Abstract:
Un método de operar una estación base (910) en una red inalámbrica (900), que comprende:asignar (A1110) recursos radio para un equipo de usuario (920) en tramas de una pluralidad de tipos de tramaque incluye los primer y segundo tipos de trama, en el que una trama de cada tipo de trama incluye unpreámbulo que distingue la trama de las tramas de otros tipos de trama;formar (A1120) una trama entrelazada entrelazando las tramas de la pluralidad de tipos de trama de maneraque en la trama entrelazada,una parte de enlace descendente de una trama de un tipo de trama no se solapa con una parte de enlaceascendente de una trama de cualquier otro tipo de trama, yuna parte de enlace ascendente de la trama del un tipo de trama no se solapa con una parte de enlacedescendente de la trama del cualquier otro tipo de trama; ycomunicar (A1130) con el equipo de usuario (920) de acuerdo con la trama entrelazada,caracterizado porquela trama entrelazada formada en el paso de formación (A1120) comprende una pluralidad de secuencias queincluye las primera y segunda secuencias, cada secuencia que comprende una parte de enlace descendenteseguida por una parte de enlace ascendente,en la primera secuencia, la parte de enlace descendente incluye un punto de sincronización y los recursos deenlace descendente correspondientes al primer tipo de trama y la parte de enlace ascendente incluyerecursos de enlace ascendente correspondientes a un tipo de trama diferente del primer tipo de trama, yen la segunda secuencia inmediatamente posterior a la primera secuencia, la parte de enlace descendenteincluye un punto de sincronización y los recursos de enlace descendente correspondientes al segundo tipo detrama y la parte de enlace ascendente incluye recursos de enlace ascendente correspondientes a un tipo detrama diferente del segundo tipo de trama.
Abstract:
Method and apparatus for generating a set of generator polynomials for use as a tail biting convolutional code to operate on data transmitted over a channel comprises: (0) specifying a constraint and a low code rate for a tail biting convolutional code, where the low rate code is lower than 1/n (n being an integer greater than 4); (1) selecting valid combinations of generator polynomials to include in a pool of potential codes, each valid combination being a potential code of the low rate code; (2) determining first lines of a weight spectrum for each potential code in the pool and including potential codes of the pool having best first lines in a candidate set; (3) determining best codes of the candidate set based on the first L number of lines in the weight spectrum; (4) selecting an optimum code(s) from the best codes; and (5) configuring a circuit(s) of a data transceiver (60/90) to implement the optimum code(s).
Abstract:
A network (20) comprises an authenticator node (22) and a server (24) such as an authentication, authorization, and accounting (AAA) server. A method comprises a terminal (30) sending authentication capabilities information (AC) across a network access interface (32) to the network (the authentication capabilities information provides an indication of authentication capabilities of the terminal). The network (20) then uses the authentication capabilities information to determine a first cryptographic value. The terminal (30) then uses the authentication capabilities information to determine a second cryptographic value. The network (20) compares the first cryptographic value and the second cryptographic value to authenticate the terminal.
Abstract:
A network (20) compris-es an authenticator node (22) and a serv-er (24) such as an authentication, autho-rization, and accounting (AAA) server. A method comprises a terminal (30) sending authentication capabilities in-formation (AC) across a network access interface (32) to the network (the au-thentication capabilities information provides an indication of authentication capabilities of the terminal). The net-work (20) then uses the authentication capabilities information to determine a first cryptographic value. The terminal (30) then uses the authentication capa-bilities information to determine a sec-ond cryptographic value. The network (20) compares the first cryptographic value and the second cryptographic val-ue to authenticate the terminal.
Abstract:
Method and apparatus for generating a set of generator polynomials for use as a tail biting convolutional code to operate on data transmitted over a channel comprises: (0) specifying a constraint and a low code rate for a tail biting convolutional code, where the low rate code is lower than 1/n (n being an integer greater than 4); (1) selecting valid combinations of generator polynomials to include in a pool of potential codes, each valid combination being a potential code of the low rate code; (2) determining first lines of a weight spectrum for each potential code in the pool and including potential codes of the pool having best first lines in a candidate set; (3) determining best codes of the candidate set based on the first L number of lines in the weight spectrum; (4) selecting an optimum code(s) from the best codes; and (5) configuring a circuit(s) of a data transceiver (60/90) to implement the optimum code(s).
Abstract:
Mechanisms to interlace multiple legacy frames to enhance radio resource utilization are described. Also described are mechanisms to modify a low- latency frame structure to appear as legacy frames. In one aspect, partially blanked-out legacy frames are interlaced with time offsets so that they complement each other to leave no idle system time. To a legacy user equipment (920), the interlaced frame appears as normal legacy frames used by multiple legacy cells. In another aspect, the low-latency frame is modified to appear as an interlaced frame. Again to the legacy user equipment (920), the low-latency frame appears as legacy frames from multiple legacy cells. To the low-latency user equipment, the modified low-latency frame still appear as normal low-latency frame. In this manner, radio resources of the legacy base stations are optimally utilized. Also, low-latency base stations (910) are enabled to provide serves to the legacy user equipments (920) without wasting radio resources.