A method for wireless communication using MAC pus. The method includes determining one or more characteristics of a service flow and selecting on the basis of the one or more characteristics a MAC DU header type among a plurality of MAC DU header types. The service flow data is encapsulated in MAC pus with a header of the selected type. The MAC pus with the encapsulated service flow data are then tirelessly transmitted. Also, a method for communication between a Base Station (BS) and a Subscriber Station (SS). The method includes generating at the BS a plurality of MAC DU packets with a payload component holding service flow data and a plurality of MAC DU packets without payload component, carrying control information. The method also includes transmitting tirelessly the MAC DU packets with the payload component and the MAC DU packets with the control information to the SS.
A method and apparatus for adjusting a symbol decision threshold at a receiver in a communication network enables the receiver to be adapted to more correctly receive symbols as transmitted by a transmitter. In one embodiment, a received bit imbalance is detected by a receiver prior to error correction and after error correction to determine whether an error component of the received signal contains larger numbers of ones or larger numbers of zeros. Where the transmitter scrambles the signal prior to transmission, the receiver will also scramble the signal after error correction and prior to counting the number of zeros or ones. Any imbalance between the number of transmitted and received ones or zeros is used as feedback to adjust threshold values used by detectors to fine tune the manner in which the receiver interprets incoming signals.
The present invention presents a method, arrangement and computer program product for clocking exploiting the relative behavior of clocks of individual receiving stations as well as a corresponding modeling to derive a time difference of arrival of a signal from a user device which can be used to correct the time difference of arrival based on the modeled clock behavior and leads to a correct clocking of received user signals without the need of synchronization of the clocks in the various receiving stations. This principle is applicable to a plurality of pairs of receiving stations and beacon signals transmitted amongst them and allows for a correct location estimation of a user device.
G01S 5/02 - Position-fixing by co-ordinating two or more direction or position-line determinationsPosition-fixing by co-ordinating two or more distance determinations using radio waves
G01S 5/06 - Position of source determined by co-ordinating a plurality of position lines defined by path-difference measurements
4.
TDOA BASED POSITIONING WITH CALCULATION OF CORRECTION FACTORS FOR COMPENSATING THE CLOCK OFFSETS OF UNSYNCHRONIZED NETWORK STATIONS
The present invention presents a method, arrangement and computer program product for clocking exploiting the relative behavior of clocks of individual receiving stations as well as a corresponding modeling to derive a time difference of arrival of a signal from a user device which can be used to correct the time difference of arrival based on the modeled clock behavior and leads to a correct clocking of received user signals without the need of synchronization of the clocks in the various receiving stations. This principle is applicable to a plurality of pairs of receiving stations and beacon signals transmitted amongst them and allows for a correct location estimation of a user device.
G01S 5/02 - Position-fixing by co-ordinating two or more direction or position-line determinationsPosition-fixing by co-ordinating two or more distance determinations using radio waves
G01S 5/06 - Position of source determined by co-ordinating a plurality of position lines defined by path-difference measurements
5.
JOINT UPLINK DATA PROCESSING BY PLURAL BASE STATIONS
Joint uplink processing by plural base stations includes sending, by a serving base station, a request for uplink resources of a second base station for receiving uplink data of a mobile station. The serving base station receives first uplink data from the mobile station, and the serving base station further receives (from the second base station) second uplink data of the mobile station received by the second base station using the uplink resources specified by the request.
A system and method for transitioning connectivity of a mobile node between mobility access gateways on a communication system using an inter-MAG tunneling protocols for a fast handoff. The protocols can use pre-configured or dynamic protocols on the IP-Layer or another layer on the protocol stack. In a hi-directional tunneling mechanism, the protocol and system supports the transfer of the mobility session context information for the mobile node to the next MAG in advance of the fast handoff to avoid delays and an inter-serving gateway bidirectional tunneling mechanism to allow forwarding of the mobility session traffic between new serving gateway and the prior serving gateway without ambiguity.
A method ensures that multicast packets follow the same loop-free path followed by unicast packets in a packet communication network. The communication network includes at least one first area interconnected through at least one area border node ("ABN") to a second area. Each ABN has a first level port connected to each first area and a second level port connected to the second area. Each multicast packet forwarded includes a header having a root-id identifying a root of a multicast tree. A data packet is received at an ABN. Responsive to receiving a multicast packet at a second level port of an area border node, the root-id of the multicast packet is examined and if the multicast packet is to be forwarded over at least one of the first level ports, a different root-id is substituted into the packet before the packet is forwarded over the first level port.
A base station sends a request for information relating to radio access technology capabilities of a mobile station. The base station receives a message containing information relating to radio access technology capabilities of the mobile station, where the message is responsive to the request, and the information contained in the message specifies that the mobile station supports at least two different types of radio access technologies useable by the mobile station to communicate over a wireless link between the base station and the mobile station. The base station is able to control which of the at least two different types of radio access technologies the mobile station is to use.
A method for a subscriber station to perform network entry in a multi-carrier wireless environment that has a primary carrier and at least one secondary carrier associated with a base station. The method includes sensing a carrier in an area serviced by the base station and determining if the carrier is a primary carrier or a secondary carrier. The method further includes performing the network entry if the determining establishes that the sensed carrier is a primary carrier and not a secondary carrier.
A method is presented for transmitting or re-transmitting data in a multiple-input, multiple-output wireless communication using space-time block coding wherein a mapping table maps a plurality of symbols to antennas and transmission resources, which may be time slots or OFDM sub bands. The mapping table comprises nesting of Alamouti-coded primary segments; i.e. Alamouti coding at the symbol level, within secondary segments which may comprise Alamouti coding of primary segments.
H04B 7/06 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
11.
TRANSMISSION OF MULTICAST BROADCAST SERVICE (MBS) TRAFFIC IN A WIRELESS ENVIRONMENT
Multicast broadcast service (MBS) transmission in a multiple-input-multiple- output (MIMO) communication being transmitted using one of three modes, a single-layer mode, a spatial multiplexing (SM) mode and a hierarchical mode. In the hierarchical mode, lower quality data is transmitted over a first MIMO layer and enhancement data is transmitted over a second MIMO layer. A receiving device may only successfully receive the lower quality data or may successfully receive the enhancement data to enhance it with. The transmission scheme used, including the mode used, may be selectable, and may be selected based on feedback.
H04W 4/06 - Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]Services to user groupsOne-way selective calling services
H04W 72/08 - Wireless resource allocation based on quality criteria
H04L 27/18 - Phase-modulated carrier systems, i.e. using phase-shift keying
H04L 27/32 - Carrier systems characterised by combinations of two or more of the types covered by groups , , , or
12.
METHOD AND SYSTEM FOR CONTROLLING ESTABLISHMENT OF COMMUNICATION CHANNELS IN A CONTACT CENTRE
A method for controlling establishment of a communication channel between a service provider terminal of a contact centre and a service request terminal is disclosed. The method comprises responding to receipt of a request to establish the communication channel by: a) determining whether a licence for a media type associated with the communication channel is allocated to the service provider terminal; b) if a licence is determined to be allocated to the service provider terminal, allowing establishment of the communication channel; c) if a licence is determined not to be allocated to the service provider terminal, determining availability of a licence from a pool of licences; d) if a licence is determined not to be available, refusing establishment of the communication channel; and e) if a licence is determined to be available, allocating the licence to the service provider terminal and allowing establishment of the communication channel.
