[go: up one dir, main page]

US20160044682A1 - Radio Transmitter Identification and Congestion Control - Google Patents

Radio Transmitter Identification and Congestion Control Download PDF

Info

Publication number
US20160044682A1
US20160044682A1 US14/821,646 US201514821646A US2016044682A1 US 20160044682 A1 US20160044682 A1 US 20160044682A1 US 201514821646 A US201514821646 A US 201514821646A US 2016044682 A1 US2016044682 A1 US 2016044682A1
Authority
US
United States
Prior art keywords
client device
radio transmission
transmission slot
digital identifier
wireless signal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/821,646
Inventor
Vladan Djakovic
Joel Daniel Brinton
Benjamin Joseph Vivaldi Morse
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SIGNAL LABORATORIES Inc
Original Assignee
SIGNAL LABORATORIES Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SIGNAL LABORATORIES Inc filed Critical SIGNAL LABORATORIES Inc
Priority to US14/821,646 priority Critical patent/US20160044682A1/en
Publication of US20160044682A1 publication Critical patent/US20160044682A1/en
Assigned to SIGNAL LABORATORIES, INC. reassignment SIGNAL LABORATORIES, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: DJAKOVIC, VLADAN, BRINTON, JOEL DANIEL, VIVALDI MORSE, BENJAMIN JOSEPH
Abandoned legal-status Critical Current

Links

Images

Classifications

    • H04W72/0486
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/068Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/037Protecting confidentiality, e.g. by encryption of the control plane, e.g. signalling traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/0289Congestion control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • H04W72/044Wireless resource allocation based on the type of the allocated resource
    • H04W72/0446Resources in time domain, e.g. slots or frames
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • H04W72/044Wireless resource allocation based on the type of the allocated resource
    • H04W72/0453Resources in frequency domain, e.g. a carrier in FDMA
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/52Allocation or scheduling criteria for wireless resources based on load
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0414Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden during transmission, i.e. party's identity is protected against eavesdropping, e.g. by using temporary identifiers, but is known to the other party or parties involved in the communication

Definitions

  • the disclosure generally relates to the field of wireless communications, and more specifically to controlling the congestion in a wireless communication channel.
  • multiple client devices send and receive wireless signals using a shared communication channel.
  • multiple client devices such as smartphones
  • a base station e.g., a cellular base station, a wireless router
  • a preset base frequency e.g., 2.4 GHz
  • FIG. 1 illustrates one embodiment of components of an example machine able to read instructions from a machine-readable medium and execute them in a processor (or controller).
  • FIG. 2 illustrates one embodiment of a wireless data transmission system environment.
  • FIG. 3A illustrates a graph showing multiple radio transmission slots, according to one embodiment.
  • FIG. 3B illustrates a graph showing multiple radio transmission slots with different time lengths, according to one embodiment.
  • FIG. 4A illustrates a flow diagram of a process for transmitting data in a wireless communication channel, according to one embodiment.
  • FIG. 4B illustrates a flow diagram of a process for transmitting data in a wireless communication channel that is oversubscribed, according to one embodiment.
  • Embodiments include sending, by a client device, a request to connect with a base station and receiving, in response to the request, a message including a radio transmission slot and a digital identifier.
  • the radio transmission slot identifies a frequency channel and a time slot for transmitting a wireless signal.
  • the client device can then transmit wireless signals using the frequency channel identified by the radio transmission slot during the time slot identified by the radio transmission slot.
  • the client device encodes the digital identifier in the transmitted wireless signals.
  • FIG. 1 is a block diagram illustrating components of an example machine able to read instructions from a machine-readable medium and execute them in a processor (or controller).
  • FIG. 1 shows a diagrammatic representation of a machine in the example form of a computer system 100 within which instructions 124 (e.g., software) for causing the machine to perform any one or more of the methodologies discussed herein may be executed.
  • the machine operates as a standalone device or may be connected (e.g., networked) to other machines.
  • the machine may operate in the capacity of a server machine or a client machine in a server-client network environment, or as a peer machine in a peer-to-peer (or distributed) network environment.
