Abstract:
In a system including a resource (100) which is shared among a number of users, it is difficult to distribute the available capacity of the resources fairly among the users and still maximize resource utilization. Additionally, it is desirable to allow at least some of the control over usage rates to remain with the users, while at the same time avoiding situations where the resource is overloaded. A system and method are disclosed wherein usage rates are selected from among a set of available rates according to a set of persistence vectors.
Abstract:
A mobile user terminal (402) accesses a packet data network (450) through one or more of several network access points (404-412). One or more control points 432-440 determines which network access point or points the user terminal is to access. Control may be retained in the current control point, or transferred to another control point, whenever it is convenient. There are preferably several routers, each having an associated home agent (418-420) which determines which foreign agents need to be accessed on behalf of each user terminal. There are several foreign agents (422-430), which forward packets received from a user terminal's home agent to the control point currently controlling communications with the user terminal.
Abstract:
In a system including a resource (100) which is shared among a number of users, it is difficult to distribute the available capacity of the resources fairly among the users and still maximize resource utilization. Additionally, it is desirable to allow at least some of the control over usage rates to remain with the users, while at the same time avoiding situations where the resource is overloaded. A system and method are disclosed wherein usage rates are selected from among a set of available rates according to a set of persistence vectors.
Abstract:
Reverse link busy bits are independently generated by each base station (102, 104 and 106) and indicative of whether the transmitting base station (102, 104 and 106) has reached a reserve link capacity limit. In a first exemplary embodiment, the remote station (122) combines the multipath components of the reverse link busy bits from each of the transmitting base stations (102, 104 and 106) in its Active Set and in response transmits a reverse link signal only when all of the reverse link busy bits indicate that the base stations (102, 104 and 106) in the remote stations Active Set have reverse link capacity. In a first alternative embodiment, the remote station weights, the reverse link busy signals in accordance with the signal strength of the base station (102, 104 or 106) transmitting the busy signal and determines whether to transmit based on the weighted sum of the busy signals.
Abstract:
The layers and protocols of an air interface layering architecture are designed to be modular and can be modified and upgraded to support new features, perform complex tasks, and implement additional functionality. Prior to commencement of data communication between a first entity (e.g., an access terminal) and a second entity (e.g., a radio network), a set of layers and/or protocols is selected for negotiation. For each selected layer and protocol (i.e., each attribute), a list of attribute values considered acceptable to the first entity is determined. The selected attributes and their associated attribute values are sent from the first entity and, in response, a list of processed attributes and their associated lists of processed attribute values arc received. Each list of processed attribute values includes attribute values considered acceptable to the second entity. The layers and protocols in the first entity are then configured in accordance with the received list of processed attributes and their associated processed attribute values. Other features related to configurable layers and protocols are also provided.
Abstract:
In a system including a resource (100) which is shared among a number of users, it is difficult to distribute the available capacity of the resources fairly among the users and still maximize resource utilization. Additionally, it is desirable to allow at least some of the control over usage rates to remain with the users, while at the same time avoiding situations where the resource is overloaded. A system and method are disclosed wherein usage rates are selected from among a set of available rates according to a set of persistence vectors.
Abstract:
Providing an audible feedback feature giving the user the ability to audibly monitor the progress of a data connection over a digital wireless channel. Audible tones generated within a base station and received from a telephone network are encoded within the base station and transmitted over the digital wireless link to a mobile unit. The mobile unit decodes the signal received from the base station and provides the audible tones to a user. The user can thus monitor the success or failure of the data connection.
Abstract:
System and method for minimizing data bottlenecks in Low Data Rate Networks (LDRNs) that communicate facsimile transmissions. An LDRN is a facsimile network having a transmission data rate less than the data rate of the FAX machines serviced by the network. The system and method can be implemented in any type of LDRN, including analog and digital wired LDRNs, as well as analog and digital wireless (e.g., cellular) LDRNs. The system and method involve processing the facsimile transmissions in order to make the data rates of the LDRN and the FAX machines compatible, thereby minimizing any potential facsimile data bottlenecks that may occur in the LDRN due to its slower data rate.
Abstract:
Providing an audible feedback feature giving the user the ability to audibly monitor the progress of a data connection over a digital wireless channel. Audible tones generated within a base station and received from a telephone network are encoded within the base station and transmitted over the digital wireless link to a mobile unit. The mobile unit decodes the signal received from the base station and provides the audible tones to a user. The user can thus monitor the success or failure of the data connection.