While a mobile station is in a reduced power state, the mobile station determines whether the mobile station has up-to-date neighbor cell information. In response to determining that the mobile station does not have up-to-date neighbor cell information, the mobile station transitions from the reduced power state to a higher power state, so that the mobile station can receive a message identifying neighbor cells.
The present invention allows a first communication client, which is initiating a communication session, to include admission information in a session request used to establish the communication session in a regular call or conference scenario. The session request is intended to trigger a communication session between the first communication client and another communication client, which is associated with a telephony endpoint or a conferencing system having a communication client. The receiving communication client will use the admission information provided in the session request to determine whether the session is authorized. If authorized, the receiving communication client will either establish the communication session or allow the communication session to be established, as the situation dictates.
H04L 12/12 - Arrangements for remote connection or disconnection of substations or of equipment thereof
H04L 12/18 - Arrangements for providing special services to substations for broadcast or conference
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
15.
PROVIDING A DENY RESPONSE THAT SPECIFIES A DELAY TIME
A system receives, from a mobile station, a connection request that specifies a particular application type. In response to determining that the connection request is to be denied, the system sends a response denying the connection request to the mobile station, where the response includes a delay time that is applicable to the particular application type but not to another application type, and where the delay time indicates an amount of delay that the mobile station is to wait before resending another connection request.
A method is provided for filtering unwanted packets in a communication system. The communication system includes a first network, a wireless network and at least one wireless communication device. An instruction to add an entry to a blocked list is received from a specific wireless device. The entry includes blocking criteria. A first packet is received from the first network. The first packet is destined for the specific wireless communication device. If the first packet exhibits the blocking criteria included in the blocked list, the first packet is discarded before it can be distributed by the wireless network.
A wireless receiver receives reference signals over a wireless link. The wireless receiver calculates a selection indication based on the received reference signals, and the wireless receiver selects from among plural channel estimation techniques based on the selection indication, where the selected channel estimation technique is usable to perform channel estimation of the wireless link.
IP Multinetting on a local area network is simulated by performing VLAN translation at a port connecting to the local area network. This allows IP addresses from multiple subnets to be associated with a single VLAN on the Local Area Network (LAN), while allowing the core switch to process the packets with a one-to-one correspondence between IP Subnet and VLAN. When a packet is received from the local area network at an IP multinetting port, the VLAN ID will be read to determine if the packet contains the IP Multinetting VLAN ID. The IP Subnet address will also be checked to see if the packet is associated with an IP Subnet that is part of the Multinetting. If so, the multinetting VLAN ID will be changed to an IP Subnet specific VLAN ID before the packet is processed by the core switch.
A method for execution by a mobile station (MS) in a mobile communications network, the method comprising: receiving a first MS identifier from the network during a ranging operation involving the MS; using the first MS identifier to extract the contents of at least one message received from the network during said ranging operation; using a second MS identifier, different from the first MS identifier, to extract the contents of at least one message received from the network after said ranging operation is complete. Also, a method for execution by the base station, comprising: outputting a first message destined for the MS, the first message including a first identifier for use by the MS during a ranging operation; determining that said ranging operation is complete; outputting a second message destined for the MS, the second message including a second identifier for use by the MS in subsequent communication with the network.
Transmission of uplink control message for a wireless system. The uplink control message may be encoded according to one of multiple possible schemes. The choice of encoding scheme may be made based on the control message size and/or based on the available transmission resources and/or based on the detection scheme used on the receiving end. A modulation scheme may also be selected based on such factors. CDM may be used for certain control messages. Block code encoding, such as Reed-Muller encoding may be used for certain control messages. Different transmission resources may be allocated for different control message uses. The encoding specifics may be selected to obtain a certain hamming distance and/or size of the encoded message or based on other factors.
A user status may be updated at one of a plurality of network entities associated with a user. Through communication between the network entity on which the update has been made and a central server, an indication of the status update may be transmitted, by the central server, to the other network entities associated with the user.
A method and system for a method of transmitting data within a signal frame. The method comprises inserting a first synchronization preamble into a first location within the signal frame and inserting a second synchronization preamble into a second location within the signal frame, wherein the first synchronization preamble conveys information indicative of the second location. The method further comprises issuing the signal frame towards a receiving device in a wireless communication environment.
Where a separate bearer channel is required to be set up in a mobile network to complete a hybrid VoIP call on the mobile network as specified in 3GPP ICS standard TR 23.892, an alerting process may be started after a provisionable delay rather than upon completion of the network call setup. This allows the mobile network user to start responding to the impending call before signaling of the call has been completed, so that the person can answer closer in time to completion of call signaling. Additionally, the person who placed the call may be provided with ringing feedback to make it sound like the call has been completed. The amount of delay between receipt of a SIP invite and the onset of an alerting process may be specified in the mobile handset or may be specified as a header in the SIP invite. The amount of delay may be fixed or adjusted based on feedback.
A ring control protocol is used to establish a separate control plane for a plurality of physically dual homed devices to enable collections of dual homed devices to be represented by a single pair of addresses into the attached routed Ethernet network. The gateway devices analyze the passing ring control packets to create direct mappings for data packets to the routed Ethernet network. Thus, although the dual homed devices are treated as a ring from a control perspective, the data path is implemented to be direct so that data packets continue to flow directly from the dual homed devices to each of the attached gateway devices. In one embodiment, each of the gateway devices implements a virtual switch and advertises the MAC address of the virtual switch into the routed Ethernet network rather than the MAC addresses of each of the attached Ethernet Switch Units.
A mobile station receives a control message containing an indicator of presence of a first access network that operates according to a first protocol that is capable of interworking with a second access network that operates according to a second, different protocol. In response to receiving the indicator, the mobile station performs a procedure to establish a personality for the mobile station that specifies the configuration to allow the mobile station to use features of the first access network that enable interworking with the second access network.
The location of a terminal is estimated within an area of coverage of a wireless network comprising at least one fixed node by measuring a complex frequency response of a radio channel between the terminal and one of said fixed nodes and estimating the location of the terminal on the basis of at least a comparison between data representing a first metric of the measured complex frequency response and data representing a plurality of stored metrics, each of said plurality of stored metrics being related to one of a plurality of different locations within the network and each stored metric being of a complex frequency response measured between the said one of said fixed nodes and the location within the network to which the metric relates.
A mobile station attached to an access network receives a control message identifying neighboring cells of a different wireless technology than the access network. The mobile station searches for signaling of the neighboring cells of the different wireless technology, and in response to not being able to detect the signaling of the neighboring cells, the mobile station increases a time interval between successive searches for the signaling.
The present invention uses a message with a suspend/resume flag setting sent to the local mobility anchor from the foreign agent that was supporting downlink transmissions to the mobile node. Namely, a transient binding option is proposed for creating a transient BCE state at the home agent/local mobility anchor during an inter-MAG handover, which will suspend down-link traffic from the home agent/local mobility anchor until the transient BCE (suspend) state is cleared by the foreign agent previously supporting downlink transmissions. After the transient BCE (suspend) state is cleared, the downlink traffic from the home agent/local mobility anchor can resume with forwarding of downlink traffic to the mobile node through the foreign agent. The present invention can be implemented using a new protocol application or modified messages from prior registration applications.
A system for controlling packet forwarding through a dual-homed connection between first and second network domains, the dual-homed connection including two peer nodes connected to the first and second network domains. A sub-ring network is instantiated in the first network domain, and includes at least two nodes connected in a linear topology between a pair of end-nodes. Each end-node corresponds with a respective one of the peer nodes. A virtual link through the second network domain for conveys traffic of the sub-ring network between the peer nodes, and closes the sub-ring network to define a ring topology. Each of the nodes of the sub-ring network is controlled to forward packets of the sub-ring network in accordance with a ring network routing scheme.
