Abstract:
A received synchronization pattern is compared against first and second known synchronization patterns. If the received pattern is substantially similar to the first known pattern, the payload is processed as voice; and if the received pattern is substantially similar to the second known pattern, the payload is processed as non-voice. Alternatively, a target synchronization pattern dependent on an operating mode is selected. The received pattern is compared against the target pattern. If the received pattern is substantially similar to the target pattern, the payload is processed; otherwise, the burst is discarded. In yet another alternative, the received pattern is compared against first and second known synchronization patterns having a common length. If the received pattern is substantially similar to the first known pattern, a first operating mode is selected, and if the received pattern is substantially similar to the second known pattern, a second operating mode is selected.
Abstract:
A received synchronization pattern is compared against first and second known synchronization patterns. If the received pattern is substantially similar to the first known pattern, the payload is processed as voice; and if the received pattern is substantially similar to the second known pattern, the payload is processed as non-voice. Alternatively, a target synchronization pattern dependent on an operating mode is selected. The received pattern is compared against the target pattern. If the received pattern is substantially similar to the target pattern, the payload is processed; otherwise, the burst is discarded. In yet another alternative, the received pattern is compared against first and second known synchronization patterns having a common length. If the received pattern is substantially similar to the first known pattern, a first operating mode is selected, and if the received pattern is substantially similar to the second known pattern, a second operating mode is selected.
Abstract:
A system (100) and method for selecting a network (104, 106) based upon the velocity of a wireless device (102) is disclosed. At the wireless device (102) wherein the wireless device (102) has access to a velocity sensitive network, the wireless device (102) verifies whether the velocity sensitive network is available to the wireless device (102). Then, the wireless device (102) determines a velocity of the wireless device (102) and determines that the velocity sensitive network (104, 106) may be appropriate for wireless communication when the velocity of the wireless device is less than a threshold for a specified duration.
Abstract:
A method for informing a mobile device of adjacent sites in a RF communication system is disclosed. The RF communication system comprises a first network and a second network. At a site in the second network of the RF communication system, information is maintained of adjacent sites wherein the adjacent sites are within the first network, and a first list of adjacent sites is broadcast to at least one mobile device within coverage of the site in the second network.
Abstract:
A subscriber unit (104) listens to a first channel (202), decodes at least a portion of a data unit on the first channel (202), and learns a synchronization between the first channel (202) and a second channel (206/300) based on a micro-slot value. A first base radio (1061) transmits a first plurality of data units on the first channel (202). A second base radio (1063) transmits a second plurality of data units on the second channel (206/300). The first plurality of micro-slots on the first channel (202) is synchronized with the second plurality of micro-slots or plurality of frame boundaries on the second channel (206/300). The first base radio (1061) transmits a message (406) on the first channel (202) wherein the message comprises at least a micro-slot value used to associate the synchronization between the first channel (202) and the second channel (206/300).
Abstract:
A method for providing a mobile device in a packet data network access to a channelized network is disclosed. At a gateway between the two networks, a first channelized network message that is encapsulated in a first IP data packet from the packet data network is received. The first channelized network message is retrieved and reformatted for sending over the channelized network. The gateway then receives a second channelized network message from the channelized network. An identifier of a mobile device associated with the second channelized network message is retrieved and an IP address for the identified mobile device is determined. Then, the gateway encapsulates the second channelized network message into a second IP data packet and sends the encapsulated second channelized network message to the identified mobile device in the packet data network.
Abstract:
In a wireless communication system with an air interface comprising a plurality of bursts, a plurality of bursts is defined. Each burst comprises a field (300) embedded within the burst. The field (300) is one of a synchronization field (300') and a signaling field (300''). When the field (300) is a synchronization field (300'), a position of at least one subsequent burst comprising the signaling field (300'') is defined, and a position of at least one subsequent burst comprising the synchronization field (300') is defined.
Abstract:
In a wireless communication system with an air interface comprised of a plurality of bursts, a communication device (102) receives a burst (200). The burst (200) comprises payload (206, 208), a first indicator (202) and a second indicator (204). Upon receipt of the burst (200), the communication device (102) determines a value of the first indicator (202) to determine whether end-to-end encryption is applied to at least a portion of the payload, and determines a value of the second indicator (204) to determine whether air interface encryption is applied to at least a portion of the payload.
Abstract:
In a wireless communication system with an air interface comprised of a plurality of bursts, a communication device (102) receives a burst (200). The burst (200) comprises payload (206, 208), a first indicator (202) and a second indicator (204). Upon receipt of the burst (200), the communication device (102) determines a value of the first indicator (202) to determine whether end-to-end encryption is applied to at least a portion of the payload, and determines a value of the second indicator (204) to determine whether air interface encryption is applied to at least a portion of the payload.
Abstract:
Methods for informing a mobile device (110) of adjacent sites (100) in a RF communication system (100) wherein the RF communication system comprises a first network (102) and a second network (104) are disclosed. A mobile device (110) in the first network (102) of the RF communication system (100) updates a signaling gateway (106) with position information of the mobile device (110) wherein the signaling gateway interfaces between the first network (102) and the second network (104) and receives a list of adjacent sites in the second network from the signaling gateway.