Abstract:
A method of operating a terminal in a radio access network may include receiving a transmission of first and second data blocks over respective first and second multiple-input-multiple-output (MIMO) layers during a transmission time interval (TTI). Respective first and second demodulated codewords may be generated corresponding to the transmission of the first and second data blocks, and the first and second demodulated codewords may be decoded. Responsive to failure decoding the first demodulated codeword and success decoding the second demodulated codeword, a negative acknowledgement may be transmitted indicating failure receiving the first and second data blocks. Related terminals are also discussed.
Abstract:
Methods and apparatus are disclosed for detecting a control channel message transmitted on one of a plurality of shared control channels and targeted to a wireless receiver. In an exemplary method, messages transmitted over a plurality of shared control channels are decoded, and at least one likelihood metric is determined for each of the decoded messages. A best candidate is selected from the decoded messages, based on the likelihood metrics, and the at least one likelihood metric for the best candidate is compared to corresponding likelihood metrics for the messages other than the best candidate to determine whether the best candidate is a valid message. Wireless communication receivers configured correspondingly are also disclosed.
Abstract:
A method begins by processing module in response to a read command, issuing at least a read threshold number of read requests regarding a set of encoded data slices and receiving at least the read threshold number of encoded data slices. The method continues where the processing module selects a unique combination of encoded data slices and decodes the unique combination to produce a recovered data segment. The method continues where the processing module verifies an integrity value for the recovered data segment and indicates whether the unique combination is valid. The method continues where the processing module selects other combinations producing more recovered data segments for further validity verification. The method continues where the processing module utilizes a verified recovered data segment as a response to the read command and identifies a compromised encoded data slice.
Abstract:
Various embodiments provide for systems and methods for signal conversion of one modulated signal to another modulated signal using demodulation and then re-modulation. According to some embodiments, a signal receiving system may comprise an I/Q demodulator that demodulates a first modulated signal to an in-phase (“I″) signal and a quadrature (“Q″) signal, an I/Q signal adjustor that adaptively adjusts the Q signal to increase the signal-to-noise ratio (SNR) of a transitory signal that is based on a second modulated signal, and an I/Q modulator that modulates the I signal and the adjusted Q signal to the second modulated signal. To increase the SNR, the Q signal may be adjusted based on a calculated error determined for the transitory signal during demodulation by a demodulator downstream from the I/Q modulator.
Abstract:
A method for coherent estimation of the traffic-to-pilot energy ratio is presented. A received preamble is decoded, and then re-encoded. The received preamble is then multiplied by the re-encoded preamble. The results are summed, squared, and then divided by a pilot energy value. In another method, a message carrying energy information can be inserted between a subpacket preamble and a subpacket.
Abstract:
A control channel may be used to transmit control information, such as Downlink Control Information (DCI), to a mobile device from a network component, such as a base station or a base node. The mobile device may use a blind decoding scheme to detect DCIs. A DCI may be falsely detected by the mobile device. According to some embodiments, data that has been decoded by a blind decoder, from buffer data for a candidate control channel, is re-encoded. The re-encoded data is compared to buffer data for the control channel. The decoded data is treated as control information dependent on the comparison of the re-encoded data with the buffer data. In some embodiments, comparing the re-encoded data to the buffer data includes generating a metric as a function of a degree of similarity between the re-encoded data and the buffer data. The metric may be compared to a threshold.
Abstract:
An uncontrolled spatial multiple access system and method facilitating spatial multiple access for multiple devices in a wireless local-area network (WLAN). Embodiments of the system and method increase throughput of the wireless network by facilitating concurrent encoded frame transmission. Decoding of the quasi-overlapped frames is achieved using a chain decoding technique that takes data streams (or signals) containing the quasi-overlapping encoded frames and isolates each encoded frame so that the frame can be decoded. Quasi-overlapped frames means that the frames are overlapped in the body of the frame but not at the preamble (or headers) of the frames. Embodiments of the chain decoding also use interference nullifying and interference cancellation to enable concurrent quasi-overlapping transmission. A carrier counting multiple access technique of embodiments of the system and method allow wireless networks to retain their asynchronous nature while supporting spatial multiple access and maintain backwards compatibility with the IEEE 802.11 standard.
Abstract:
A method begins by a processing module receiving a write request regarding an encoded data slice and determining whether the write request pertains to deleting the encoded data slice from a memory space. The method continues with the processing module storing a deletion marker regarding the encoded data slice when the write request pertains to deleting the encoded data slice. The method continues with the processing module determining when to delete the encoded data slice based on the deletion marker and in accordance with the deletion scheme.
Abstract:
A method begins by a processing module determining a mapping of encoded data slices to wireless channels for wireless communication of data, wherein a data segment of the data is encoded in accordance with a dispersed storage error encoding protocol to produce a set of encoded data slices. The method continues with the processing module configuring, in accordance with the mapping, receivers of a wireless communication device to receive, via a set of wireless channels, at least some of the set of encoded data slices to produce configured receivers. The method continues with the processing module facilitating the configured receivers to receive encoded data slices of the set of encoded data slices to produce received encoded data slices and when at least a decode threshold number of received encoded data slices have been received, decoding the received encoded data slices to recapture the data segment.
Abstract:
An uncontrolled spatial multiple access system and method facilitating spatial multiple access for multiple devices in a wireless local-area network (WLAN). Embodiments of the system and method increase throughput of the wireless network by facilitating concurrent encoded frame transmission. Decoding of the quasi-overlapped frames is achieved using a chain decoding technique that takes data streams (or signals) containing the quasi-overlapping encoded frames and isolates each encoded frame so that the frame can be decoded. Quasi-overlapped frames means that the frames are overlapped in the body of the frame but not at the preamble (or headers) of the frames. Embodiments of the chain decoding also use interference nullifying and interference cancelation to enable concurrent quasi-overlapping transmission. A carrier counting multiple access technique of embodiments of the system and method allow wireless networks to retain their asynchronous nature while supporting spatial multiple access and maintain backwards compatibility with the IEEE 802.11 standard.