Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

5868 results about "Station" patented technology

In IEEE 802.11 (Wi-Fi) terminology, a station (abbreviated as STA) is a device that has the capability to use the 802.11 protocol. For example, a station may be a laptop, a desktop PC, PDA, access point or Wi-Fi phone. An STA may be fixed, mobile or portable. Generally in wireless networking terminology, a station, wireless client and node are often used interchangeably, with no strict distinction existing between these terms. A station may also be referred to as a transmitter or receiver based on its transmission characteristics. IEEE 802.11-2007 formally defines station as: Any device that contains an IEEE 802.11-conformant media access control (MAC) and physical layer (PHY) interface to the wireless medium (WM).

Media delivery using quality of service differentiation within a media stream

A WLAN system adapted to apply QoS differentiation to a media stream to be transmitted from a transmitting station (STA) to a receiving STA of that system. The transmitting STA processes the media stream to generate a base sub-stream and one or more enhancement sub-streams for subsequent transmission over a wireless communication channel and assigns different priorities to different sub-streams. Depending on the channel conditions, the transmitting STA may select to discard, without transmission, portions of data from enhancement sub-streams. The selection process is based on the assigned priority and operates to preserve as much of relatively high-priority data as possible. The receiving STA then processes the received data to generate a reconstructed media stream, which provides signal quality equal to or better than the signal quality supported by the base sub-stream. Advantageously, a WLAN system of the invention is adapted to change signal quality dynamically and incrementally in a manner commensurate with current channel conditions without the need for communication between the higher and lower network layers. In addition, it provides gradual and graceful degradation of signal quality when channel conditions deteriorate as opposed to abrupt degradation inherent in analogous prior art systems.
Owner:AVAGO TECH INT SALES PTE LTD

Method and apparatus for displaying health status of network devices

A method and apparatus for concurrently displaying from a single window on a network management station the health status of all network devices and objects of a computer network. The network devices may be categorized according to state or device type, as determined by the network manager. The method and apparatus provides a network manager with the ability to determine the current state of network devices and objects within an enterprise network and invoke further actions such as configuration, performance, fault, and security management tasks. The network manager can drag and drop icons from one network management system application window to another network management system application window to obtain fault information about network devices and objects, thus allowing multiple network management system applications to run concurrently on the same network management station. The network manager is further able to add new network devices and objects by dragging site, folder or device icons from one network management system application window to a second network management system application window for displaying the health status of the new devices. The dragged-in devices are added to the appropriate status panes within the second window according to the method of the present invention.
Owner:NORTEL NETWORKS LTD

Identifying works for initiating a work-based action, such as an action on the internet

A system is described for linking traditional media works, such as print and broadcast media for example, to a more interactive media conduit, such as the Internet. The system avoids the need to modify the media work in anyway. Instead, it employs a passive recognition system that uniquely identifies the specific work, such as a particular television or radio broadcast or printed commercial. The identification may be based in intra-work and / or extra-work information. Several different embodiments / environments are described. The best embodiment may depend, at least in part, on costs of hardware and communication. These costs can change over time. In one embodiment, all of the databases and computation are performed at the user's premises. In another embodiment, all of the databases and computation occur at remote sites that user premise equipment can query using uniquely identifying extra-work information, such as the time, place and station on which the work was broadcast. This second embodiment is most suitable for content that is published, e.g. magazines, newspapers, etc., or broadcasted, e.g. cable, satellite and terrestrial television and radio. Alternative embodiments, in which various operations are performed at both the user's premises and remote locations are also possible.
Owner:NETWORK 1 TECH

System and method for installing an auditable secure network

A system and method for generating and remotely installing a private secure and auditable network is provided. Node identification, link, and application information is input into a template. A generator generates components using the information in the template and the components are remotely installed using an installation server. The components include agent modules which are each installed at predetermined target site and establish communication with the installation server to facilitate the download of other components, including application software and configuration files. Each node can only be installed once and is specific to a predetermined target site. For each link, a unique pair of keys is generated in a form which is not human readable, each key corresponds to a different direction of communication over the link. Data transmitted between nodes is encrypted using public-private key pairs. At least one monitor node manages the security of the network, strobes keys, and may take nodes out of the network in the event of a security violation. In such a case, one or more nodes, or the entire network, may be regenerated and installed anew. Throughout the generation and installation a plurality of verifications, authorizations, and password entries may be required by independent groups to arrive at the network. Preferably, the installation is audited by several groups, and the overall operation may be audited by a second monitor node to detect the presence of an interposed “pirate” node.
Owner:ANGEL SECURE NETWORKS

