|
Method of providing pause indication during "stuck" (resource) allocation |
|
IPC classes for russian patent Method of providing pause indication during "stuck" (resource) allocation (RU 2490805):
Method, device and system for controlling tunnel identifier allocation / 2488230
Method involves: determining whether a type of a current procedure allows a serving gateway (SGW) to change a tunnel endpoint identifier (TEID) and/or an internet protocol (IP) address (S110); and sending a modify bearer request message to the SGW, wherein the modify bearer request message is used for notifying the SGW on whether the SGW is allowed to change the TEID and/or the IP address (S120).
Data processing method, router node and data medium / 2487401
Chip components can share data using a bus system or a fixed connection system. Said technical result is achieved due to that a control unit for traffic from a source node can be used on an input line on a high-speed virtual channel of packet switched network. The control unit for traffic transmitted over a high-speed virtual channel can be transmitted to a recipient node through an output line. The control unit for traffic transmitted over a high-speed virtual channel can also be directly directed into the output line by a distribution switch.
Method and apparatus for blocking spam / 2474970
Text data of the electronic mail message to be filtered are obtained and it is determined if the text data contain a key word from a line contained in a line database used to filter messages. If so, it is further determined if the text data contain a line which corresponds to the key word contained in the line database. The electronic mail message is then identified as spam depending on the result of further determination and in accordance with predetermined identification rules, and the electronic mail message is blocked if it is spam.
Method for telegraph radio communication and apparatus for realising said method / 2474066
Method for telegraph radio communication is characterised by that a series of electromagnetic waves of the same frequency and amplitude is simultaneously transmitted from a signal transmission point to a signal reception point, where neighbouring waves in the series are phase keyed in accordance with the transmitted message by an angle equal to the ratio of 360 degrees to the number N of emitted electromagnetic waves. The apparatus has a series of identical power amplification channels, each having a phase-shift circuit, a power amplifier, a matching device, an antenna and an electronic phase keying key.
Method and system to control data transfer / 2469491
Stages are completed, at which the following is carried out: a poll is received in respect to a status report on serially transferred protocol data units (PDU); on the basis of a serial number in the poll, a status notification interval is determined for PDU blocks taken into account in the specified report; and provision of the specified status report containing receipt confirmation or loss information in the specified range of the specified PDU blocks.
Method and apparatus for processing padding buffer status report / 2463643
Method and system are disclosed for processing buffer status reports (BSR) such that when BSR triggering is performed, the size(s) of the necessary sub-header(s) are also to be considered together in addition to the BSR size. The steps of checking whether any padding region is available in a MAC PDU that was constructed, comparing the number of padding bits with the size of the BSR plus its sub-header, and if the number of padding bits is greater than the size of the BSR plus its sub-header, triggering BSR are performed. Doing so allows the sub-header(s) to be inserted or included into the MAC PDU or transport block (TB) or other type of data unit.
Phase radio-navigation system / 2457629
Device includes at least two ground and onboard receiving-transmitting stations, in which each ground receiving-transmitting station includes receiving-transmitting antenna, transmitter, receiver, antenna switch, limiting amplifier, phase detector, calculation unit, frequency synthesiser, phase changer, reference generator, shaping commutator; onboard receiving-transmitting station includes receiving-transmitting antenna, transmitter, two receivers, reference generator, indicator, antenna switch, two phase detectors, calculation unit, frequency synthesiser, limiting amplifier, and shaping commutator.
Radio engineering monitoring station / 2454818
Device comprises an antenna device 1, a receiver 2, a finding device 3, an analyser 4 of received signal parameters, a device 5 to memorise and process received information and a telemetric device 6, the receiver 2 comprises a tuning unit 10, heterodynes 11, 23, mixers 12, 24 and 46, amplifiers 17 and 47 of the first intermediate frequency, a detector 20, a delay line 21, keys 22 and 53, an amplifier 25 of the second intermediate frequency, narrow band filters 36 and 51, phase inverters 38, 41, 44, and 49, phase changers 45 and 48 at 90°, multipliers 50, 59 and 60, amplitude detectors 52 and 54, a device 55 to generate a frequency reamer, oscillographic indicators 56 and 63, a delay line 57, filters 61 and 62 of lower frequencies, the finding device 3 comprises mixers 13 and 14, a motor 15, a reference generator 16, amplifiers 18 and 19 of the first intermediate frequency, multipliers 26, 27, 30, narrowband filters 28, 29, 32, a delay line 31, a phase detector 33, phase meters 34 and 35.
