-before-talk (LBT) procedure prior to the start of a downlink subframe of a synchronous frame and determining if a transmission from another communication device of another communication system is detected during the LBT procedure. In the case that a transmission is detected during the LBT procedure, the communication device refrains from transmitting during the downlink subframe. In the case that a transmission is not detected during the LBT procedure, the communication device transmits during the downlink subframe.
摘要:
For an example embodiment, a method for a communication device operating in a synchronous communication system is described. The method includes performing a listen-before-talk (LBT) procedure prior to the start of a downlink subframe of a synchronous frame and determining if a transmission from another communication device of another communication system is detected during the LBT procedure. In the case that a transmission is detected during the LBT procedure, the communication device refrains from transmitting during the downlink subframe. In the case that a transmission is not detected during the LBT procedure, the communication device transmits during the downlink subframe.
摘要:
For an example embodiment, a method for a communication device operating in a synchronous communication system is described. The method includes performing a listen-before-talk (LBT) procedure prior to the start of a downlink subframe of a synchronous frame and determining if a transmission from another communication device of another communication system is detected during the LBT procedure. In the case that a transmission is detected during the LBT procedure, the communication device refrains from transmitting during the downlink subframe. In the case that a transmission is not detected during the LBT procedure, the communication device transmits during the downlink subframe.
摘要:
For an example embodiment, a method for a communication device operating in a synchronous communication system is described. The method includes performing a listen-before-talk (LBT) procedure prior to the start of a downlink subframe of a synchronous frame and determining if a transmission from another communication device of another communication system is detected during the LBT procedure. In the case that a transmission is detected during the LBT procedure, the communication device refrains from transmitting during the downlink subframe. In the case that a transmission is not detected during the LBT procedure, the communication device transmits during the downlink subframe.
摘要:
Data packets of multiple different protocols are transmitted over a broadband wireless air interface between network stations subscribing to the broadband wireless access service. A first network station receives data packets of different network protocols in an upper layer for transmission to a second station over the wireless air interface. The different protocol data packets are processed in the upper layer to look up a destination address and class of service, and are transmitted to a single generic packet convergence sublayer along with an identification tag indicating the destination address and class of service. The generic packet convergence sublayer maps the identification tag to a single connection ID (CID) of a second station of the broadband wireless access service, without having to carry out any packet inspection.
摘要:
Data packets of multiple different protocols are transmitted over a broadband wireless air interface between network stations subscribing to the broadband wireless access service. A first network station receives data packets of different network protocols in an upper layer for transmission to a second station over the wireless air interface. The different protocol data packets are processed in the upper layer to look up a destination address and class of service, and are transmitted to a single generic packet convergence sublayer along with an identification tag indicating the destination address and class of service. The generic packet convergence sublayer maps the identification tag to a single connection ID (CID) of a second station of the broadband wireless access service, without having to carry out any packet inspection.