Wireless location routing applications and architecture therefor

A system for wirelessly locating mobile station / units (MS) and using resulting location determinations for providing a product or service is disclosed. The system is useful for routing an MS user to a plurality of desired locations, alerting an MS user to a nearby desired product or service based on satisfaction of user criteria, and providing enhanced security and 911 response. In one embodiment, the system responds to MS location requests via, e.g., Internet communication between a distributed network of location processing sites. A plurality of locating technologies including those based on: (1) TDOA; (2) pattern recognition; (3) timing advance; (5) GPS and network assisted GPS, (6) angle of arrival, (7) super resolution enhancements, and (8) supplemental information from low cost base stations can be activated, in various combinations, by system embodiments. MS location difficulties resulting from poor location accuracy / reliability and / or poor coverage are alleviated via such technologies in combination with automatically adapting and calibrating system performance according to environmental and geographical changes so that the system becomes progressively more comprehensive and accurate. Further, the system can be modularly configured for use in location signaling environments ranging from urban, dense urban, suburban, rural, mountain to low traffic or isolated roadways. Accordingly, the system is useful for 911 emergency calls, tracking, routing, people and animal location including applications for confinement to and exclusion from certain areas.
Owner:MOBILE MAVEN

System and method for deriving IPv6 scope identifiers and for mapping the identifiers into IPv6 addresses

A system and method for use at an intermediate network device employs Virtual Local Area Network (VLAN) designations as Internet Protocol version 6 (IPv6) link identifiers, and maps VLAN designations to IPv6 site identifiers (IDs). The system also generates a compacted look-up address based on the destination address specified within a received network message, such as an IPv6 packet. For a network message having a link-local unicast destination address, the VLAN ID associated with the port on which the message was received is encoded within the corresponding look-up address. For a network message having a site-local unicast address, the VLAN ID associated with the port on which the message was received is used to derive a site ID which is then encoded within the corresponding look-up address. For a network message having a multicast destination address, if the address's scope value is between hexadecimal “2” and “4” inclusive, the VLAN ID associated with the port on which the message was received is encoded within the corresponding look-up address. If the scope value is between hexadecimal “5” and “D”, inclusive, the VLAN ID associated with the port on which the message was received is used to derive a site ID which is then encoded within the corresponding look-up address. The look-up addresses are applied to a forwarding information base (FIB) to derive the outbound interface(s) from which the message is to be forwarded.
Owner:CISCO TECH INC

Base-station (BS)-combined direct-through terminal optimized resource allocation method in direct-through cellular system

The invention provides a base-station (BS)-combined direct-through terminal optimized resource allocation method in a direct-through cellular system. In order not to interrupt the normal communication of traditional cellular subscriber links and obtain effective gain brought by device-to-device (D2D) direct-through technology, D2D subscribers are allowed to adopt a resource allocation manner that resources are selected by a D2D subscriber end when uplink and downlink resources of the cellular system are shared; at this time, the D2D subscribers only need to consider the interference to other cellular subscribers (CUs) arising from signals of the D2D subscribers; and meanwhile, a BS centralized-control manner is adopted to carry out resource allocation, the centralized-control advantage of a BS is exerted, a BS and D2D terminal combined optimization manner is fully utilized, and the advantages of the two allocation manners are exerted. The BS-combined direct-through terminal optimized resource allocation method in the direct-through cellular system has the advantages that the resource utilization ratio and availability of a coexistent system which is provided with the D2D direct-through technology are sufficiently improved, the multiplexing gain of the resources are maximally developed, the system capacity is increased, the service types are increased, and the quality of service is ensured; and many chances for resource multiplexing are developed under the condition of limited resources from a novel resource allocation viewing angle.
Owner:CERTUS NETWORK TECHNANJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products