Synchronisation between wireless devices in power save mode / 2454018
Invention relates to the field of wireless communication. The invention consists in the fact that the wireless device in a specialised network detects other wireless devices within the radio frequency band and establishes synchronisation with an identified wireless device. A wireless device operates in power save mode and wakes up, or turns on, periodically or on demand for detectability. A probe request packet or a signal packet received contains information enabling a wireless receiver to detect a transmitting wireless device. A wireless device may operate in the detection capacity or in active detection mode.
Method for personal call of telephone network user / 2453065
Message on the person of the called user is first generated in the device of the called user and transmitted to a telephone network. Messages generated in the device of the called user are received in the telephone network. The message on the person of the called user and the telephone number of the device of the called user are stored in a database. A message on the person of the called user is then generated in the device of the calling user. A message on the person of the calling user is generated and the generated messages are sent to the telephone network. The telephone number of the device from which the message came is determined in the telephone network. The message on the person of the called user, received from the device of the calling user, is compared with previously received messages on the person of the called user. If the comparison result is positive, the telephone number of the device of the called user is retrieved from the database; a communication channel is established between the telephone network and the device of the called user; a communication channel is established between devices of the called and calling users, wherein in the device of the called user, the message on the person of the called user is generated in accordance with a defined form of presenting data; in the telephone network, after a positive result of comparing the message on the person of the called user, received from the device of the calling user, with messages on the person of the called user previously received from devices of called users, first the form of presentation of data in the message on the person of the called user is compared with the form of presentation of data in the message on the person of the calling user; in case of a match, the telephone number of the device of the called user is then retrieved from the database and a communication channel is established between devices of the called and calling users.
System for household electric appliances and its functioning method / 2484522
System contains a selector device designed so that to enable the input command receipt for malfunction diagnostics fulfilment; a memory device designed so that to enable storage of product information with regard to the household electric appliance for malfunction diagnostics purposes; a controller designed so that to enable upload of product information stored in the memory device as well as for generation and output of a control signal including product information and for control of the conversion device; a conversion device designed so that to enable the control signal conversion into an acoustic signal and such acoustic signal output; and an input device designed so that to enable output of a sonic signal corresponding to the acoustic signal.
Service charging method and system, network access server and protocol information analysing device / 2483358
Service charging method involves receiving a service packet, obtaining a protocol identifier from the service packet based on which the need to perform analysis of protocol information in the service packet is determined; determining protocol information analysis involves performing analysis, obtaining charge information and service charging in accordance with the charge information and the predetermined charging procedure, otherwise traffic or duration and traffic of the service packet are counted and charging is performed in accordance with the traffic or duration and traffic, as well as with the predetermined charging procedure. The system which enables to carry out the method comprises a network access server, a protocol information analysing device and a charging subsystem.
System and device of microwave communication and method of connection in system / 2480927
Multiple transmitting modules in a module in a room are in a switched manner connected with modules outside the room by means of the cross-connection function. Besides, each transmitting module has a function of bidirectional branching. Typically, each of the transmitting modules controls an IP-address of another transmitting module and detects an adjacent transmitting module on the basis of an IP-address.
Network scanning and organisation of management in device type manager / 2477926
Method of communication with the use of infrastructure made according to the standard FDT (Field Device Tool), with device working in process control medium and having communication connection with communication link, including: method of communication with the use of infrastructure made according to the standard FDT (Field Device Tool), with device working in process control medium and having communication connection with communication link, including: generation of copy of process performed with the possibility of scanning of device type manager (DTM) of "device" type that represents the said device in FDT infrastructure; communication connection of this DTM copy with communication link corresponding to the said communication link; scanning of the said communication link with the aim to detect the said device using the said copy of DTM; and obtaining the address of detected device in DTM made with the possibility of scanning.
Domestic appliance and system of domestic appliance / 2477516
Information of a product and on a condition of a domestic appliance is converted into several acoustic signals of transmission, and a sound corresponding to the specified acoustic signals of transmission is discharged outside. Information on the product and information on the condition are formed in the form of a digital signal and are stored in a memory device. The digital signal is coded with the help of a conversion device and is converted into at least one acoustic signal of transmission. At least one acoustic signal of transmission is formed as an analogue signal. At the same time at least one acoustic signal of transmission may be formed as capable of separation.
