Abstract:
This invention provides methods and apparatus for offering tiered application services for access to network services on a pay-per-use basis in public access networks. Using personal devices (108), the user can access different tiers of application services on demand (103, 104), without the need of any preexisting association, e.g., subscription, with the service provider of the wireless access system (111). Such on-demand access is obtained by providing a variety of personal identifiers, such as a credit card number or frequent flier identification. Moreover, the service offering allows a user through a personal device to modify, enhance or degrade the currently established tier of application services during the lifetime of the user's association with the access network. A network-level enforcement mechanism at access points within the access network ensures user access only to application services within the application service tier that they have paid for, and denies service accesses not within that tier.
Abstract:
The present invention relates to a communication system where tree-search or stack contention-resolution algorithms in hybrid MAC protocols are used by CaTV stations to resolve message transmission collisions. The stations, which are computer communicating devices, communicate by message transmissions over a communications channel where message contents of some of these transmissions are destroyed by collision of those messages sent from different stations. To resolve message transmission collisions, non-overlapping transmission time intervals (TT1, 202) of variable durations are generated and grouped into clusters (305, 308) of varying number of time intervals (TT1, 202) and varying time distances between them. Sequences (A, B) of clusters are formed in which any station transmitting in a particular cluster (305, 306) will learn of the status of its message transmissions before commencement of the next cluster (307, 308). Collision resolution is performed collectively on all message transmissions in a cluster and along the successive clusters of the same sequence.
Abstract:
The present invention relates to a communication system where tree-search or stack contention-resolution algorithms in hybrid MAC protocols are used by CaTV stations to resolve message transmission collisions. The stations, which are computer communicating devices, communicate by message transmissions over a communications channel where message contents of some of these transmissions are destroyed by collision of those messages sent from different stations. To resolve message transmission collisions, non-overlapping transmission time intervals of variable durations are generated and grouped into clusters of varying number of time intervals and varying time distances between them. Sequences of clusters are formed in which any station transmitting in a particular cluster will learn of the status of its message transmissions before commencement of the next cluster. Collision resolution is performed collectively on all message transmissions in a cluster and along the successive clusters of the same sequence.
Abstract:
The present invention relates to a communication system where tree-search or stack contention-resolution algorithms in hybrid MAC protocols are used by CaTV stations to resolve message transmission collisions. The stations, which are computer communicating devices, communicate by message transmissions over a communications channel where message contents of some of these transmissions are destroyed by collision of those messages sent from different stations. To resolve message transmission collisions, non-overlapping transmission time intervals (TT1, 202) of variable durations are generated and grouped into clusters (305, 308) of varying number of time intervals (TT1, 202) and varying time distances between them. Sequences (A, B) of clusters are formed in which any station transmitting in a particular cluster (305, 306) will learn of the status of its message transmissions before commencement of the next cluster (307, 308). Collision resolution is performed collectively on all message transmissions in a cluster and along the successive clusters of the same sequence.
Abstract:
The present invention relates to a communication system where tree-search or stack contention-resolution algorithms in hybrid MAC protocols are used by CaTV stations to resolve message transmission collisions. The stations, which are computer communicating devices, communicate by message transmissions over a communications channel where message contents of some of these transmissions are destroyed by collision of those messages sent from different stations. To resolve message transmission collisions, non-overlapping transmission time intervals (TT1, 202) of variable durations are generated and grouped into clusters (305, 308) of varying number of time intervals (TT1, 202) and varying time distances between them. Sequences (A, B) of clusters are formed in which any station transmitting in a particular cluster (305, 306) will learn of the status of its message transmissions before commencement of the next cluster (307, 308). Collision resolution is performed collectively on all message transmissions in a cluster and along the successive clusters of the same sequence.