Upon receiving a particular data unit by a receiving layer of a wireless device, it is detected that a previous data unit earlier in sequence to the particular data unit has not yet been received by the receiving layer. A timer is started in response to the detecting, where the timer has a timeout period that is variable dependent upon a parameter associated with receipt of the particular data unit. Upon expiration of the timer based on the timeout period, the receiving layer generates an error indication.
Coefficients of a pre-distorter are determined for correction of distortion of a signal amplified by a radio frequency amplifier by sampling the signal at the input to the pre-distorter to generate a plurality of input samples and sampling the signal at the output of the amplifier to generate a plurality of output samples, each of the plurality of output samples corresponding to one of the plurality of input samples, calculating a figure of merit for one or more of said plurality of input samples on the basis of the one or more of said plurality of input samples, selectively updating a previously selected set of input samples with said one or more of said plurality of input samples on the basis of the calculated figure of merit, whereby to generate an updated selected set and determining the coefficients of the pre-distorter on the basis of the input samples in the updated selected set and the corresponding output samples.
Interest in multicast group membership may be advertised via a routing system on an Ethernet network along with an indication of an algorithm to be used by the nodes on the network to calculate the distribution tree or trees for the multicast. Each node, upon receipt of the advertisement, will determine the algorithm that is to be used to produce the multicast tree and will use the algorithm to calculate whether it is on a path between nodes advertising common interest in the multicast. Example algorithms may include shortest path algorithms and spanning tree algorithms. This allows multicast membership to be managed via the routing control plane, while enabling spanning tree processes to be used to forward multicast traffic. Since spanning tree is able to install multicast state per service rather than per source per service, this reduces the amount of forwarding state required to implement multicasts on the routed Ethernet mesh network.
A system and method are provided for enabling a mobile device to establish a local IP access on a packet data network connection on a femto cellular access network. A local server gateway and a macro server gateway are coupled to the femto cellular access network. A mobility management entity is coupled to the femto cellular access network, the local server gateway and the macro server gateway. The mobility management entity obtains a status mode of the mobile device and a location of the mobile device transmitted on the femto cellular access network. The mobility management entity selects one of the local server gateway and the macro server gateway based on the status mode of the mobile device and the location of the mobile device.
A set of critical nodes or links is identified on the network and alternate forwarding state is pre-computed and disseminated within a node such that, upon failure of one of the critical nodes/links, a minimal trigger will cause the alternate forwarding state to be used to forward traffic on the routed Ethernet mesh network. In one embodiment rather than storing full tables of alternate forwarding state, only the changes to the forwarding state required by an identified failure is stored by the network nodes. Upon occurrence of a failure on the network, the identified failure is used to select the alternate forwarding state.
Virtual links may be used to divert traffic within an Ethernet network without affecting overall traffic patterns on the Ethernet network. In one embodiment, the virtual link may be established on the network via a routing system in use on the network. Nodes on a defined path for the virtual link will install forwarding state for the virtual link so that traffic may follow the defined path through the network. The logical view of the virtual link, from a routing perspective however, has the same cost as the shortest path between the endpoints of the virtual link and, accordingly, does not affect other traffic patterns on the network. Once established, the end nodes on the virtual path will have two equal cost paths through the network - one following the shortest path tree and one along the path for the virtual link. The end nodes may use a tie breaking process in an Equal Cost Multi Path (ECMP) selection process to preferentially select the virtual link over the shortest path.
Each access node is associated with one or more IP subnets with a preferred default subnet. Each subnet is instantiated as a unique virtual Ethernet broadcast domain. As client nodes register on the communication network, they will dynamically try to obtain an IP address for use on the communication network. As part of this process, the MAC address of the client node will be checked to ensure that it is not a duplicate of another MAC address associated with another client node that has already been assigned an IP address from the default subnet. When duplicate MAC addresses are detected, the device with the duplicate MAC address will be assigned an IP address from a different subnet so that more than one client device with the same MAC address are not associated with the same subnet. In one embodiment, a DHCP server may implement the process of checking for duplicate MAC addresses. In an Ethernet context, different IP subnet prefixes may be mapped to different S-VID values so that the different subnets are implemented as different VLANs within the Ethernet network.
A method and system are provided to perform channelization in a wireless communication network, wherein the wireless communication network including at least one base station that is communicatively coupled to at least one mobile terminal. A bandwidth of the wireless communication network is divided into a plurality of zones at the base station. Resource blocks are provided at the base station to receive data symbols transmitted in the wireless communication network. A plurality of resource blocks are combined at the base station to form a physical basic channel unit which are allocated to one of the plurality of zones at the base station. A permutation is performed on the physical basic channel unit to form a logical basic channel unit. A channel is provided to communicatively couple the base station and the mobile terminal so that the mobile terminal may send an access grant message and a user identification to the base station to transmit data in the logical basic channel unit.
In a communications system, a mobile station receives, from a base station, a downlink control message associated with an indication that particular control information is to be transmitted by the mobile station on an uplink traffic channel on a repeated basis. In response to receiving the downlink control message associated with the indication, the particular control information is transmitted on the uplink traffic channel to a base station on a repeated basis.
A fiber network is monitored in order to detect physical intrusion. The state of polarization of an optical fiber is monitored. A fiber tap is determined to have occurred if the state of polarization of the fiber changes beyond a predetermined amount found to be associated with all types of fiber taps. Alternately, it may be determined that a fiber tap has occurred if the state of polarization changes beyond a second predetermined amount and in a predetermined direction. Monitoring of the state of polarization occurs before and after a time period chosen to be less than a time during which the state of polarization of the optical fiber is expected to drift. This step eliminates false positives due to natural fiber PMD drift.
A method and system provide in-band protection switch signaling in a communication system arranged as a point-to-multipoint tree. The point-to-multipoint tree includes a root node communicatively coupled to a plurality of leaf nodes through both a working link and a protection link. Data is transferred through a current link of the point-to-multipoint tree. The current link is either the working link or the protection link. A fault is detected in the current link in the point-to-multipoint tree. Each leaf node in the point-to-multipoint tree is notified of the fault using the current link. Upon receiving the notification, the root node and each leaf node switch to the other link of the working link and the protection link.
H04B 1/74 - Details of transmission systems, not covered by a single one of groups Details of transmission systems not characterised by the medium used for transmission for increasing reliability, e.g. using redundant or spare channels or apparatus
In a coherent optical receiver of an optical communications network, a method of recovering a clock signal from a high speed optical signal received through an optical link. A set of compensation vectors are adaptively computed for compensating Inter-symbol Interference (ISI) due to at least polarization impairments of the optical signal. A channel delay is estimated based on the computed compensation vectors. The estimated channel delay is subtracted from the computed compensation vectors to generate corresponding modified compensation vectors. Finally, the modified compensation vectors are used to derive a recovered clock signal.