Method and system to detect physical location of equipment / 2475976
In one version of realisation the method makes it possible to automatically detect physical location of a network device. This method may apply a computer-based system to collect information on a network device, instruct network devices to vary power consumption, detect changes and define physical location of a network device on the basis of detected changes. In another version of realisation the method makes it possible to automatically detect a functional type of a network device. This method may apply a computer-based system to monitor power received by a network device in a power distribution device, and to detect a functional type of a network device on the basis of the received power.
Method to develop frame of oam of hybrid network ethernet/tmpls and appropriate signals / 2471302
Method is proposed to establish a frame of operation, administration and service in a hybrid network of Ethernet/transport multi-protocol switching on the basis of marks. The method contains display of values in the field (445) of Ethernet operation, administration and service data in a data module of a protocol (PDU 410) in the first frame of operation, administration and service of Ethernet (the frame 150 OAM Ethernet) in the field (498) of operation, administration and service data of transport multi-protocol switching on the basis of marks in PDU (460) in the first frame of operation, administration and service of transport multi-protocol switching on the basis of marks (the frame 155 OAM TMPLS) and display of values in the first fields (401) of control parameters in the first frame of (150) OAM Ethernet in the second fields (402) of control parameters in the first frame (155) of OAM TMPLS. PDU (460) in the first frame (155) of OAM TMPLS contains added additional fields (495), if it is required, and the second fields (402) of control parameters additionally contain previously selected information by default and routing information displayed from values, which are stored in memory.
Functioning of network subjects in communication system comprising control network with levels of agents and control / 2471301
Communication system comprises a control network with levels of agents and control, in which data related to elimination of faults and/or control of efficiency, which are provided or occur at the level of agents, is correlated and/or analysed at the specified level of agents with additional data related to elimination of faults and/or control of efficiency, which are provided or occur at the specified level of agents, by means of application of ratios of configuration control at the specified level of agents, and at the same time information logically produced from correlation is transferred to at least one level of control of the specified network of the specified communication network control, being responsible for control of the appropriate level of agents.
Method, device and system of communication for protection of alarm transfer / 2466505
In a version of this invention realisation the main alarm route is created between terminals, and at least one auxiliary alarm route; the protocol of transfer of the main alarm route differs from the protocol of transfer of the auxiliary alarm route, and the auxiliary alarm route operates instead of the main one, when the main alarm route is in abnormal condition. Versions of realisation of this invention are mainly applied to communication systems, and in particular, to communication systems, which support multiple transfer modes, for instance, to WCDMA system, which supports IP carriers.
Mechanisms for failure detection and mitigation in gateway device / 2463718
Method comprises steps for: receiving a first announcement regarding service associated with operation of a network (340); determining classification of the first announcement (410), wherein the classification includes the type of announcement and identification of the source device; initialising a time interval based on the classification of the first announcement (420), wherein said time interval is different from the time interval for classification which is not the same as the classification of the first announcement; and providing an error message if a second announcement of the classification of the first announcement is not received before the time interval expires (430).
Method for recognition of functions from service, administration and operation functions set in passive optical ethernet network / 2262806
Method includes assigning identification data for identification of optical network nodes using optical linear terminus in accordance to their registration requests, and initiating, using optical linear terminus, operation of recognition relatively to functions of network nodes by transferring first information messages about functions set; by optical linear terminus from network nodes second information messages about functions set are received, meant for providing information about functions of network nodes, which received first information messages about set of functions.