Abstract:
Verfahren zum sicheren Virtualisieren einer Mobilfunkeinheit, wobei das Verfahren aufweist:Instanziieren einer virtualisierten Instanz einer Unternehmensumgebung, die mindestens eine Unternehmensanwendung auf einer virtualisierten Instanz eines Host-Servers aufweist, der in einem Datenverarbeitungssystem angeordnet ist, wobei das Datenverarbeitungssystem eine drahtlose Vernetzung aufweist;Bereitstellen einer zusätzlichen Datenanzeige- und Dateneingabeeinheit in einer drahtlosen Datenübertragungseinheit, die durch die drahtlose Vernetzung Daten mit dem Datenverarbeitungssystem austauscht;Verschlüsseln der virtualisierten Instanz der Unternehmensumgebung in der virtualisierten Instanz des Host-Servers;Übermitteln der verschlüsselten virtualisierten Instanz der Unternehmensumgebung durch die drahtlose Datenübertragungseinheit an die zusätzliche Datenanzeige- und Dateneingabeeinheit;Entschlüsseln der verschlüsselten virtualisierten Instanz der Unternehmensumgebung in der zusätzlichen Datenanzeige- und Dateneingabeeinheit; undAnzeigen der virtualisierten Instanz der Unternehmensumgebung auf der zusätzlichen Datenanzeige- und Dateneingabeeinheit.
Abstract:
This invention provides methods and apparatus for offering tiered application services for access to network services on a pay-per-use basis in public access networks. Using personal devices (108), the user can access different tiers of application services on demand (103, 104), without the need of any preexisting association, e.g., subscription, with the service provider of the wireless access system (111). Such on-demand access is obtained by providing a variety of personal identifiers, such as a credit card number or frequent flier identification. Moreover, the service offering allows a user through a personal device to modify, enhance or degrade the currently established tier of application services during the lifetime of the user's association with the access network. A network-level enforcement mechanism at access points within the access network ensures user access only to application services within the application service tier that they have paid for, and denies service accesses not within that tier.
Abstract:
Zum sicheren Virtualisieren einer Mobilfunkeinheit wird ein Mobilfunk-Datenübertragungsnetzwerk verwendet, das Randknoten-Server als Basis-Übertragungsstationen aufweist. Eine virtualisierte Instanz des Host-Servers enthält eine virtualisierte Instanz einer Unternehmensumgebung. Basisstation-Controller tauschen Daten mit den Basis-Übertragungsstationen aus und steuern diese. Eine Mobilfunk-Vermittlungszentrale, die Daten mit den Basisstation-Controllern austauscht, enthält die virtualisierte Instanz des Host-Servers. Eine Mobilfunk-Datenübertragungseinheit tauscht Daten mit einem Randknoten-Server aus, und eine zusätzliche Datenanzeige- und Dateneingabeeinheit tauscht Daten mit der Mobilfunk-Datenübertragungseinheit aus, sodass sich die virtualisierte Instanz der Unternehmensumgebung auf dem Randknoten-Server befindet. Die Datenübertragungen zwischen der zusätzlichen Datenanzeige- und Dateneingabeeinheit sind verschlüsselt. Außerdem wird die Bewegung der Mobilfunk-Datenübertragungseinheit innerhalb des Mobilfunk-Datenübertragungsnetzwerks vorhergesehen, sodass die zusätzlichen fernen virtualisierten Instanzen der Unternehmensumgebung auf potenziellen künftigen Edge-Servern bereitgestellt werden.
Abstract:
A method for moving OSI layer 4 connections (such as Transport Control Protocol TCP) seamlessly between wireless User Equipments (UE) connected to a series of cell towers in applications where the connection is extracted out of the underlying cellular protocols at the towers. On detecting that a UE with a broken-out layer 4 connection has moved from a first to a second cell tower, traffic for an existing connection from the UE is tunneled between the first cell-tower and the second cell-tower. On identifying a predetermined trigger event, which may be natural or forced quiescence at the terminal, an ongoing bidirectional flow of packets is migrated to the second cell-tower.