H04L 7/033 - Speed or phase control by the received code signals, the signals containing no special synchronisation information using the transitions of the received signal to control the phase of the synchronising-signal- generating means, e.g. using a phase-locked loop
H04B 10/18 - Arrangements for reducing or eliminating distortion or dispersion, e.g. equalisers
An enhanced communication bridge includes a context interface that enables the audio bridge to learn information about the type of Voice encoder, device, network connection, location, type of call (business vs. personal), identity and position of the individual, and other information about the context of the communication session itself as well as the context of each person joining the communication session. This context information is used to determine how quality of experience targets for the communication as a whole, as well as how each individual contribution should be uniquely processed to attempt to meet the quality of experience targets. Business factors may influence the decision as to the type of processing to be implemented on each of the signals provided by the participants. Corrective action may also be implemented by the bridge on the client network devices as well in the embodiment. The bridge may be centralized or distributed. A video bridge may be implemented as well.
A method for storing data in an IP multimedia subsystem (IMS) is disclosed. The method comprises: i) selecting a first user and a second user, which are not aliases; ii) analysing first and second data sets associated with the first and second users respectively to identify common data elements in each of the first and second data sets, the first and second datasets being useable by a first application server within the IMS to satisfy service requests on behalf of the first and second users; iii) creating a data structure containing a single instance of the identified common data elements; and iv) storing the data structure in a home subscriber server (HSS) within the IMS.
A mobile station that is initially attached to a first type of wireless access network is involved in a packet-switched emergency call. Upon detection of transitioning of the mobile station, a message is sent indicating transitioning of the mobile station from the first type wireless access network to the second type wireless access network to cause the packet-switched emergency call to be performed over the second type wireless access network.
Neighbor cell hearability can be improved by including an additional reference signal that can be detected at a low sensitivity and a low signal-to-noise ratio, by introducing non-unity frequency reuse for the signals used for a time difference of arrival (TDOA) measurement, e.g., orthogonality of signals transmitted from the serving cell sites and the various neighbor cell sites. The new reference signal, called the TDOA-RS, is proposed to improve the hearability of neighbor cells in a cellular network that deploys 3GPP EUTRAN (LTE) system, and the TDOA-RS can be transmitted in any resource blocks (RB) for POSCH and/or MBSFN subframe, regardless of whether the latter is on a carrier supporting both PMCH and POSCH or not. Besides the additional TDOA-RS reference signal, an additional synchronization signal (TDOA-sync) may also be included to improve the hearability of neighbor cells.
An MME keeps track of the network tracking mobility characteristic by periodically updating a TA transition probability matrix, which is derived from a global table that maintains data of UE movement in the network by noting the current TA and most recently known previous TA of each EU for every TAU event and paging event. The MME also maintains data as to the number of paging events and TAUs performed by each UE and stores a paging ratio versus TAU for each UE. The UE characteristics, UE paging ratio, and network mobility characteristic are utilized in an algorithm that constructs a TA list for each UE designed to minimize the overall traffic cost function for paging events and TAU events for that UE and for the overall network. Optionally, the TA list for each EU may be constrained to meet certain minimum performance characteristics such as a predetermined paging success rate target and/or a predetermined delay bound target.
In order to ameliorate the overload at an overloaded network node that is discarding some of the SMSs it is receiving, when a node is overloaded with received SMSs, it sends a message to the nodes from which it is receiving SMSs of that fact and includes a parameter indicating the extent to which it is overloaded. That parameter, for instance, may be the percentage of SMSs that it is receiving that are being discarded. With this information, the sending node can determine a percentage of the pending SMSs during such conditions that will help remove the overloaded node from the overload condition more quickly. Furthermore, the network protocol may be adapted to include a priority parameter in SMSs. The SMS receiving node can then make a more informed decision as to which SMSs to discard and which to deliver based on the priority parameter. Even further, when an SMS sending node knows that a node to which it is sending SMSs is overloaded, the sending node itself may decide which SMSs to send to the overloaded node based on such priority information.
A system includes a first base station of a first vendor configuration and a second base station of a second vendor configuration. A link is between the first and second base stations. The first base station is configured to receive at least one interference indicator message from the second base station, and schedule transmission of data based on the at least one interference indicator message. Scheduling the transmission of data includes determining whether to transmit the data using a current resource or to delay transmission of the data.
The method of synchronisation of a reference frequency of a base station transceiver (BTS), to the reference frequency of a base station controller (BSC) comprises a sequence of steps, wherein synchronisation packets are transmitted and provided with a time stamp of transmission and a time stamp of reception. An evaluation network delivery is evaluated upon finalization of a period of observation. If high enough, a confidence level is established of the received synchronisation packets. Only if the confidence level is above a threshold, a correction to the reference frequency of the oscillator in the base station transceiver is applied.
The method for packet communication in a radio access network improves the capacity of a packet switched network between a base station controller and a base transceiver station by gathering a number of TDM frames associated to communication channels to be transmitted in a TDM frame. This occurs in form of a chunk transmitting them, while at the same time storing them at the transmitter and at the receiver. Upon the next transmission, columns representative of a respective communication channel of a next transmission period are compared with a previous one. A determination is made if identical columns are contained. If so, these columns are omitted from transmission. Instead, a reference is transmitted in a compression header indicating the number and position of identical columns. The receiver may then regenerate a complete number of communication channels.
Information URLs may be associated with three dimensional objects in a three dimensional virtual environment. When a URL is selected, an overlay web rendering engine renders a web page associated with the URL over the object in the three dimensional virtual environment. The web page may include rich content, interactive content, or any other type of web content supported by the user's local browser and browser plugging. The user may interact with the content in the overlay web rendering engine to obtain successive layers of content or to affect the object in the virtual environment. The web page is rendered with a transparent background so that the three dimensional content of the virtual environment continues to be visible through the web page and provides context for the overlayed content. Information URLs may be used to provide information about objects, Avatars, or the virtual environment itself.
H04L 12/16 - Arrangements for providing special services to substations
G06F 19/00 - Digital computing or data processing equipment or methods, specially adapted for specific applications (specially adapted for specific functions G06F 17/00;data processing systems or methods specially adapted for administrative, commercial, financial, managerial, supervisory or forecasting purposes G06Q;healthcare informatics G16H)
G09G 5/377 - Details of the operation on graphic patterns for mixing or overlaying two or more graphic patterns
52.
METHOD AND APPARATUS FOR ENABLING A USER'S PRESENCE TO BE EXPERIENCED BY LARGE NUMBERS OF USERS IN A VIRTUAL ENVIRONMENT
A method and apparatus for enabling interaction with a large number of participants in a three dimensional computer-generated virtual environment is provided. In one embodiment, a participant in a three dimensional computer-generated virtual environment is able to simultaneously exist in multiple areas of a sliced virtual environment or in multiple instances of an instanced virtual environment. In this embodiment, the user's Avatar is replicated across the multiple regions/instances to simultaneously appear to users supported by multiple servers. Since users on multiple servers are able to see and hear the replicated Avatar, the virtual environment may be used to present information to a larger number of users than would be able to see the presenter's Avatar in the virtual environment hosted by a single virtual environment server.
H04L 12/16 - Arrangements for providing special services to substations
G06F 19/00 - Digital computing or data processing equipment or methods, specially adapted for specific applications (specially adapted for specific functions G06F 17/00;data processing systems or methods specially adapted for administrative, commercial, financial, managerial, supervisory or forecasting purposes G06Q;healthcare informatics G16H)
53.
