Patent classifications
H04W40/005
Wireless communication equipment and method for configuring mesh network thereof
Wireless communication equipment includes a communication interface, a memory, and a processor electrically connected with the communication interface and the memory. The processor is configured to activate communication of the wireless communication equipment, to scan an external device for a network connection at a periphery of the wireless communication equipment, using the communication interface, to receive information including a mesh ID sent from the external device, using the communication interface, and to configure a mesh network with the external device by using the communication interface, when a designated string stored in the memory is included in the mesh ID.
Determining when to relay a data unit in a cellular communication network
The system (1) of the invention is configured to receive information relating to relay devices (11,17-19) present in a certain spatial area and determine relay configuration information for the relay devices from the information. The relay configuration information instructs the relay devices when to receive and/or relay data units and when not to receive and/or relay data units. The system is further configured to transmit the relay configuration information to the relay devices. The relay device of the invention is configured receive a data unit from a further device (21) or not in dependence on the received relay configuration information and/or relay a received data unit to the cellular communication network (31) or not in dependence on the received relay configuration information.
Systems and methods for “machine-to-machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)
Methods and systems are provided for supporting efficient and secure “Machine-to-Machine” (M2M) communications using a module, a server, and an application. A module can communicate with the server by accessing the Internet, and the module can include a sensor and/or an actuator. The module, server, and application can utilize public key infrastructure (PKI) such as public keys and private keys. The module can internally derive pairs of private/public keys using cryptographic algorithms and a first set of parameters. A server can authenticate the submission of derived public keys and an associated module identity. The server can use a first server private key and a second set of parameters to (i) send module data to the application and (ii) receive module instructions from the application. The server can use a second server private key and the first set of parameters to communicate with the module.
SMALL DATA TRANSMISSIONS IN AN INACTIVE STATE TO DISAGGREGATED BASE STATIONS
Methods, systems, and devices for wireless communications are described. Generally, a user equipment (UE) may directly send small data to a disaggregated base station without performing a random access procedure. The CU-CP may provide a list of routing identifiers and corresponding data resource bearers (DRBs) to a distributed unit (DU) and the DU may transmit a connection release message to the UE. The connection release message may include the list of routing identifiers and the list of DRB identifiers. The connection release message may also include a downlink monitoring timer. The UE may identify data for an uplink transmission and a DRB associated with that data. The UE may transmit a packet with the data and the routing identifiers to a DU, which may derive downlink address information from the routing identifiers and forward the data to a CU-UP of the aggregated base station.
Discontinuous reception (DRX) enhancements in LTE systems
Embodiments of a system and method for providing DRX enhancements in LTE systems are generally described herein. In some embodiments, a system control module is provided for controlling communications via a communications interface. A processor is coupled to the system control module and is arranged to implement an inactivity timer and an on-duration timer for determining an active time for monitoring subframes on the physical downlink control channel for control signals, the processor further monitoring subframes after the active time.
Heat mapping in a flood fill mesh radio network
Disclosed is an improved implementation of a flood fill mesh radio network that utilizes probability forwarding for rebroadcasting network messages. The forwarding probability may be determined based on analyzing a neighbor topology map constructed by each network node relative to its neighbor nodes on the network and derived from state information supplied in synchronization frames. The forwarding probability may comprise a statistical probability that a message frame received by a network node will be forwarded to the intended destination network node by one or more of the network node's neighbor network nodes. The forwarding probability may also be based on constructing a heat map of hot nodes that are identified as those originating nodes in originating node/forwarding node pairs that are the first to forward message frames along paths in the network relative to duplicate message frames received from different originating/forwarding node pairs along different paths.
Mesh networking using peer to peer messages for a hospitality entity
A method and system for communicating with wireless messaging enabled door locks is disclosed. The method includes advertising availability of the door lock via wireless messaging for a first period of time; triggering a message send event; determining a destination node; connecting to the destination node via Bluetooth; sending the message to the destination node; and entering a low power state for a second period of time, wherein the second period of time is longer than the first period of time; wherein the destination node is chosen from a second door lock or a computing system.
Configuring repeater-assisted communication
Apparatuses, methods, and systems are disclosed for configuring repeater-assisted communication. One method includes transmitting, from a first network node (“NN”), an indication of repeater-assisted communication to a second NN and a third NN. The method includes transmitting configuration information to the second NN and the third NN. The configuration information includes control information that corresponds to whether the second NN and the third NN are turned on or turned off, the control information corresponding to whether the second NN and the third NN are turned on or turned off is correlated, the control information identifies timing information for the second NN and the third NN, and the timing information indicates whether the second NN and the third NN are expected to transmit a signal received at the second NN and the third NN at a prior time to the first NN and/or a fourth NN based on the configuration information.
Single radio switching between multiple wireless links
A computing device (such as a computer gaming console) uses only a single radio to concurrently communicate with a wireless network access point and wireless client devices such as game controllers or peripherals. To establish and maintain both a high-throughput link with the access point, and a low-latency link with the client device(s), the single Wi-Fi radio of the computing device is configured to periodically switch between a channel used for the high-throughput link and a different channel that is used for the low-latency link—thus implementing a combination of frequency division multiplexing (FDM) and time division multiplexing (TDM). The console may use aspects of the Wi-Fi protocol standard to ensure that periodically switching its single radio between the two channels is accomplished while maintaining reliable communication on both channels.
Systems and Methods for "Machine-to-Machine" (M2M) Communications Between Modules, Servers, and an Application using Public Key Infrastructure (PKI)
Methods and systems are provided for supporting efficient and secure “Machine-to-Machine” (M2M) communications using a module, a server, and an application. A module can communicate with the server by accessing the Internet, and the module can include a sensor and/or an actuator. The module, server, and application can utilize public key infrastructure (PKI) such as public keys and private keys. The module can internally derive pairs of private/public keys using cryptographic algorithms and a first set of parameters. A server can authenticate the submission of derived public keys and an associated module identity. The server can use a first server private key and a second set of parameters to (i) send module data to the application and (ii) receive module instructions from the application. The server can use a second server private key and the first set of parameters to communicate with the module.