  • the machine may be a server computer, a client computer, a personal computer (PC), a tablet PC, a set-top box (STB), a personal digital assistant (PDA), a cellular telephone, a smartphone, a web appliance, a network router, switch or bridge, or any machine capable of executing instructions 124 (sequential or otherwise) that specify actions to be taken by that machine.
  • PC personal computer
  • PDA personal digital assistant
  • STB set-top box
  • a cellular telephone a smartphone
  • smartphone a web appliance
  • network router switch or bridge
  • the example computer system 100 includes a processor 102 (e.g., a central processing unit (CPU), a graphics processing unit (GPU), a digital signal processor (DSP), one or more application specific integrated circuits (ASICs), one or more radio-frequency integrated circuits (RFICs), or any combination of these), a main memory 104 , and a static memory 106 , which are configured to communicate with each other via a bus 108 .
  • the computer system 100 may further include graphics display unit 110 (e.g., a plasma display panel (PDP), a liquid crystal display (LCD), a projector, or a cathode ray tube (CRT)).
  • graphics display unit 110 e.g., a plasma display panel (PDP), a liquid crystal display (LCD), a projector, or a cathode ray tube (CRT)
  • the computer system 100 may also include alphanumeric input device 112 (e.g., a keyboard), a cursor control device 114 (e.g., a mouse, a trackball, a joystick, a motion sensor, or other pointing instrument), a storage unit 116 , a signal generation device 118 (e.g., a speaker), and a network interface device 120 , which also are configured to communicate via the bus 108 .
  • alphanumeric input device 112 e.g., a keyboard
  • a cursor control device 114 e.g., a mouse, a trackball, a joystick, a motion sensor, or other pointing instrument
  • storage unit 116 e.g., a storage unit 116
  • signal generation device 118 e.g., a speaker
  • network interface device 120 e.g., a network interface device
  • the storage unit 116 includes a machine-readable medium 122 on which is stored instructions 124 (e.g., software) embodying any one or more of the methodologies or functions described herein.
  • the instructions 124 e.g., software
  • the instructions 124 may also reside, completely or at least partially, within the main memory 104 or within the processor 102 (e.g., within a processor's cache memory) during execution thereof by the computer system 100 , the main memory 104 and the processor 102 also constituting machine-readable media.
  • the instructions 124 (e.g., software) may be transmitted or received over a network 126 via the network interface device 120 .
  • machine-readable medium 122 is shown in an example embodiment to be a single medium, the term “machine-readable medium” should be taken to include a single medium or multiple media (e.g., a centralized or distributed database, or associated caches and servers) able to store instructions (e.g., instructions 124 ).
  • the term “machine-readable medium” shall also be taken to include any medium that is capable of storing instructions (e.g., instructions 124 ) for execution by the machine and that cause the machine to perform any one or more of the methodologies disclosed herein.
  • the term “machine-readable medium” includes, but not be limited to, data repositories in the form of solid-state memories, optical media, and magnetic media.
  • FIG. 2 illustrates a system environment for wireless data transmission, according to one embodiment.
  • the system environment 200 includes multiple client devices 201 , a base station 210 , a network 220 , and a domain authority 230 .
  • client devices 201 may be included in the system environment 200 .
  • the base station 210 may be comprised of components as described with the example computer system 100 .
  • a client device 201 is one or more computing devices capable of receiving user input as well as transmitting and/or receiving data via the network 220 .
  • the client device 201 is a conventional computer system, such as a desktop computer or a laptop computer.
  • the client device 201 may be a device having computer functionality, such as a personal digital assistant (PDA), a mobile telephone, a smartphone or another suitable device.
  • PDA personal digital assistant
  • a client device 201 is configured to communicate with other devices via the network 220 .
  • Client device 201 may connect to the network 220 via a base station 210 .
  • client devices 201 A, 201 B, and 201 C send data wirelessly to the base station (e.g., a cellular base station, or a wireless router) and the base station forwards the data to the network to be sent to their corresponding recipient.