|
FIELD: radio engineering, communication. SUBSTANCE: wireless communication device, access terminal and access point perform administration of allocation of a transmission resource associated with a forward and return link, which is allocated to a transmitting object for a certain period of time and each time the transmitting object does not transmit real data packets and needs to store allocation of the selected resource, a pause indication is provided. EFFECT: providing such a pause indication that an access point and an access terminal do not interpret said pause in transmission as an indication that allocated resources are not needed, or as an indication that allocated resources are no longer available. 9 cl, 5 dwg
The technical field to which the invention relates. The present invention relates, in General, to communication systems and more particularly to a technology for specifying a pause during the "sticky" (continued) destination (resource). The level of technology Widespread wireless communication systems that provide various types of communication such as voice communication, data transmission, and the like. These systems can be a multiple access system capable of supporting communication with multiple users by sharing available system resources (e.g., bandwidth and transmit power). Examples of such multiple access systems include systems (CDMA) multiple access code division multiple access system (TDMA) multiple access channel separation in time of the system (FDMA) multiple access channel separation frequency and system (OFDMA) multiple access orthogonal frequency division multiplexing. Typically, the wireless communication system includes multiple base stations, where each base station communicates with a mobile station using a direct communication line, and each mobile station (or access terminal) communicates with the base station, ISOE is isua for this return line. To make communications between base stations and terminals more efficient, uses the concept of "sticky" assignment (resource). "Sticky" useful purpose in the system planning data in cases where many users compete for limited resources allocated by the message destination. "Sticky" assignment takes place when the resource (e.g. channel)that is assigned to a specific user, continues to be available to that user and after standard transmission unit (for example, "package") is completed. Thus, in order to give the user the opportunity to continue the transfer, you do not need a new message about the appointment. Usually, when the transmitter of the access point or access terminal completes the transmission of a set of real data and to transmit another set of actual data transfer takes place break (also referred to as "pause"). The term "break in transmission" refers to the period of time during which the assigned resource is not transferred any real data (hereinafter this is seen in Fig. 2). In a typical communication system in the case of the transmitter of the access point there is a probability that the pause in the transmission can be interpreted as the loss of an assigned resource. In this case, the terminal access the PA may require assignment (resource), even despite the fact that the resource transfer is still allocated to the access terminal. If the access point, the pause could be interpreted as an indication that the access terminal is no longer required that the resource is assigned. In this case, the access point may assign this resource to another access terminal in the system. In both cases, it is inefficient and may reduce the quality and reliability of communication systems. Thus, there is a need for a system and method for providing indication of a pause in the transmission, such that the access point and the access terminal is not interpreted this pause in the transmission as an indication that the assigned resources are not required, or as an indication that the assigned resources are no longer available. The invention Accordingly, it is proposed a method of administering resource assignment assigned for data transmission in communication systems that transmit a first structure (template) data on the scheduled resource in the absence of data to transmit on the assigned resource. In another aspect, features a method of administering assign one or more resources assigned for data transmission in the communication system, namely, that accept one or more information bits on the assigned resource and keep the appointment referred to the assigned resource if it is determined that said one or more information bits represent the packet signatures erase. A more complete understanding of all the benefits and scope of this invention can be obtained from the accompanying drawings, description and appended claims. List of drawings Signs, the nature and advantages of the present invention will become more apparent from the following detailed description when considered in conjunction with the drawings in which the same reference position asked a similar designation of components on all of the drawings and which Fig. 1 is a diagram of a wireless communication system with multiple access; Fig. 2 is an illustration of data traffic on the assigned channel using the concept of "sticky" purposes; Fig. 3 - the data transfer process by the access point when "sticky" resource assignment in a straight line; Fig. 4 - the process of receiving data by the access point when "sticky" resource assignment on the return line; Fig. 5 is a structural diagram of embodiments of an access point and two terminals. Detailed description The word "exemplary" is used herein to mean "serving as an example, sample or illustration". Any variant of the invention or design described herein as the exemplary", need not necessarily be construed as preferred or have advantages in relation to other variants of the invention or designs. The word "listening" is used herein to mean that the device is a receiver of information (access point or access terminal) receives and processes data received on the channel. In Fig. 1 illustrates a diagram of a wireless system (100) due to multiple access, which uses modulation with multiple carriers. The system (100) includes a number of pixels (AR) (110), which can communicate with one or more terminals (UTS) (120) access (Fig. 1 for simplicity, shows only two points (110A and 110b) access). Point (h) access point (h) access further seen in Fig. 5 below) is a fixed station used for communicating with access terminals. Point (h) access may also be referred to as a base station or some other terminology. Access