USER INTERFACE FOR ORIENTING NEW USERS TO A THREE DIMENSIONAL COMPUTER-GENERATED VIRTUAL ENVIRONMENT
When new users are first introduced to virtual environments, the new users may be confused and uncertain as to how to interact with the virtual environment. Several new user orientation features have been added to the virtual environment user interface to help orient new users to the three dimensional computer-generated virtual environment and to prevent the new users from making common mistakes. Example beginning user orientation features include clearly distinguishing when the user is interacting with the virtual environment and when the user is interacting with virtual environment application controls, limiting the vertical field of view of the new user's Avatar to prevent the user from becoming stuck looking straight up or straight down, providing the user with visual feedback when switching between first and third person points of view, and providing the user with clear instructions as to how to control their Avatar and how to reenter the virtual environment.
G06F 19/00 - Digital computing or data processing equipment or methods, specially adapted for specific applications (specially adapted for specific functions G06F 17/00;data processing systems or methods specially adapted for administrative, commercial, financial, managerial, supervisory or forecasting purposes G06Q;healthcare informatics G16H)
A63F 13/00 - Video games, i.e. games using an electronically generated display having two or more dimensions
G06F 3/048 - Interaction techniques based on graphical user interfaces [GUI]
Queuing to a mobile agents is accomplished by assigning each mobile agents to one of a plurality of location zones based on information received from a tracking system, and maintaining a plurality of location-specific queues of requests, each location-specific queue having one or more of the location zones associated therewith, and each location- specific queue being serviced only by those mobile agents whose assigned location zone matches a location zone of that location-specific queue. On receiving a location-based request for the services of a mobile agent, an optimum queue is selected for the request from among the plurality of location-specific queues based at least in part on a comparison between the request location and a location zone associated with the optimum queue, subject to a servicing constraint that a queue can only be selected as the optimum queue if at least one agent is currently servicing the queue.
Methods for analysing an interactive voice response (IVR) system are disclosed. In the methods, prompts are issued from the IVR system and user input made in response to the prompts from the IVR system is received. One method involves analysing conversation between the caller and the agent with which the caller has been connected whereby to diagnose faults in the IVR system. Another method involves displaying the prompts issued by the IVR system to an operator; and receiving input data from the operator, the data defining whether any change to the IVR system is recommended and/or any recommended changes to the IVR system. Another method involves detecting the occurrence of an unexpected event by comparing the user input against a predefined set of rules, each rule being associated with one or more of the unexpected events; and taking a predefined action in response to the detection of one or more of the unexpected events.
A collaboration agent for facilitating real-time communications on behalf of a user. The collaboration agent includes a conference bridge that anchors calls to the conference bridge. The collaboration agent uses contextual information associated with the user to manage the real-time communications. The collaboration agent can communicate with other collaboration agents associated with other users.
Users create profiles containing their interests, professional qualifications, and/or personal information. When users encounter each other in the virtual environment, the information contained in the personal profiles is used to provide visual indications of the profile information so that other users know some modicum of information about the user associated with the Avatar. The user associated with the personal profile may control what information is provided publicly and what information is provided privately. Information in other users' profiles may be filtered to enable relevant information to be presented to the user. Filtering may be explicit and based on user-defined criteria. Filtering may be inherent as well and implemented to select visual indications based on similarities between the user's profile information and the other users' profile information. Inherent matching of attributes may be exact, based on pre-defined similarities or groups, or based on learned similarities between types of attributes, or based on previous interactions of the user with other users in the virtual environment.
G06F 3/048 - Interaction techniques based on graphical user interfaces [GUI]
G06F 19/00 - Digital computing or data processing equipment or methods, specially adapted for specific applications (specially adapted for specific functions G06F 17/00;data processing systems or methods specially adapted for administrative, commercial, financial, managerial, supervisory or forecasting purposes G06Q;healthcare informatics G16H)
A system, method, and network interface obscures the existence of data encryption in a communication network is provided. A set of characters is generated by using a set of encryption keys as an input to a pseudo-random function. Each character corresponds to an index value. The encrypted data is divided into a plurality of parts. Each part is sectioned into a plurality of groups. Each group of the plurality of groups is encoded by mapping the group to a character in the set of characters according to its corresponding index value. The mapped characters are transmitted through the communication network.
To register a mobile device located in a first network with a packet-switched services network, a registration request is received from an aggregation device in the first network. The registration request contains an identifier of the aggregation device and identification information of the mobile device, where the identification information is previously unknown to the packet-switched services network. A globally unique identifier of the mobile device is dynamically created based on the identifier of the aggregation device and the identification information of the mobile device, wherein the globally unique identifier is used for uniquely identifying the mobile device in the packet-switched services network.
Systems and methods are disclosed of routing data in a network 300 that include classifying incoming data packets 102 using the content of the incoming data packets 102 that remains relatively consistent during a network session with an ingress network processing unit 104. These systems and methods also include ordering the incoming data packets 102 according to at least one internet protocol address comprised within the packet 102, hashing the at least one internet protocol address and the destination port within the packet, and determining a destination service module 222, 224, and 226 for the incoming packet 102 using the ingress network processing unit 104. Through these systems and methods, data can be routed without the need for complete flow tables.
A radio frequency radio (RF) transceiver that defines scheduling logic for generating transmission schedules for orthogonal frequency-division multiple access (OFDMA) RF transmissions from the RF transceiver, wherein the scheduling logic specifies at least one of a modulation type, a code rate, a sub-channel, and a sub-carrier for a plurality of symbols to be transmitted in a communication signal sub-frame. A processor generates outgoing data bits and outgoing test data bits for transmission from the RF transceiver as OFDMA transmission signals and OFDMA test data transmission signals, respectively, according to the transmission schedules to create loading within at least a portion of a cellular service area that corresponds with a test- loading value. The amount of the additional required loading is the difference between the test- loading value and an actual loading value.
Baseband recovery in wireless networks, base transceiver stations, and wireless networking devices may be implemented to minimize the number of timing symbols while at the same time enabling wireless devices to use a relatively low per-symbol sampling rate, so that minimal processing is required to implement the timing recovery. In one embodiment, a relatively low number of samples is taken per expected symbol interval during the training sequence. A subset of the samples is selected and processed to determine error signals for each of the samples. The error signals are multiplied by the expected symbol and summed to form an error signal. The error signal is used to adjust the set of samples that will be used and processed in connection with subsequent symbols. The error signal is also used to interpolate between available samples to infinitesimally approach the point of maximum eye opening.
Improved indexing of telephony sessions is achieved by: (a) receiving, during the recording of the telephony session or during a playback of the recording, an indication including parameters which identify a discrete segment of the recording as being of interest; and (b) storing, in an index associated with the recording of the session, an identifier which identifies that discrete segment of the recording.
In a communication environment where a voice bearer is established between a multimedia terminal of a first user and a voice terminal of a second user to allow voice communications between the first and second users, the present invention allows the second user to gain access to video content of the first user through a web session.
The present invention provides a technique for making uniform resource identifiers (URIs) that are associated with television content that has been viewed by a viewer readily accessible to that viewer. Television content that is being viewed at any given time is monitored, and URIs that are associated with television content that has been viewed are automatically identified without human intervention and subsequently made available to the viewer via a content service. The content service may be a web server that is accessible by the viewer via a browser application running on the viewer's communication terminal. The viewer may access the content service to retrieve the URIs, which may be used to retrieve web content associated with television content from an appropriate web server via the communication terminal.
A method and system for selectively replicating data from a primary database associated with a primary server to a secondary database associated with a secondary server. The secondary server determines that a replication task using a first update command has modified the primary database. The secondary server determines a primary table in the primary database has been updated. The secondary server generates a secondary federated table that is coupled to the primary table. The secondary server obtains a second update command based on the first update command from the primary database and applies the second update command to a secondary table in the secondary database using the secondary federated table.