  • the base station receives data addressed to client devices 201 A, 201 B, and/or 201 C and sends the data wirelessly to the corresponding client device.
  • a domain authority 230 handles the subscription of a client device 201 with the base station 210 .
  • a client device 201 may request to subscribe with the base station 210 .
  • the base station 210 forwards the request to the domain authority 230 and the domain authority grants or denies the request and generates an identifier for the client device 201 .
  • the domain authority 230 sends the generated identifier for the client device 201 to the base station 210 , and the base station 210 sends a response to the client device 201 that includes the identifier generated by the domain authority 230 .
  • the network 220 may comprise any combination of local area and/or wide area networks, using both wired and/or wireless communication systems.
  • the network 220 uses standard communications technologies and/or protocols.
  • the network 220 includes communication links using technologies such as Ethernet, 802.11, worldwide interoperability for microwave access (WiMAX), 3G, 4G, code division multiple access (CDMA), digital subscriber line (DSL), etc.
  • networking protocols used for communicating via the network 220 include multiprotocol label switching (MPLS), transmission control protocol/Internet protocol (TCP/IP), user datagram protocol (UDP), hypertext transport protocol (HTTP), simple mail transfer protocol (SMTP), and file transfer protocol (FTP).
  • MPLS multiprotocol label switching
  • TCP/IP transmission control protocol/Internet protocol
  • UDP user datagram protocol
  • HTTP hypertext transport protocol
  • SMTP simple mail transfer protocol
  • FTP file transfer protocol
  • Data exchanged over the network 220 may be represented using any suitable format, such as hypertext markup language (HTML), extensible markup language (XML) or JavaScript Object Notation (JSON).
  • HTML hypertext markup language
  • XML extensible markup language
  • JSON JavaScript Object Notation
  • all or some of the communication links of the network 220 may be encrypted using any suitable technique or techniques.
  • FIG. 3A illustrates a graph showing multiple radio transmission slots to be used by client devices to connect to the network via a base station, according to one embodiment.
  • the graph of FIG. 3A has a first axis with multiple time slots, and a second axis with multiple frequency slots.
  • a radio transmission slot is characterized by a time slot and a frequency channel.
  • radio transmission slot 310 A is characterized by time slot T 10 and frequency channel F 7 . That is, a client device 201 that is assigned to radio transmission slot 310 A can transmit data during time T 10 using a frequency of F 7 .
  • radio transmission slot 310 B is characterized by time slot T 6 and frequency channel F 5 ; and radio transmission slot 310 C is characterized by time slot T 13 and frequency channel F 2 .
  • the radio transmission slot repeats periodically, and thus, in the example of FIG. 3A a client device 201 that is assigned to a specific radio transmission slot 310 may wirelessly transmit data using the allocated frequency every 16 time slots.
  • the base station assigns a radio transmission slot to a client device that sends a connection request to the base station.
  • FIG. 4A illustrates a flow diagram of a process for transmitting data, by a client device, in a wireless communication channel, according to one embodiment.
  • Each client device 201 may be configured to include components of the computer system of FIG. 1 and execute the process steps as instructions as further described herein.
  • a client device 201 sends a subscription request to the base station 210 and receives 410 a radio transmission slot 310 from the base station 210 . Based on the received radio transmission slot 310 , the client device 201 identifies 420 a time slot and a frequency channel.
  • the client device receives 430 data to be wirelessly transmitted. For instance, client device 201 may receive a message from a user to be sent to a second user using a second client device.
  • the client device 201 transmits 440 the data during the identified time slot using the identified frequency.
  • alternative time slots may be reserved for reversed traffic. That is, a client device 201 assigned to radio transmission slot 310 C may transmit data using frequency F 2 during time slot T 13 and may receive incoming data in response to the data transmission during time slot T 14 .
  • the radio transmission slot identifies the transmitter. For instance, if client device 201 A is assigned to radio transmission slot 310 A, and a wireless transmission is received at frequency F 7 during time slot T 10 , the receiver of the wireless transmission can identify the transmitter of the wireless signal as client device 201 , without client device 201 having to transmit identification information together with the transmitted data. This beneficially reduces the amount of data transmitted during each wireless transmission and thus, reducing the bandwidth utilization of the wireless transmission channels.