point, for example, the point (h) access is an electronic device configured to communicate with one or more access terminals, such as terminal (h) access terminal (h) access further seen in Fig. 5, below). Point (h) access mo the et also known as the access node, of the access network, base station, the base terminal, fixed terminal, a fixed station, a base station controller, controller, transmitter, or some other terminology. In the following description, the terms "access point", "base terminal" and "base station" are used interchangeably. The access point may be a General-purpose computer, a standard laptop computer, a fixed terminal, an electronic device configured to send, receive and process the data in accordance with the methods essential pairing defined by the OFDMA system (multiple access orthogonal frequency division multiple access), CDMA (multiple access code division multiple access), GSM (global system for mobile communications), WCDMA (wideband multiple access, code-division multiplexing), etc. the access Point may be an electronic module containing one or more computer chips controlled by the controller or the processor for transmission, receiving and processing data in accordance with the methods essential pairing system-defined OFDMA, CDMA, GSM, WCDMA, etc. The access terminal, such as terminal (h) access is an electronic device which has a capability of communicating with the point (11X) access through a communication line. Terminal (h) access may also be referred to as a terminal, user terminal, a remote station, a mobile station, a wireless communication terminal of the recipient information, or some other terminology. In the following description, the terms "access terminal," "mobile terminal", "user terminal", "terminal" are used interchangeably. Each terminal (h) can access at any given time to communicate with one or multiple access points on the downlink and/or uplink communication. The term "downward link" (that there is a direct link) refers to transmission from the point (h) access terminal (h) access, and "upward communication" (i.e., reverse link) refers to transmission from the terminal (h) access to the access point. Terminal (h) access can be any standard laptop computer, a personal electronic notebook or the Secretary, mobile phone, cell phone, electronic device, configured to send, receive and process the data in accordance with the methods essential pairing system-defined OFDMA, CDMA, GSM, WCDMA, etc. Terminal (h) access may be an electronic module containing one or more computer chips, managed to what ntroller or processor for transmission, receiving and processing data in accordance with the methods essential pairing system-defined OFDMA, CDMA, GSM, WCDMA, etc. System controller (130) is connected to the access points and may be further connected to other systems/networks (e.g., network packet data). System controller (130) provides coordination and control for access points connected to it. Through access point system controller (130) further controls the routing of data between terminals and between terminals and other users connected to other systems/networks. The technology described in this document is to provide guidance for the break in transmission, can be implemented in various wireless communication systems, multiple access and multiple carriers. For example, the system (100) may be a system of OFDMA, CDMA, GSM, WCDMA, etc. that uses the data transfer. In the embodiment of the invention uses "sticky" destination (resources). "Sticky" assignments allow system controller (130) to reduce the number of requests for the appointment. "Sticky" destination allows the recipient of this resource use the resource is assigned to perform multiple communications (transmissions or receptions of data)without requiring a new assignment for each of the second communication. For purposes of discussion, we note that the terminal (h) access requests a resource transfer through a return line to transfer the data (real data, content (information meaningful content), etc.) the point (h) access, which serves this terminal (h) access. Using the message about the purpose, point (h) access provides information about the purpose of the resource transmission on the reverse link, for example, identification designation of the channel to the terminal (h) access, which has requested the appointment. After the appointment has been accepted, the terminal (h) access transmits the actual data on the assigned channel return line connection (resource). In the case of "sticky" destination assigned to the channel continues to be assigned to this terminal (h) access. Thus, in some points of time during the period in which the channel is assigned, the terminal (h) or access point (h) access not passed or has not taken any real data. For this reason, to fill pauses in the transmission of the first data structure, called a package signatures erase. The length, structure and data rate of packet signatures erase may change based on available resources. Available resources can be defined by the system controller (130) ritocchi access which is in communication with the requesting access terminal. For example, if the receiving facility has the resources to handle packet signatures erase with more information bits (e.g., 3 bits), the length of package signatures erasing is controlled so as to provide more information bits. This may enable the receiving entity to identify that the received packet was a package signatures erase. Also, the power level at which the transferred packets signatures erase may vary in order to pass the erase sequence at a power level that is sufficiently low so that the transmission sequence erase did not cause significant interference. In Fig. 2 is an illustration of a (200) data traffic on a designated channel when using the concept of "sticky" destination. Duration (208) "sticky" destination is usually an interval between appointment and release (resource). During the duration (208) "sticky" destination can be several event data, for example, (a) - (202d), during which transmitted the packet data to be transferred. Typically, the data is not always transmitted continuously throughout the duration of the "sticky" destination (208), thereby leaving parts of the pause, for example, (04A) - (204d). For purposes of discussion, we note that whenever the processor (574) processing the transmitted data relating to the terminal (h) access, described below, does not send the data processor (574) processing the transmitted data is configured with the possibility of