A predictive notification system 150 identifies certain mobile devices 114, 116 in a wireless telecommunications network 102 that are likely to be within a predetermined geographical area of interest 120 during a predetermined period of time. The identified location/time pair may be one that is associated with or affected by a particular event (e.g., emergency, construction, disaster, traffic, weather or other alerts and events). This allows a notification (about the event) to be sent to the identified mobile devices 114, 116 in an effort to notify them of the event prior to entering the affected area in predetermined geographical area of interest 120. A trending profile generated and maintained by the mobile devices 114, 116 in the network is examined/consulted to determine the identity of those mobile devices 114, 116 that are likely to be within the affected area during the relevant time period.
Interaction with web content in a web browser can control actions in an embedded virtual environment, and events in the virtual environment can be used to update content and applications running in the web browser. In one embodiment, particular events in the virtual environment are passed to a mapping component that listens for triggers and issues commands in the web browser. A JavaScript mapping component may be used to listen for the triggers, capture parameters associated with the trigger, lookup the trigger type in a mapping table, and call a mapped JavaScript function with the trigger parameters. In the reverse direction, if a JavaScript function call is entered in the web browser, the JavaScript function invokes a function exposed by a virtual environment plugin. The plug-in invokes an event within the virtual environment so that interaction with the web content can control actions in the virtual environment.
G06F 19/00 - Digital computing or data processing equipment or methods, specially adapted for specific applications (specially adapted for specific functions G06F 17/00;data processing systems or methods specially adapted for administrative, commercial, financial, managerial, supervisory or forecasting purposes G06Q;healthcare informatics G16H)
G06F 9/44 - Arrangements for executing specific programs
H04L 12/16 - Arrangements for providing special services to substations
69.
A METHOD FOR OPERATING MULTI-DOMAIN PROVIDER ETHERNET NETWORKS
A method of enabling extension of a network service of a first domain to a remote customer site hosted by an Access Gateway (AG) in a Provider Ethernet domain. In the first domain, the remote customer site is represented as being hosted by a border gateway (BG) connected to the Provider Ethernet domain, such that subscriber packets associated with the network service are forwarded to or from the remote customer site via the BG. In the Provider Ethernet domain, a trunk connection is instantiated through the Provider Ethernet domain between the host AG and the BG A trunk cross-connection function is installed in the host AG, for transferring subscriber packets associated with the network service between a respective attachment virtual circuit (AVC) through which the remote customer site is connected to the host AG and an extended AVC tunnelled through the trunk connection. A common service instance identifier (I-SID) is used to identity both the AVC between the host AG and the remote customer site and the extended AVC between the host AG and the BG
A method and apparatus for enhancing control of an Avatar in a three dimensional computer-generated virtual environment is provided. In one embodiment, a user can control one or more controllable aspects of an Avatar directly via interacting with a touch sensitive user input device such as a touchpad or touch sensitive screen. Interaction with the touch sensitive user input device enables more precise control and more direct control to be implemented over the action of the Avatar in the virtual environment. Multiple aspects of the Avatar may be controlled, such as the Avatar's forward motion, orientation, arm movements, and grasping of objects.
G06T 15/00 - 3D [Three Dimensional] image rendering
G06F 19/00 - Digital computing or data processing equipment or methods, specially adapted for specific applications (specially adapted for specific functions G06F 17/00;data processing systems or methods specially adapted for administrative, commercial, financial, managerial, supervisory or forecasting purposes G06Q;healthcare informatics G16H)
G06F 3/041 - Digitisers, e.g. for touch screens or touch pads, characterised by the transducing means
The present invention provides a technique for reducing power levels associated with two or more input signals using peak reduction distortion that is derived from a combined signal, which represents a combination of the input signals.
H04B 1/62 - Details of transmission systems, not covered by a single one of groups Details of transmission systems not characterised by the medium used for transmission for providing a predistortion of the signal in the transmitter and corresponding correction in the receiver, e.g. for improving the signal/noise ratio
H03L 5/00 - Automatic control of voltage, current, or power
As an advertisement is presented to the user via a user terminal, the user terminal may generate voting information in response to a specific user input that bears on the user's interest in the advertisement or based on actions or behaviors of the user in association with the advertisement being presented. When specific user input is provided, the user is essentially providing direct feedback as to whether the advertisement is of interest. The voting information is provided to the targeted advertising system, which will update the preference information based on the voting information such that the user's interest in the various advertisements is reflected in the preference information. As new advertisements are selected for the user, the selection of the advertisements is based on the updated preference information, which is systematically updated as voting information is received from the one or more user terminals.
A method and apparatus of dynamically customizing a virtual world. A first user and a second user engage in a conversation with respect to a location in the virtual world. A speech processor monitors the conversation and detects that a sound made matches a key sound. The virtual world is altered to include a virtual world customization based on the key sound. The virtual world customization may also be based on user information associated with the user in the conversation that made the sound.
G06F 19/00 - Digital computing or data processing equipment or methods, specially adapted for specific applications (specially adapted for specific functions G06F 17/00;data processing systems or methods specially adapted for administrative, commercial, financial, managerial, supervisory or forecasting purposes G06Q;healthcare informatics G16H)
A method system for interfacing a client system in a first network domain with a Provider Link State Bridging (PLSB) network domain. At least two Backbone Edge Bridges (BEBs) of the PLSB domain 20 are provided. Each BEB is an end-point of a connection in the first network domain to the client system and an end-point of at least a unicast path defined within the PLSB domain 20. An inter-node trunk is provided in the PLSB domain 20 for interconnecting the at least two BEBs. A phantom node is defined in the PLSB domain 20. The phantom node has a unique address in the PLSB domain 20 and is notionally located on the inter-node trunk one hop from each of the BEBs. Each of the BEBs is configured such that: an ingress packet received from the client system via the connection in the first network domain is forwarded through a path notionally rooted at the phantom node; and an egress subscriber packet destined for the client system is forwarded to the client system through the connection in the first network domain.
H04L 12/24 - Arrangements for maintenance or administration
H04L 29/10 - Communication control; Communication processing characterised by an interface, e.g. the interface between the data link level and the physical level
75.
SECURE REMOTE ACCESS PUBLIC COMMUNICATION ENVIRONMENT
A method and system provide a user device with secure access to an enterprise application in an enterprise network through VPN. The enterprise application is accessed from a user device such that it sends and receives data packets through the VPN client. For this, a request to send packets, originating from the user application, is intercepted by a VPN agent associated with the user application. In turn, the VPN agent associates an address of a loop-back interface with the user application. Thereafter, packets sent by the user application, are re-directed to the VPN client through the loop-back interface. Similarly, packets received by the VPN client from the enterprise network are routed through the loop-back interface to the user application.
A method and system for position location of clients in wireless local area networks (WLANs). The position location technique utilizes time-of-flight (TOF) measurements of signals transmitted from a client to a number of wireless access points (APs) or vice versa to determine distances. Round-trip time (RTT) measurement protocols are used to estimate TOF and distances between the client at an unknown position and the WLAN APs. The method and system improves positioning accuracy by identifying and mitigating non-line-of sight (NLOS) errors such as multipaths. Trilateration algorithms are utilized in combination with median filtering of measurements to accurately estimate the position of the client.