  • each radio transmission slot 310 can be shared by two or more client device.
  • each client device may be assigned a digital identifier to identify the different client devices subscribed to a single radio transmission slot 310 .
  • a 10-bit digital identifier is assigned to client devices subscribed to a specific radio transmission slot 310 , 1024 client devices may be able to subscribe to the specific radio transmission slot 310 , thus increasing the maximum total number of subscribers from 112 to 114,688.
  • the receiver may identify the transmitter based on the radio transmission slot 310 at which the transmission was received and the digital identifier included in with the received transmission. That is, the digital identifier is encoded together with a message in a wireless signal transmitted by client devices.
  • the digital identifier assigned to a client device is not related to the identity of the client device. For instance, the base station 210 may randomly assign a unique digital identifier for a radio transmission slot 310 to client devices 201 subscribing with the base station. In some embodiments, the same digital identifier may be used for different client devices 201 transmitting in different radio transmission slots 310 .
  • each client device 201 is assigned a unique digital identifier. For instance, client device 201 A subscribed to radio transmission slot 310 A and client device 201 B subscribed to radio transmission slot 310 B may both have the same digital identifier, but client device 201 C subscribed to radio transmission slot 310 A has a digital identifier different than the digital identifier of client device 201 A also subscribed to radio transmission slot 310 A.
  • FIG. 4B illustrates a flow diagram of a process for transmitting data, by a client device, in a wireless communication channel that is oversubscribed.
  • Each client device 201 may be configured to include components of the computer system of FIG. 1 and execute the process steps as instructions as further described herein.
  • a client device 201 may attempt to transmit during a radio transmission slot assigned to the client device.
  • the client device 201 determines 455 whether a collision has occurred in the transmission. If a collision did not occur in the transmission, the data is sent 465 .
  • FIG. 3B illustrates a graph showing multiple radio transmission slots with different time lengths, according to one embodiment.
  • the frequency channels are divided into slow switching speed channels (F 1 and F 2 ), medium switching speed channels (F 3 and F 4 ) and fast switching speed channels (F 5 , F 6 , and F 7 ).
  • Radio transmission slots 310 in the slow switching speed channels F 1 and F 2 are four times as long as a single time slot.
  • time slot 310 C is characterized by frequency F 2 and time slots T 9 , T 10 , T 11 , and T 12 . That is, a client device that is assigned to radio transmission slot 310 C can transmit data during times T 9 , T 10 , T 11 , and T 12 .
  • Radio transmission slots 310 in the medium switching speed channels F 4 and F 4 include two time slots.
  • radio transmission slot 310 B is characterized by frequency F 4 and time slots T 5 and T 6 .
  • Radio transmission slots 310 in the fast switching channels F 5 , F 6 , and F 7 include one time slot.
  • radio transmission slot 310 A is characterized by frequency F 7 and time slot T 10 .
  • the type of channel assigned to a client device 201 may be selected based on the type of client device requesting to connect to the base station. For instance, a radio transmission slot in a fast switching channel may be assigned to a client device for which low latency is important. Conversely, a radio transmission slot in a slow switching channel may be assigned to a client device for which throughput is important. For instance, client devices transmitting VoIP messages, real time sensor data, or web browsing traffic may be assigned to a fast switching speed channel, whereas a client devices transmitting bulk files, video images, or still images may be assigned to a slow switching speed channel.
  • the disclosed embodiments beneficially allow for improved utilization of the bandwidth of a communication channel. Additionally, since the identity of the transmitting client device is not sent with the message, the disclosed embodiments also improve the security of the wireless transmission system.
  • Modules may constitute either software modules (e.g., code embodied on a machine-readable medium or in a transmission signal) or hardware modules.
  • a hardware module is tangible unit capable of performing certain operations and may be configured or arranged in a certain manner.