packet signatures erase, for example, (a) - (206d). Package signatures erase can represent one or more bits representing a unique data structure. In other words, the package signatures erase can be a unique identifier that is known to both transmitter and receiver before using signature packages erase. Also, to reduce interference, packet signature erase can be transmitted with low power and/or low speed data transfer. In Fig. 3 shows a process (300) data processor (processor (574) processing the transmitted data relating to the access terminal, or the processor (514) processing the transmitted data related to the access point), made with the possibility of data transmission when "sticky" the purpose of the resource transfer. For simplicity, when considering the execution stages of the process (300) for data transmission in a straight line will be used by the processor (514) processing the transmitted data. The process (300) may also be implemented by a processor (574) processing transmit the data to transfer data through a return line connection (for example, when transmitting data to the access point). At step 302 terminates the appointment of a data transmission channel of direct communication line, and the processor (514) processing the transmitted data is ready to send data, for example, packet data to be transferred. At step 304, the processor (514) processing the transmitted data determines whether the queue and ready to transmit the packet data to be transferred (for example, encoded data is converted to data packets). If it is determined that one or more data packets ready for transmission, then at step 306, the processor (514) processing the transmitted data passes these data packets using the assigned resource (i.e. the data transmission channel of direct communication line to the point (h) access and reverse channel of the communication line to the terminal). Otherwise, at step 308, the processor (514) processing the transmitted data passes the specified package signatures erase using the assigned channel. Package signatures erase can be transmitted at a low power level that is lower than a specified threshold. The threshold value can be set, and can provide a level of transmission power, such that the implementation of the transmission power is above this threshold, would cause interference. The signature packages erase can also be transmitted at a low data rate. After packet tis the project or packet data processor (514) processing the transmitted data repeats this process and executes step 304 until until the resources are released or not disabled. In Fig. 4 shows a process (400) for processing the receive data processor (processor (556) processing received data relating to the access terminal, or processor (534) processing received data related to the access point, configured to receive data when "sticky" resource assignment. For simplicity, when considering the execution stages of the process (400) for receiving data through a return line connection will be used by the processor (534) processing the received data. The process (400) may also be implemented as a processor (556) of data processing for data reception in a straight line (for example, when receiving data from the access point). At step 402, one or more information bits are taken to a designated channel and are assessed as data packets. At step 404 the processor (534) processing received data, determines whether these packets data packets of the real data (encoded data transmitted by the transmitting object). If so, then at step 406, the processor (534) of data processing processes the data packets in the normal way. Otherwise, at step 408, the processor (534) processing received data, determines whether these packets data packets signatures erase. If these data packets are packets signatures erase, that is, the packets are not taken into account, and at step 402 selects the additional information bits. Otherwise, at step 410 the processor (534) processing received data marks these data packets as noise data, and at step 402 selects the additional information bits. In a variant implementation point (h) access processor (534) of data processing may continue the monitoring of noise data and after receiving noise data for a specified period of time, he can determine what resources are lost, or may determine that the sending object does not require that the resource is assigned. In Fig. 5 shows a structural diagram of a variant of implementation of the point (h) access and two terminals (h and 120y) access system (100) connection with multiple access and multiple carriers. At the point (h) access the processor (514) processing the transmitted data receives the data traffic (i.e., information bits) from a source (512) data and signaling and other information from the controller (520) and the scheduler (530). For example, the controller (520) may provide commands (MS) power control, which is used to regulate the transmission power of the active access terminals, and the scheduler (530) may provide the destination carrier for terminal access. These various types of data can be sent on different transport channels of the Processor (514) processing the transmitted data, encodes and modulates the received data, using modulation with multiple carriers (e.g., OFDM-multiplexing multiplexing (orthogonal frequency division multiplexing), which provides modulated data (e.g., OFDM symbols). After this block transmitter (TMTR) (516) processes the modulated data to generate a modulated signal downlink, which is then transmitted from the antenna (518). On each terminal (h) and (120y) access the transmitted and modulated signal from an antenna (552) and is provided to the block receiver (RCVR) (554). The block receiver (RCVR) (554) processes and discretetime received signal, providing a sample. After that, the processor (556) processing received data, demodulates and decodes these samples, providing the decoded data, which may include the recovered traffic data, messages, signaling information, and the like. Traffic data can be provided to the receiver (558) data, and assigning the carrier and the control command output sent to the terminal, are provided to the controller (560). Controller (560) directs the transmission of data over uplink communication using the specific carriers that have been assigned to this terminal and is listed in the accepted purpose carrier. Controller (560) additionally is dependent packages signature erase when the real data to be transferred are absent, but he nevertheless wants to maintain its assigned