The present invention provides a technique for reducing the peak power of a combined signal that has a first signal of a first modulation type and a second signal of a second modulation type. Based on the combined signal, peak reduction distortion is determined. The peak reduction distortion is configured such that, if applied to the entirety of the combined signal, excessive peaks throughout the combined signal would be reduced. However, instead of applying the entirety of the peak reduction distortion, a selected portion of the peak reduction distortion is applied to a corresponding portion of the combined signal to reduce the peak power of the combined signal.
The application relates to speech analytics in contact centers. Speech analytics in the present context relates to word and phrase spotting, i.e. the identification of keywords and combinations of keywords within phone conversations. Whereas it is known to perform speech analysis within call recordings, such analysis provides limited information to a supervisor who may be concerned with ensuring that a contact center is operating optimally in real-time. The present application allows the power of speech analytics to be harnessed in the real-time operation of the call center. The claimed subject-matter relates to a method comprising the steps of analysing a communication session between a contact center agent (34) and a customer (20) to detect the occurrence of a so-called speech event. A speech event comprises at least one occurrence of at least one word in the audio stream of the communication session. Such a word could be in particular a swearword used by a difficult customer. Upon detection of such a speech event, an event notification is issued to a reporting component of the contact center and a supervisor station (60) displays event data including the speech event identified in the event notification.
Automated text-based messaging interaction using natural language understanding technologies enables text-based messages to be received from users and interpreted by a self-service application platform so that the self-service application platform can respond to the text-based messages in an automated manner. The characters and strings of characters contained within the text message are interpreted to extract words, which are then processed using a natural language understanding engine to determine the content of the text-based message. The content is used to generate a response message from static and/or dynamic grammars to automate the process of interacting with a user via text-based messages. Multiple text-based message formats are supported, including text messages transmitted using Short Messaging Service (SMS), instant messaging, chat, and e-mail.
A transmit chain comprises a correction network (1a) for correcting a frequency dependent quadrature error between in-phase and quadrature signal paths for the transmission of an input signal. The correction network has an in- phase input port, a quadrature input port, an in-phase output port and a quadrature output port and each input port is connected to each output port by a digital filter network, the digital filter network comprising a set of filter tap coefficients and configuration means for configuring values of said set of filter tap coefficients. Input signals are up-converted, and a portion of the up- converted signal is coupled to a quadrature downconverter (21). A controller (22) determines an error signal by comparing the down-converted signal with the input signal and modifies the set of values of filter tap coefficients on the basis of the error signal and the input signal to correct said frequency dependent quadrature error.
The present invention provides a solution to maximize the chance of completion for an ISUP to SIP direction call by enabling a bigger factor for converting ISUP hop counter to SIP Max-Forwards value than the reverse direction thus enabling more hops in the SIP network. Enabling a bigger factor for ISUP to SIP direction can cause loops without special considerations. This invention provides an algorithm that prevents a "loop condition" that can arise at the interface boundary of two telephone networks, known by their standard names ISUP and SIP networks. The present invention solves the "loop condition" problem by adjusting the Hop Counter and Max-Forward parameter values in a predetermined manner such that the adjusted parameter values break the cycle of providing the same parameter values between networks at the network boundary for an uncompleted connection, or break an endless "loop condition".
A mobile tag tracking system for providing mobile security monitoring is provided. The system includes a communications facility; a communications network coupled to the communications facility; and a mobile tag coupled to an item to be monitored. The mobile tag has a processor having a memory and for controlling operation of the mobile tag; a radio communications component coupled to the processor providing at least one of wide area communications over the communications network and local communications access to wireless devices; a power supply coupled to the processor for providing power to the mobile tag; and a location tracking component coupled to the processor for determining the location of the mobile tag and providing a location signal to the processor. Information about the item coupled to the tag is stored in the memory and local communications access is enabled in response to an instruction received at the mobile tag.
The present invention is a hybrid RF-digital signal processor-based filter for multiband radio architectures systems capable of spectrum re- farming and software defined radios. It performs low -loss frequency agile multiple notch filtering at RF where a large dynamic range exists at a filter input between signals in a stopband and passband. It is a frequency dependent signal attenuation apparatus having two paths connected together by directional couplers. The first path comprising a component such as a delay component or duplexer. The second path comprising a bandstop filter connected to a down converter, a digital filter, and an up converter. At the output of a power amplifier, the invention can be used to attenuate spurs, or noise within bands with strict emission constraints. At the input of a low noise amplifier, the invention can be used to attenuate blockers and transmitter noise outside of the receiver passband.
The present invention is a hybrid RF-digital signal processor-based filter for multiband radio architectures, systems capable of spectrum re- farming and software defined radios It performs low-loss frequency agile multiple notch filtering at RF where a large dynamic range exists at a filter input between signals in a stopband and passband It is a frequency dependent signal attenuation apparatus having two paths connected together by directional couplers The first path comprising a component such as a delay component or duplexer The second path comprising, in series, a down converter, a digital filter, an up converter, and a bandstop filter At the output of a power amplifier, the invention can be used to attenuate spurs, or noise within bands with strict emission constraints At the input of a low noise amplifier, the invention can be used to attenuate blockers and transmitter noise outside of the receiver passband.
A server process renders instances of a 3D virtual environment as video streams that may then be viewed on devices not sufficiently powerful to implement the rendering process natively or which do not have native rendering software installed. The server process is broken down into two steps: 3D rendering and video encoding. The 3D rendering step uses knowledge of the codec, target video frame rate, size, and bit rate from the video encoding step to render a version of the virtual environment at the correct frame rate, in the correct size, color space, and with the correct level of detail, so that the rendered virtual environment is optimized for encoding by the video encoding step. Likewise, the video encoding step uses knowledge of motion from the 3D rendering step in connection with motion estimation, macroblock size estimation, and frame type selection, to reduce the complexity of the video encoding process.
G06T 15/00 - 3D [Three Dimensional] image rendering
G06F 19/00 - Digital computing or data processing equipment or methods, specially adapted for specific applications (specially adapted for specific functions G06F 17/00;data processing systems or methods specially adapted for administrative, commercial, financial, managerial, supervisory or forecasting purposes G06Q;healthcare informatics G16H)
Methods and apparatus are provided for multiple redundant global navigation satellite system GNSS synchronization of a plurality of base stations via a system node that is in communication with the plurality of base stations. At the system node, time information is provided to and received from the plurality of base stations and a system time reference is generated based on at least some of the time information, such that the system time reference is synchronized with an external time epoch reference provided by the GNSS. If a base station is unable to receive the GNSS service, the system node provides time synchronization information to the base station to synchronize the base station with the system time reference, which itself is synchronized to the external time epoch reference provided by the GNSS service.
When a viewer initiates channel surfing, a surfing guide is presented to the viewer. The surfing guide provides multiple channel regions, where each channel region is associated with a different channel that is available to the viewer. Each channel region will include a channel window in which an image or video content from the corresponding channel is displayed. When the surfing guide is being displayed to the viewer, the channel window in at least one of the channel regions will include video content, which is derived from a low bandwidth video stream for the associated channel. Each channel region may also have a channel information area in which textual information about the corresponding channel is provided to the viewer.
H04N 5/445 - Receiver circuitry for displaying additional information
H04H 60/72 - Systems specially adapted for using specific information, e.g. geographical or meteorological information using electronic programme guides [EPG]
H04N 7/173 - Analogue secrecy systemsAnalogue subscription systems with two-way working, e.g. subscriber sending a programme selection signal
88.
