H04Q1/50

LINE CARD CHASSIS, MULTI-CHASSIS CLUSTER ROUTER, AND PACKET PROCESSING
20190253777 · 2019-08-15 ·

Disclosed is a line card chassis which includes line card units, optical electrical conversion units and optical fiber interface units. The optical-electrical conversion unit has an onboard optical assembly module used for mutual conversion between an optical signal and an electrical signal; an electrical signal interface of the onboard optical assembly module is connected to the line card unit through an electrical connector, and an optical signal interface of the onboard optical assembly module is connected to the optical fiber interface unit through an optical connector; and the optical fiber interface unit couples the optical signal to a cluster interface of a panel on a router through an optical fiber, and the cluster interface is to concatenate different chassis in the router. Also disclosed is a multi-chassis cluster router and a packet processing method.

CONTROL TRANSMISSION SOFT COMBINING
20190245658 · 2019-08-08 ·

Techniques are described for wireless communication. One method of wireless communication includes buffering a first set of coded bits including a first control message having a plurality of fields, buffering a second set of coded bits including a second control message having the plurality of fields, soft combining at least a first subset of the first set of coded bits and a second subset of the second set of coded bits in a combined set of coded bits, and decoding the first control message or the second control message based at least in part on the combined set of coded bits.

CONTROL TRANSMISSION SOFT COMBINING
20190245658 · 2019-08-08 ·

Techniques are described for wireless communication. One method of wireless communication includes buffering a first set of coded bits including a first control message having a plurality of fields, buffering a second set of coded bits including a second control message having the plurality of fields, soft combining at least a first subset of the first set of coded bits and a second subset of the second set of coded bits in a combined set of coded bits, and decoding the first control message or the second control message based at least in part on the combined set of coded bits.

Control transmission soft combining

Techniques are described for wireless communication. One method of wireless communication includes buffering a first set of coded bits including a first control message having a plurality of fields, buffering a second set of coded bits including a second control message having the plurality of fields, soft combining at least a first subset of the first set of coded bits and a second subset of the second set of coded bits in a combined set of coded bits, and decoding the first control message or the second control message based at least in part on the combined set of coded bits.

Control transmission soft combining

Techniques are described for wireless communication. One method of wireless communication includes buffering a first set of coded bits including a first control message having a plurality of fields, buffering a second set of coded bits including a second control message having the plurality of fields, soft combining at least a first subset of the first set of coded bits and a second subset of the second set of coded bits in a combined set of coded bits, and decoding the first control message or the second control message based at least in part on the combined set of coded bits.

CONTROL TRANSMISSION SOFT COMBINING
20180062797 · 2018-03-01 ·

Techniques are described for wireless communication. One method of wireless communication includes buffering a first set of coded bits including a first control message having a plurality of fields, buffering a second set of coded bits including a second control message having the plurality of fields, soft combining at least a first subset of the first set of coded bits and a second subset of the second set of coded bits in a combined set of coded bits, and decoding the first control message or the second control message based at least in part on the combined set of coded bits.

CONTROL TRANSMISSION SOFT COMBINING
20180062797 · 2018-03-01 ·

Techniques are described for wireless communication. One method of wireless communication includes buffering a first set of coded bits including a first control message having a plurality of fields, buffering a second set of coded bits including a second control message having the plurality of fields, soft combining at least a first subset of the first set of coded bits and a second subset of the second set of coded bits in a combined set of coded bits, and decoding the first control message or the second control message based at least in part on the combined set of coded bits.

CONTROLLING DEVICES USING CLOUD SERVICES AND DEVICE-AGNOSTIC PIPE MECHANISMS
20170201586 · 2017-07-13 · ·

An environment is described in which a cloud-implemented service system controls a plurality of target devices via a plurality of respective device-agnostic pipe mechanisms. The target devices themselves may represent dumb devices, e.g., lacking local control logic, or providing reduced reliance on local control logic. Users may interact with the service system via applications running on any type of user devices.

Controlling devices using cloud services and device-agnostic pipe mechanisms
09667727 · 2017-05-30 · ·

An environment is described in which a cloud-implemented service system controls a plurality of target devices via a plurality of respective device-agnostic pipe mechanisms. The target devices themselves may represent dumb devices, e.g., lacking local control logic, or providing reduced reliance on local control logic. Users may interact with the service system via applications running on any type of user devices.

Controlling devices using cloud services and device-agnostic pipe mechanisms
09667727 · 2017-05-30 · ·

An environment is described in which a cloud-implemented service system controls a plurality of target devices via a plurality of respective device-agnostic pipe mechanisms. The target devices themselves may represent dumb devices, e.g., lacking local control logic, or providing reduced reliance on local control logic. Users may interact with the service system via applications running on any type of user devices.