Abstract:
A multiuser detector that detects and decodes synchronous or asynchronous CDMA subchannels having different spreading factors with reduced computational complexity. The multiuser detector is compatible with ZF-BLE, MMSE, decorrelating detectors and the like using Cholesky decomposition to minimize numeric operations. The system and method arranges the columns of system transmission response matrices representing the response characteristics of individual users into a total system transmission response matrix which represents a plurality of matched-filter responses for a given block of received data. The invention in conjunction with Cholesky decomposition reduces the number of required mathematic operations prior to parallel matched filtering.
Abstract:
The present invention relates to a method for constructing a perfectly secret key within a group of nodes. In a group of m nodes, pair-wise secret keys are assigned. Based on pair-wise secret keys, these m nodes generate a group- wise perfectly secret key. In a preferred embodiment, each node communicates with every other node through public noiseless broadcasts.
Abstract:
An apparatus and methods are provided for paging in a HSDPA connected mode CELL_PCH or URA_PCH state. Preferably, a WTRU is configured to select various PICH information that is broadcast by a base station. The WTRU is preferably configured to receive paging messages, based on the selected PICH information. In one embodiment, a preferred WTRU is configured to receive paging messages, based on a PICH, a HS-SCCH, and a HS-PDSCH. In another embodiment, a preferred WTRU is configured to receive paging messages, based on a PICH and a HS-PDSCH. In both embodiments, a time delay parameter is preferably used so that the WTRU may listen for either the HS-SCCH or HS-PDSCH for a period of time and return to a sleep mode if no paging message is received.
Abstract:
The disclosed method and apparatus for allocating resources comprise scheduling a requesting wireless transmit receive unit (WTRU) for transmission using non-persistent scheduling.
Abstract:
A wireless transmit/receive units (WTRUs) receives a downlink transmission from a Node-B and decodes the downlink transmission. If the decoding is not successful, the WTRU sends a pre-defined burst signifying a negative acknowledgement (NACK) to the Node-B via a contention-based shared feedback channel. The pre-defined burst may be sent only once without requiring an acknowledgement. The Node-B calibrates a downlink transmit power so that the downlink transmission is transmitted to the WTRUs with a high likelihood. The Node-B may send a downlink transmission including multiple data streams processed using different modulation and coding schemes so that a WTRU having a high signal quality decodes all data streams while a WTRU having a low signal quality decodes less than all data streams. The Node-B sends a channel quality indicator (CQI) threshold so that each WTRU determines a data stream to report feedback based on the CQI threshold and a measured CQI.
Abstract:
A wireless communication method and apparatus for generating a scheduling grant based on a relative grant are disclosed. A wireless transmit/receive unit (WTRU) receives an absolute grant from a serving radio link set (RLS) and receives a relative grant from the serving RLS and at least one non-serving radio link (RL). The WTRU decodes enhanced dedicated channel (E-DCH) absolute grant channel (E-AGCH)E-AGCH signals to detect an absolute grant, and decodes E-DCH relative grant channel (E-RGCH)E-RGCH signals to detect at least one relative grant. The WTRU then calculates a serving grant based on the detected absolute grant and/or the relative grant(s). The relative grant may be detected by performing a hypothesis test on the E-RGCH signals. A multiple alternative hypothesis test is performed for detecting the E-RGCH signals from the serving RLS and a binary hypothesis test is performed for detecting the E-RGCH signals from the at least one non-serving RL. A reliability test may be further performed on the E-RGCH signals.
Abstract:
A medium access control (MAC) entity first computes an achievable rate region based on a total transmit power limit and a channel gain of each of a plurality of WTRUs. Next, the MAC entity selects an order of DPC among the WTRUs. A rate set for use in transmitting to the WTRUs is then selected, said rate set being within the computed achievable rate region. Then, based on the selected DPC order and rate set, a DPC entity performs DPC on a plurality of data streams intended for the plurality of WTRUs. If nested lattice-based DPC is utilized, rate compatibility is achieved by selecting proper nesting ratios corresponding to a desired data rate set. Otherwise, if binary-code based DPC is utilized, rate compatibility is achieved via selecting appropriate message input sizes for input to point-to-point coding units prior to performing DPC.
Abstract:
A transceiver comprising a data processing module, a security processing module, a medium access control (MAC) module, a dirty-paper-coding (DPC) module, and a smart antenna processor. The data processing module provides user data streams to the MAC module and channel state information to the smart antenna processor. The security processing module generates security data and provides the security data to the MAC module. The security module also provides security policy data to the smart antenna processor. The MAC module determines data transmission rates for the user data streams and the security data. In addition, the MAC module allocates the data streams and security data to transmission channels for transmission. The DPC module encodes the security data onto the user data streams. The smart antenna processor generates pre-coding coefficients used by the DPC module and transmits the security encoded data streams.
Abstract:
A system and method for providing variable security levels in a wireless communication network. The present invention optimizes the often conflicting demands of highly secure wireless communications and high speed wireless communications. According to a preferred embodiment of the present invention, various security sensors are scanned to determine the likely presence of an intruder within a predetermined trust zone. If an intruder is likely present, the security level is changed to the highest setting, and consequently a lower data rate, while the intruder is identified. If the identified intruder is in fact a trusted node, the security level is returned to a lower setting. If the identified intruder is not a trusted node, the security level is maintained at an elevated state while the intruder is within the trust zone.
Abstract:
A spread spectrum method and apparatus for protecting and authenticating wirelessly transmitted digital information using numerous techniques. The apparatus may be a wireless code division multiple access (CDMA) communication system, a base station, a wireless transmit/receive unit (WTRU), a transmitter, a receiver and/or an integrated circuit (IC). The wireless CDMA communication system includes a transmitter which steganographically embeds digital information in a CDMA communication signal and wirelessly transmits the CDMA communication signal. The system further includes a receiver which receives the CDMA communication signal and extracts the steganographically embedded digital information from the received CDMA communication signal.