resources. For each active terminal (120) of the access processor (574) processing the transmitted data receives data traffic from a source (572) data and signaling and other information from the controller (560). For example, the controller (560) may provide information indicating that the required transmit power, maximum transmit power, or the difference between the maximum and desired conveying capacity for this terminal. These different types of data are encoded and modulated by the processor (574) processing the transmitted data using the assigned carrier, and further processed by the block transmitter (576), generating a modulated signal uplink communication, which is then transmitted from the antenna (552). At the point (h) access the transmitted and modulated signals from the access terminals are received by the antenna (518), handled by the receiver (532) and demodulated and decoded by the processor (534) processing the received data. The block receiver (532) can evaluate the quality of a received signal (for example, the received signal-to-noise ratio (SNR)for each terminal and provides this information to the controller (520). The controller (520) can then develop commands (MS) power control for each term is a, such that the quality of the received signal to this terminal was maintained within acceptable limits. The processor (534) of data processing provides returned with feedback (for example, the desired value of transmission power for each terminal controller (520) and the scheduler (530). Planner (530) may provide an indication to the controller (520) on hold resources. This instruction is available if scheduled to transfer more data. For the terminal (h) access controller (560) may determine whether to hold the resources. The techniques described herein may be implemented by various means. For example, these technologies can be implemented in hardware, software or a combination thereof. In the case of hardware implementation of process units (for example, the controller (520) and (570), the processor (514) and (534) processing the transmitted data and received data, and the like) for these technologies can be implemented within one or more integrated circuits (ASIC), specialized on the use of digital processors (DSP) signal devices (DSPD) digital signal processing, programmable logic devices (PLD), gate arrays (FPGA) with operational programming, processors, controllers, microcontrollers, ICRI the processors, other electronic units designed to perform the functions described herein, or combinations thereof. In the case of software implementation, the techniques described herein may be implemented through modules (e.g., procedures, functions, and so on)that perform the functions described in this document. Software codes may be stored in a storage device (for example, in memory (522) in Fig. 5) and can be executed by a processor (for example, the controller (520)). The storage device can be implemented within the processor or may be external to the processor, and in this case it may be connected by communication lines to the processor through a variety of means known in the art. Titles included in this document for reference and to aid in determining the location of certain keys. These headings are not intended to limit the scope of the concepts described under these headings, and these concepts can be applied in other sections throughout the description. The above description of the disclosed embodiments of the invention is to provide an opportunity to any person skilled in the art to make or use the present invention. the individual in the art will easily be able to perform various modifications to these embodiments of the invention; and the General principles defined herein may be applied to other variants of the invention, which does not go beyond the essence or scope of the invention. Therefore, not intended that the present invention is limited to the implementation shown in this document, but he should be given the widest scope of protection, the relevant principles and new features revealed in this document. 1. Device in the wireless communication system containing a first electronic device configured to transfer the first data structure containing one or more signature packages erase on the assigned resource in the absence of data for transmission on said assigned resource, each of the one or more signature packages erase contains the specified unique identifier. 2. The device according to claim 1, wherein the first electronic device is configured to transmit in accordance with the scheme multiple access code division multiple access (CDMA). 3. The device according to claim 1, wherein the first electronic device is configured to transmit in accordance with the scheme of multiplexing orthogonal frequency division multiplexing (OFDM). 4. The device according to claim 1, wherein the first electronic device is capable of transmitting in accordance with the scheme multiple access orthogonal frequency division multiplexing (OFDMA). 5. The device according to claim 1, wherein the first electronic device is configured to receive in accordance with the scheme multiple access code division multiple access (CDMA). 6. The device according to claim 1, wherein the first electronic device is configured to receive in accordance with the scheme of multiplexing orthogonal frequency division multiplexing (OFDM). 7. The device according to claim 1, wherein the first electronic device is configured to receive in accordance with the scheme multiple access orthogonal frequency division multiplexing (OFDMA). 8. The access terminal containing a first electronic device configured to transfer the first data structure containing one or more signature packages erase on the assigned resource in the absence of data for transmission on said assigned resource, and the antenna transmits the first data structure, each of the one or more signature packages erase contains the specified unique identifier. 9. The access point containing the first electronic device is configured to receive one or more information bits on the assigned resource and drop-mentioned one or more information bits, and save the assignment referred assigned resource, if the definition is found, that mentioned one or more information bits correspond to the first data structure containing the specified unique identifier, and the antenna, which accept one or more information bits.
|
© 2013-2015 Russian business network RussianPatents.com - Special Russian commercial information project for world wide. Foreign filing in English. |