Abstract:
Wireless telecommunications apparatus comprises a base station and a user terminal. The base station sends data to the user terminal on a first channel (DL1) at a first frequency (f1) in selected time slots and the user terminal sends data to the base station on a second channel (UL2) at a second frequency (f2) in selected time slots. These two frequencies are different. The network also either includes a transmitter which transmits further data to the user equipment on a shared channel (DL0) at a third frequency (f0) in time slots in which the other data is not being sent or includes a receiver which receives further data from the user equipment on a shared channel at the third frequency in time slots in which the other data is not being sent. The apparatus can be a UMTS or other third generation system.
Abstract:
A single-ended homodyne receiver demodulates quadrature signals containing spectral nulls by using an extremely low intermediate-frequency that normally would create substantial self-interference. This is accomplished by judiciously placing the spectral nulls over the critical sections of the signal spectrum, ensuring that the self-interference is minimized. As an example, a direct-sequence CDMA signal that was constructed with not more than one half the available Walsh functions is demodulated directly by placing the intermediate frequency such that spectral nulls in the CDMA signal overlap the spectral peaks in the desired signal, thereby eliminating the self-interference. This single-ended homodyne receiver can be implemented using either integrated or discrete components.
Abstract:
A precautionary measure against cell-phone triggered bombs is described that restricts call terminations within a designated security risk area without shutting down the entire network. Embodiments described herein provide for restricting call terminations directed to a designated security risk area that are originated from non- privileged users, i.e., the general public, yet authorizing call terminations directed to the security risk area that are originated from privileged government users (e.g., GETS/WPS users). Call originations are permitted within the security risk area from both privileged and non-privileged users.
Abstract:
In one aspect of the instant invention, a method is provided for controlling a communications system in which base stations owned by different entities are permitted to bid in an auction to establish a communications session for a mobile device . The method comprises sending a request to a first and second base station to bid on communicating with a mobile device. A bid is received from at least one of the first and second base stations for communicating with the mobile device. One of the first and second base stations is selected to communicate with the mobile device based on the received bid.