摘要:
An Internet-of-Things (IOT) proxy includes storage hardware configured to store first and second state information. The first state information defines first contexts for flows associated with a plurality of IoT devices. The plurality of electronic devices have established a corresponding plurality of first sessions that are terminated by the IoT proxy. The second state information defines second contexts for the flows associated with the plurality of IoT devices. The second state information is associated with a second session that has been established between the proxy and a server or an other electronic device. The IoT proxy also includes computing hardware configured to modify headers of packets associated with the IoT devices based on at least one of the first state information or the second state information. In some cases, the IoT proxy is implemented as a virtual network slice in a network function virtualization (NFV) architecture.
摘要:
In one example embodiment, a method includes obtaining a duration of a first network element scanning period of a first network element for a plurality of first beacons, the plurality of first beacons associated with the different direct energy beams, scanning for the plurality of first beacons over a second network element scanning period of a second network element, the second network element scanning period including a number of first network element scanning periods, the first network element scanning period being part of the number of the first network element scanning periods, receiving at least one of the plurality of first beacons during the number of the first network element scanning periods, determining a preferred first beacon based on the received at least one of the plurality of first beacons and transmitting an indication of the preferred first beacon to a base station.
摘要:
Techniques are disclosed for reducing channel information feedback in communication networks. For example, a method comprises the following steps. A set of mobile terminals and a set of base stations designated to participate in a coordinated multipoint transmission protocol in a communication network are identified. One or more unique downlink communication resource blocks are assigned to each designated mobile terminal that is located in a given first sector of a designated base station. As such, each designated mobile terminal in the first sector of the designated base station: (i) performs a channel state estimation process in response to respective signals received from the designated base stations in the one or more unique downlink communication resource blocks assigned to that designated mobile terminal; and (ii) transmits resulting channel state information back to at least one of the designated base stations.
摘要:
In one example embodiment, a method includes transmitting a plurality of first beacons over a first scanning period, the plurality of first beacons associated with different direct energy beams, the transmitting including, transmitting the plurality of first beacons over sub-periods of the first scanning period, respectively; obtaining an indication of a preferred first beacon, the preferred beacon being received by a network element during the transmitting of the plurality of beacons over the first scanning period; and communicating with the element during a scheduled portion of a first data communication period using the beam associated with the preferred first beacon, a length of the first scanning period and a length of the first data communication period forming a length of a time transmission interval.
摘要:
In one example embodiment, a method includes transmitting a plurality of first beacons over a first scanning period, the plurality of first beacons associated with different direct energy beams, the transmitting including, transmitting the plurality of first beacons over sub-periods of the first scanning period, respectively; obtaining an indication of a preferred first beacon, the preferred beacon being received by a network element during the transmitting of the plurality of beacons over the first scanning period; and communicating with the element during a scheduled portion of a first data communication period using the beam associated with the preferred first beacon, a length of the first scanning period and a length of the first data communication period forming a length of a time transmission interval.
摘要:
An apparatus, such as a base station or a user equipment, includes a transceiver configured to receive a first signal that is a superposition of symbols transmitted concurrently by users in shared resources of an air interface. The apparatus also includes a processor configured to iteratively cancel, for the users, interference produced by the symbols transmitted by other users on the basis of log likelihood ratios (LLRs) that represent likelihoods that previous estimates of the symbols transmitted by the other users are correct. The processor is also configured to iteratively decode the symbols transmitted by the users after canceling the interference produced by the symbols transmitted by the other users.
摘要:
Detecting physical random access channel (RACH) preambles is accomplished by computing a correlation power profile based on received RACH preambles, where the correlation power profile values may be sorted. A weight factor is computed for each of the correlation power profile values based on a normalized RACH detection threshold. Outlier peaks of the correlation power profile values are selected based on the weight factor. The outlier peaks to the first set of RACH signatures are mapped in order to identify a user equipment (UE) that is associated with one of the received RACH preambles. Network traffic is then controlled for network communications associated with the identified UE.
摘要:
A capability for opportunistic forwarding of information using a wireless terminal is presented. An energy limited node includes a wake-up circuit configured to detect a wake-up signal from a wireless terminal where the wake-up signal includes a modulated waveform signal, and a communication module configured to switch, based on a control signal generated by the wake-up circuit, from a sleep mode in which the communication module is not operable to communicate with the wireless terminal to an active mode in which the communication module is operable to communicate with the wireless terminal. A wireless terminal includes a first wireless communication interface configured for communication with a device using a wireless communication protocol, a second wireless communication interface configured for wireless communication with a wireless access node of a wireless network, and a processor configured to support opportunistic forwarding of information between the device and the wireless access node of the wireless network.
摘要:
In one example embodiment, a method includes obtaining a duration of a first network element scanning period of a first network element for a plurality of first beacons, the plurality of first beacons associated with the different direct energy beams, scanning for the plurality of first beacons over a second network element scanning period of a second network element, the second network element scanning period including a number of first network element scanning periods, the first network element scanning period being part of the number of the first network element scanning periods, receiving at least one of the plurality of first beacons during the number of the first network element scanning periods, determining a preferred first beacon based on the received at least one of the plurality of first beacons and transmitting an indication of the preferred first beacon to a base station.
摘要:
Detecting physical random access channel (RACH) preambles is accomplished by computing a correlation power profile based on received RACH preambles, where the correlation power profile values may be sorted. A weight factor is computed for each of the correlation power profile values based on a normalized RACH detection threshold. Outlier peaks of the correlation power profile values are selected based on the weight factor. The outlier peaks to the first set of RACH signatures are mapped in order to identify a user equipment (UE) that is associated with one of the received RACH preambles. Network traffic is then controlled for network communications associated with the identified UE.