  • one or more computer systems e.g., a standalone, client or server computer system
  • one or more hardware modules of a computer system e.g., a processor or a group of processors
  • software e.g., an application or application portion
  • FIGS. 4A and 4B may be executable by the machine illustrated in FIG. 1 .
  • processors may be temporarily configured (e.g., by software) or permanently configured to perform the relevant operations. Whether temporarily or permanently configured, such processors may constitute processor-implemented modules that operate to perform one or more operations or functions.
  • the modules referred to herein may, in some example embodiments, comprise processor-implemented modules.
  • any reference to “one embodiment” or “an embodiment” means that a particular element, feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment.
  • the appearances of the phrase “in one embodiment” in various places in the specification are not necessarily all referring to the same embodiment.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A system and a method are disclosed for transmitting and receiving wireless signals in a shared communication channel. Embodiments include sending, by a client device, a request to connect with a base station and receiving, in response to the request, a message including a radio transmission slot and a digital identifier. The radio transmission slot identifies a frequency channel and a time slot for transmitting a wireless signal. The client device can then transmit wireless signals using the frequency channel identified by the radio transmission slot during the time slot identified by the radio transmission slot. The client device encodes the digital identifier in the transmitted wireless signal.

Description

    CROSS REFERENCE TO RELATED APPLICATIONS
  • This application claims the benefit of U.S. Provisional Application No. 61/999,821, filed Aug. 7, 2014, and U.S. Provisional Application No. 61/999,818, filed Aug. 7, 2014, both of which are incorporated by reference in their entirety.
  • BACKGROUND
  • 1. Field of Art
  • The disclosure generally relates to the field of wireless communications, and more specifically to controlling the congestion in a wireless communication channel.
  • 2. Description of the Related Art
  • Conventionally, in a wireless communication system, multiple client devices send and receive wireless signals using a shared communication channel. For instance, multiple client devices (such as smartphones) may transmit and receive wireless signals to and from a base station (e.g., a cellular base station, a wireless router) using a preset base frequency (e.g., 2.4 GHz). In such system, each client device may try to utilize the shared spectrum as much as possible with the assumption that other will do the same. Oftentimes, this results in a Nash Equilibrium, where the participants do not cooperate with each other.
  • Therefore, there is a need for a mechanism to increase the efficiency of the utilization of a shared communication channel.
  • BRIEF DESCRIPTION OF DRAWINGS
  • The disclosed embodiments have other advantages and features which will be more readily apparent from the detailed description, the appended claims, and the accompanying figures (or drawings). A brief introduction of the figures is below.
  • FIG. 1 illustrates one embodiment of components of an example machine able to read instructions from a machine-readable medium and execute them in a processor (or controller).
  • FIG. 2 illustrates one embodiment of a wireless data transmission system environment.
  • FIG. 3A illustrates a graph showing multiple radio transmission slots, according to one embodiment.
  • FIG. 3B illustrates a graph showing multiple radio transmission slots with different time lengths, according to one embodiment.
  • FIG. 4A illustrates a flow diagram of a process for transmitting data in a wireless communication channel, according to one embodiment.
  • FIG. 4B illustrates a flow diagram of a process for transmitting data in a wireless communication channel that is oversubscribed, according to one embodiment.
  • DETAILED DESCRIPTION
  • The Figures (FIGS.) and the following description relate to preferred embodiments by way of illustration only. It should be noted that from the following discussion, alternative embodiments of the structures and methods disclosed herein will be readily recognized as viable alternatives that may be employed without departing from the principles of what is claimed.
  • Reference will now be made in detail to several embodiments, examples of which are illustrated in the accompanying figures. It is noted that wherever practicable similar or like reference numbers may be used in the figures and may indicate similar or like functionality. The figures depict embodiments of the disclosed system (or method) for purposes of illustration only. One skilled in the art will readily recognize from the following description that alternative embodiments of the structures and methods illustrated herein may be employed without departing from the principles described herein.