WIRELESS COMMUNICATION CLUSTERING METHOD AND SYSTEM FOR COORDINATED MULTI-POINT TRANSMISSION AND RECEPTION
A method and system for identifying cell clusters within a coordinated multiple point wireless transmission network in order to reduce scheduling complexity while optimizing throughout and performance. The network includes a total number of cells served by corresponding base stations. The BSC divides the entire network of cells into clusters of cells and forwards this clustering information to all mobile devices. A cluster of cell candidates is a subset of the total number of cells within the network. The mobile device then provides to a base station controller the identity of a cluster of preferred cells selected from the cluster of cell candidates. The base station controller selects at least one base station located within the cluster of preferred cells to establish communication with the mobile device. A wireless connection is then established between the selected at least one base station and the mobile device.
Motion sensors on a portable computing device are used to control a camera view into a three dimensional computer-generated virtual environment. This allows the user to move the portable computing device to see into the virtual environment from different angles. For example, the user may rotate the portable computing device about a vertical axis toward the left to cause the camera angle in the virtual environment to pan to the left. Likewise, rotational motion about a horizontal axis will cause the camera to move up or down to adjust the vertical orientation of the user's view into the virtual environment. By causing the view in the virtual environment that is shown on the display to follow the movement of the portable computing device, the display of the portable computing device appears to provide a window into the virtual environment which provides an intuitive interface to the virtual environment.
G06T 15/00 - 3D [Three Dimensional] image rendering
G06F 19/00 - Digital computing or data processing equipment or methods, specially adapted for specific applications (specially adapted for specific functions G06F 17/00;data processing systems or methods specially adapted for administrative, commercial, financial, managerial, supervisory or forecasting purposes G06Q;healthcare informatics G16H)
G06F 3/01 - Input arrangements or combined input and output arrangements for interaction between user and computer
A method of controlling traffic forwarding in a Provider Backbone - Traffic Engineered (PBB-TE) network. A protection group (PG) is defined, and including N working Traffic Engineered Service Instances (TESIs) and M protection TESIs. An Automatic Protection Switching Protocol Data Unit (APS PDU) is defined, which includes information defining at least a state of the protection group. This APS PDU is forwarded only through the protection TESI(s).
To provide customized information to the user, a wireless communications network node receives a stream of data associated with a user. A first trend associated with at least a first attribute in the stream of data is identified, and bas on the identified first trend, customized information is sent for presentation to the user at a mobile station.
A dynamic user interface for a method and system for creating, selecting, and adapting a virtual contact center within a virtual world. A user's interaction with the virtual world is evaluated and one or more environmental characteristics established based on the user's interaction with the virtual world. A virtual contact center having the one or more environmental characteristics is provided based on the user's interaction with the virtual world. The virtual contact center may include one or more environmental characteristics that are updateable in real-time to incorporate the user's preferences and selections within the virtual world.
Domain-wide unique node identifiers and domain-wide unique service identifiers are distributed within a MPLS domain using routing system LSAs. Nodes on the MPLS network compute shortest path trees for each destination and install unicast forwarding state based on the calculated trees. Nodes also install multicast connectivity between nodes advertising common interest in a common service identifier. Rather than distributing labels to be used in connection with unicast and multicast connectivity, the nodes deterministically calculate the labels. Any number of label contexts may be calculated. The labels may either be domain wide unique per unicast path or per multicast, or may be locally unique and deterministically calculated to provide forwarding context for the associated path. Multicast and unicast paths may be congruent, although this is not a requirement.
A method and system for wireless communication in a wireless communication network. The wireless communication network has a first mobile terminal and a second mobile terminal arranged in virtual multiple input, multiple output ("V-MIMO") communication with a base station. A first wireless communication uplink channel corresponding to the first mobile terminal is estimated. The estimate is based on a first reference symbol signal and the cancellation of interference from a second reference symbol signal received from the second mobile terminal. A second wireless communication uplink channel corresponding to the second mobile terminal is estimated. The estimate is based on the second reference symbol signal and the cancellation of interference from the first reference symbol signal received from the first mobile terminal. The estimated first wireless communication uplink channel is used to demodulate a first data signal received from the first wireless device, and the estimated second wireless communication uplink channel is used to demodulate a second data signal received from the second wireless device.
A base station for use in a mobile telephony network includes an antenna arrangement coupled to a transceiver arrangement for producing a plurality of beams. A method of testing the base station comprises detecting at the transceiver arrangement the signal strengths of a test signal received via the beams; comparing and/or correlating the said signal strengths detected at the transceiver arrangement; and using the results of the comparisons and/or correlations to determine the configuration of the antenna arrangement and transceiver arrangement and/or to detect faults. The comparison of average signal strengths can be used to detect cabling faults, and beam errors. The correlation of un-averaged signal strengths can be used to determine which beams have the same polarisation. Beam pointing directions and the allocation of antennas to sectors can be determined by monitoring handovers of mobiles moving between cells. Frequencies may be allocated to sectors according to a frequency re-use scheme.
H04B 7/02 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas
H04B 7/06 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
96.
REDUCED COMPLEXITY CHANNEL ESTIMATION FOR UPLINK RECEIVER
The present invention proposes an LTE eNodeB receiver channel estimation technique that is referred to as reduced complexity minimum mean squared error (MMSE) technique for channel estimation. From the invention's assumptions, estimations and modified calculations, the present invention generates precise channel estimates of RS using the reduced complexity MMSE matrix and previously computed LS channel estimates H LS is as follows: (Formula I) which generates precise channel estimates of RS using the reduced complexity MMSE matrix and previously computed LS channel estimates. As a second aspect of the present invention, it is desired that the SNR be estimated within -3 dB of the actual channel SNR. As a third aspect of the invention, an adaptive method of data channel interpolation from RS channel is being proposed in this invention.
A mobile station receives a downlink control structure in a first carrier, where the downlink control structure indicates that control information for the mobile station is on a second, different carrier. The mobile station decodes the control information in the second carrier, where the control information specifies resource allocation of a wireless link for the mobile station. More specifically, according to some implementations, the control channel in the first carrier specifies the resource allocation for an extended control channel in the second carrier, where the extended control channel specifies the resource allocation for traffic data of a wireless link for the mobile station.
In general, according to an embodiment, a wireless transmitter includes a plurality of coding and modulation modules to apply corresponding coding and modulation algorithms to input information blocks. A discrete Fourier transform (DFT) precoder applies DFT processing to outputs of the coding and modulation modules, and an inverse fast Fourier transform (IFFT) module receives a DFT output of the DFT precoder, which is mapped to different subcarriers according to the resource allocation indicated by the base station, and applies IFFT processing to the DFT output. An output processing stage produces output signals based on the output of the IFFT module to transmit wirelessly to a wireless receiver. In a different implementation, the outputs of the coding and modulation modules can be provided to an IFFT module to produce IFFT-processed output information.
In general, to provide acknowledgment information by a first wireless device, the first wireless device sends repeated instances of acknowledgment information in respective first and second frame structures, in response to receipt of first information from a second wireless device. In addition, the first wireless device also sends further acknowledgment information in the second frame structure that is responsive to second information received from the second wireless device.
The present invention provides a solution to improve coverage and cell edge performance in a mobile user communication system is the use of fixed relays, which are pieces of infrastructure without a wired backhaul connection. The relays transmit or "relay" downlink messages between the base station (BS) and mobile stations (MSs) through a multi-hop communication. The present invention is a method and system for supporting a multiple user mobile broadband communication network that includes relay techniques suitable for user equipment in the downlink communication to the user equipment.