Abstract:
Methods and apparatus are described for improving the transmission of information over wireless communication channels. These techniques include determining available communication channels for transmitting information and determining possible physical layer packet sizes of the available channels. An information unit is partitioned into portions wherein the size of the portions are selected so as to match one of the physical layer packet sizes of the available communication channels. Another aspect is partitioning the information into a number of slices that correspond to the number of transmissions that occur during the information unit interval and assigning each partition to a corresponding transmission. The techniques can be used for various types of information, such as multimedia data, variable bit rate data streams, video data, or audio data.
Abstract:
A wireless media access control supports asynchronous communication and overlapping transmissions. Here, a wireless node may determine whether to request or schedule a transmission based on control messages it receives from neighboring nodes. In some implementations a scheduled transmission may be divided up into several segments so that a transmitting node may receive and transmit control messages between segments. In some implementations a monitoring period is defined after a scheduled transmission period to enable the transmitting node to acquire control information that may otherwise have been transmitted during the scheduled transmission period. In some implementations data and control information are transmitted over different frequency division multiplexed channels to enable concurrent transmission of the data and control information.
Abstract:
A method includes receiving, at a station, a first delivery traffic indication message (DTIM) assigned to a first delivery interval. The first DTIM is configured to indicate whether group-addressed traffic is scheduled for delivery during a beacon interval. The first delivery interval is larger than a second delivery interval associated with a second DTIM. The method further includes receiving the group-addressed traffic during the beacon interval.
Abstract:
Interference that occurs during wireless communication may be managed through the use of fractional reuse and other techniques. In some aspects fractional reuse may relate to HARQ interlaces, portions of a timeslot, frequency spectrum, and spreading codes. Interference may be managed through the use of a transmit power profile and/or an attenuation profile. Interference also may be managed through the use of power management-related techniques.
Abstract:
Transmit power (e.g., maximum transmit power) may be defined based on the maximum received signal strength allowed by a receiver and a total received signal strength from transmitting nodes at the receiver. Transmit power may be defined for an access node (e.g., a femto node) such that a corresponding outage created in a cell (e.g., a macro cell) is limited while still providing an acceptable level of coverage for access terminals associated with the access node. An access node may autonomously adjust its transmit power based on channel measurement and a defined coverage hole to mitigate interference and perform a self-calibration process.
Abstract:
A method for reducing frequent idle handoffs of a wireless communication device is described. A registration request is received by a base station or a femto access point from the wireless communication device. The number of registration requests received from the wireless communication device are counted while the registration timer is running. It is determined that frequent handoffs are happening when the number of registration requests received is greater than a registration threshold. A transmit power of a femto access point is adjusted if the number of registration requests received indicates that frequent handoffs are happening.
Abstract:
Providing for distributed access point management for access to a mobile network is described herein. By way of example, an interface application maintained at a Femto cell base station (BS) can facilitate initial power up and/or acquisition for a Femto user terminal (UT). Upon start-up, a bootstrap process is utilized by the Femto cell to provision the UT with an SDL establishing at least one BS as high priority within a particular geographic area (GEO). Thus, when the Femto UT is within the GEO, the UT is more likely to acquire, camp on and/or handoff to the preferred BS. When outside the GEO, a serving access point can provision the Femto UT OTA with a custom SDL suited to another GEO having a different high priority access point. By implementing access point management at distributed access points, expensive network equipment can be mitigated or avoided.
Abstract translation:这里描述了用于访问移动网络的分布式接入点管理。 作为示例,维持在毫微微小区基站(BS)的接口应用可以有助于对于毫微微用户终端(UT)的初始加电和/或获取。 在启动时,毫微微小区利用自举进程来向UT提供在特定地理区域(GEO)内建立至少一个BS作为高优先级的SDL。 因此,当毫微微UT在GEO内时,UT更有可能获得,驻留和/或切换到首选BS。 在GEO外部,服务接入点可以为Femto UT OTA提供适合具有不同高优先级接入点的另一个GEO的自定义SDL。 通过在分布式接入点实现接入点管理,可以减轻或避免昂贵的网络设备。
Abstract:
Ambiguity (e.g., confusion) associated with access point identifiers may be resolved by querying candidate target access points and/or by using historical records indicative of one or more access points that the access point has previously accessed. For example, messages may be sent to access points that are assigned the same identifier to cause the access points to monitor for a signal from an access terminal that received the identifier from a target access point. The target access point may then be identified based on any responses that indicate that a signal was received from the access terminal. In some aspects the access points subject to being queried may be selected using a tiered priority. In addition, it may be determined based on prior handoffs of a given access terminal that when that access terminal reports a given identifier, the access terminal usually ends up being handed-off to a particular access point. Accordingly, a mapping may be maintained for that access terminal that maps the identifier to that access point so that the mapping may be used to resolve any future confusion associated with the use of that identifier by that access terminal.
Abstract:
After authentication, one or more messages are generated by one or more devices that are operatively coupled via a communications network to a computer. Based on receipt of user input in a module in a device, a message transmitted by each device (in reliance on the authentication) includes information that is normally internal to the device and indicative of interaction of a user with the device. For example, the message may include an identifier of the device and internal information in the form of an identifier of the module (hardware and/or software), with which the user is interacting. Based on one or more such messages, at least one processor in the computer determines and stores in memory, a state of the user indicative of the user's situation. The user's state may be used in any manner, e.g. to trigger a function in an application or to start a new application.
Abstract:
The disclosure is directed to a mobile communication device that measures characteristics or attributes of a first communications network that vary according to physical location within that first communications network to create a fingerprint, or signature, of a location within the first communications network. When the fingerprint of the current location of the mobile device is created it can be compared to a known fingerprint associated with a second communication network to determine the mobile device's proximity to the second communications network. For example, the first communications network may be a CDMA wide area wireless communication network and the second communications network may be a 802.11 wireless LAN.