  • Configuration Overview
  • One embodiment of a disclosed system, method, and computer readable storage medium for transmitting and receiving wireless signals in a shared communication channel. Embodiments include sending, by a client device, a request to connect with a base station and receiving, in response to the request, a message including a radio transmission slot and a digital identifier. The radio transmission slot identifies a frequency channel and a time slot for transmitting a wireless signal. The client device can then transmit wireless signals using the frequency channel identified by the radio transmission slot during the time slot identified by the radio transmission slot. The client device encodes the digital identifier in the transmitted wireless signals.
  • Computing Machine Architecture
  • FIG. 1 is a block diagram illustrating components of an example machine able to read instructions from a machine-readable medium and execute them in a processor (or controller). Specifically, FIG. 1 shows a diagrammatic representation of a machine in the example form of a computer system 100 within which instructions 124 (e.g., software) for causing the machine to perform any one or more of the methodologies discussed herein may be executed. In alternative embodiments, the machine operates as a standalone device or may be connected (e.g., networked) to other machines. In a networked deployment, the machine may operate in the capacity of a server machine or a client machine in a server-client network environment, or as a peer machine in a peer-to-peer (or distributed) network environment.
  • The machine may be a server computer, a client computer, a personal computer (PC), a tablet PC, a set-top box (STB), a personal digital assistant (PDA), a cellular telephone, a smartphone, a web appliance, a network router, switch or bridge, or any machine capable of executing instructions 124 (sequential or otherwise) that specify actions to be taken by that machine. Further, while only a single machine is illustrated, the term “machine” shall also be taken to include any collection of machines that individually or jointly execute instructions 124 to perform any one or more of the methodologies discussed herein.
  • The example computer system 100 includes a processor 102 (e.g., a central processing unit (CPU), a graphics processing unit (GPU), a digital signal processor (DSP), one or more application specific integrated circuits (ASICs), one or more radio-frequency integrated circuits (RFICs), or any combination of these), a main memory 104, and a static memory 106, which are configured to communicate with each other via a bus 108. The computer system 100 may further include graphics display unit 110 (e.g., a plasma display panel (PDP), a liquid crystal display (LCD), a projector, or a cathode ray tube (CRT)). The computer system 100 may also include alphanumeric input device 112 (e.g., a keyboard), a cursor control device 114 (e.g., a mouse, a trackball, a joystick, a motion sensor, or other pointing instrument), a storage unit 116, a signal generation device 118 (e.g., a speaker), and a network interface device 120, which also are configured to communicate via the bus 108.
  • The storage unit 116 includes a machine-readable medium 122 on which is stored instructions 124 (e.g., software) embodying any one or more of the methodologies or functions described herein. The instructions 124 (e.g., software) may also reside, completely or at least partially, within the main memory 104 or within the processor 102 (e.g., within a processor's cache memory) during execution thereof by the computer system 100, the main memory 104 and the processor 102 also constituting machine-readable media. The instructions 124 (e.g., software) may be transmitted or received over a network 126 via the network interface device 120.
  • While machine-readable medium 122 is shown in an example embodiment to be a single medium, the term “machine-readable medium” should be taken to include a single medium or multiple media (e.g., a centralized or distributed database, or associated caches and servers) able to store instructions (e.g., instructions 124). The term “machine-readable medium” shall also be taken to include any medium that is capable of storing instructions (e.g., instructions 124) for execution by the machine and that cause the machine to perform any one or more of the methodologies disclosed herein. The term “machine-readable medium” includes, but not be limited to, data repositories in the form of solid-state memories, optical media, and magnetic media.
  • System Environment
  • FIG. 2 illustrates a system environment for wireless data transmission, according to one embodiment. The system environment 200 includes multiple client devices 201, a base station 210, a network 220, and a domain authority 230. In alternative configurations, different and/or additional components may be included in the system environment 200. Each client devices 201, the base station 210, or the domain authority 230 may be comprised of components as described with the example computer system 100.
  • A client device 201 is one or more computing devices capable of receiving user input as well as transmitting and/or receiving data via the network 220. In one embodiment, the client device 201 is a conventional computer system, such as a desktop computer or a laptop computer. Alternatively, the client device 201 may be a device having computer functionality, such as a personal digital assistant (PDA), a mobile telephone, a smartphone or another suitable device. A client device 201 is configured to communicate with other devices via the network 220.
  • Client device 201 may connect to the network 220 via a base station 210. For instance, client devices 201A, 201B, and 201C send data wirelessly to the base station (e.g., a cellular base station, or a wireless router) and the base station forwards the data to the network to be sent to their corresponding recipient. Additionally, the base station receives data addressed to client devices 201A, 201B, and/or 201C and sends the data wirelessly to the corresponding client device.
  • In some embodiments, client devices 201 subscribe with the base station prior to sending or receiving data via the base station 210. For instance, client devices 201 may send a request to the base station 210 to subscribe with the base station. The base station 210 may grant or deny the request. The base station 210 may additionally send an identifier to the client device 201 requesting to subscribe with the base station 210.
  • In some embodiments, a domain authority 230 handles the subscription of a client device 201 with the base station 210. For instance, a client device 201 may request to subscribe with the base station 210. The base station 210 forwards the request to the domain authority 230 and the domain authority grants or denies the request and generates an identifier for the client device 201. The domain authority 230 sends the generated identifier for the client device 201 to the base station 210, and the base station 210 sends a response to the client device 201 that includes the identifier generated by the domain authority 230.
  • The network 220 may comprise any combination of local area and/or wide area networks, using both wired and/or wireless communication systems. In one embodiment, the network 220 uses standard communications technologies and/or protocols. For example, the network 220 includes communication links using technologies such as Ethernet, 802.11, worldwide interoperability for microwave access (WiMAX), 3G, 4G, code division multiple access (CDMA), digital subscriber line (DSL), etc. Examples of networking protocols used for communicating via the network 220 include multiprotocol label switching (MPLS), transmission control protocol/Internet protocol (TCP/IP), user datagram protocol (UDP), hypertext transport protocol (HTTP), simple mail transfer protocol (SMTP), and file transfer protocol (FTP). Data exchanged over the network 220 may be represented using any suitable format, such as hypertext markup language (HTML), extensible markup language (XML) or JavaScript Object Notation (JSON). In some embodiments, all or some of the communication links of the network 220 may be encrypted using any suitable technique or techniques.
  • Radio Transmitter Identification
  • FIG. 3A illustrates a graph showing multiple radio transmission slots to be used by client devices to connect to the network via a base station, according to one embodiment. The graph of FIG. 3A has a first axis with multiple time slots, and a second axis with multiple frequency slots. As used herein, a radio transmission slot is characterized by a time slot and a frequency channel. For instance, radio transmission slot 310A is characterized by time slot T10 and frequency channel F7. That is, a client device 201 that is assigned to radio transmission slot 310A can transmit data during time T10 using a frequency of F7. Similarly, radio transmission slot 310B is characterized by time slot T6 and frequency channel F5; and radio transmission slot 310C is characterized by time slot T13 and frequency channel F2. The radio transmission slot repeats periodically, and thus, in the example of FIG. 3A a client device 201 that is assigned to a specific radio transmission slot 310 may wirelessly transmit data using the allocated frequency every 16 time slots. In some embodiments, the base station assigns a radio transmission slot to a client device that sends a connection request to the base station.
  • FIG. 4A illustrates a flow diagram of a process for transmitting data, by a client device, in a wireless communication channel, according to one embodiment. Each client device 201 may be configured to include components of the computer system of FIG. 1 and execute the process steps as instructions as further described herein. A client device 201 sends a subscription request to the base station 210 and receives 410 a radio transmission slot 310 from the base station 210. Based on the received radio transmission slot 310, the client device 201 identifies 420 a time slot and a frequency channel. The client device receives 430 data to be wirelessly transmitted. For instance, client device 201 may receive a message from a user to be sent to a second user using a second client device. The client device 201 then transmits 440 the data during the identified time slot using the identified frequency.
  • In some embodiments, alternative time slots may be reserved for reversed traffic. That is, a client device 201 assigned to radio transmission slot 310C may transmit data using frequency F2 during time slot T13 and may receive incoming data in response to the data transmission during time slot T14.
  • If there is at most only one client device subscribed (i.e., a subscriber) per radio transmission slot, the radio transmission slot identifies the transmitter. For instance, if client device 201A is assigned to radio transmission slot 310A, and a wireless transmission is received at frequency F7 during time slot T10, the receiver of the wireless transmission can identify the transmitter of the wireless signal as client device 201, without client device 201 having to transmit identification information together with the transmitted data. This beneficially reduces the amount of data transmitted during each wireless transmission and thus, reducing the bandwidth utilization of the wireless transmission channels.
  • In some embodiments, it is beneficial to have multiple client devices 201 subscribed to a single radio transmission slot 310. For instance, in the example of FIG. 3A, if only one client device 201 is subscribed to each radio transmission slot 310, at most 112 distinct client devices are able to transmit data. Since client devices may not always have data to transmit, each radio transmission slot 310 can be shared by two or more client device. In this embodiment, each client device may be assigned a digital identifier to identify the different client devices subscribed to a single radio transmission slot 310. For instance, if a 10-bit digital identifier is assigned to client devices subscribed to a specific radio transmission slot 310, 1024 client devices may be able to subscribe to the specific radio transmission slot 310, thus increasing the maximum total number of subscribers from 112 to 114,688.
  • When receiving a transmission, the receiver may identify the transmitter based on the radio transmission slot 310 at which the transmission was received and the digital identifier included in with the received transmission. That is, the digital identifier is encoded together with a message in a wireless signal transmitted by client devices. In some embodiments, the digital identifier assigned to a client device is not related to the identity of the client device. For instance, the base station 210 may randomly assign a unique digital identifier for a radio transmission slot 310 to client devices 201 subscribing with the base station. In some embodiments, the same digital identifier may be used for different client devices 201 transmitting in different radio transmission slots 310. Additionally, for a single radio transmission slot 310, each client device 201 is assigned a unique digital identifier. For instance, client device 201A subscribed to radio transmission slot 310A and client device 201B subscribed to radio transmission slot 310B may both have the same digital identifier, but client device 201C subscribed to radio transmission slot 310A has a digital identifier different than the digital identifier of client device 201A also subscribed to radio transmission slot 310A.
  • In some embodiments, the number of subscribers per radio transmission slot 310 is controlled based on the number of client devices trying to connect to the network via the base station. For instance, during a rush hour, where more client devices are trying to connect to the network via the base station, the length of the digital identifier may be increased to allow for additional client devices to subscribe to a radio transmission slot 310, and during non-rush hours, the length of the digital identifier may be decreased to save bandwidth. In other embodiments, the length of the digital identifier is kept constant (e.g., 10-bits) but the number of digital identifiers used is controlled to increase or decrease oversubscription of a radio transmission slot 310.
  • For radio transmission slots 310 that are oversubscribed, client devices 201 subscribed to the radio transmission slot 310 may use a collision avoidance technique such as random back-off. FIG. 4B illustrates a flow diagram of a process for transmitting data, by a client device, in a wireless communication channel that is oversubscribed. Each client device 201 may be configured to include components of the computer system of FIG. 1 and execute the process steps as instructions as further described herein. A client device 201 may attempt to transmit during a radio transmission slot assigned to the client device. The client device 201 determines 455 whether a collision has occurred in the transmission. If a collision did not occur in the transmission, the data is sent 465. Otherwise, if a collision did occur in the transmission, the client device 201 waits 460 a random number of cycles 460 before attempting 450 to re-transmit the data. In some embodiments, the random number of cycles to wait before a re-transmission attempt is an integer number between 0 and 2C−1, where C is the number of collisions of the client device 201. That is, after the first collision, the client device 201 waits either 0 or 1 cycle before attempting to re-transmit the data. After the second collision, the client device 201 waits anywhere between 0 and 3 cycles before attempting to re-transmit. After the third collision, the client device 201 waits anywhere between 0 and 7 cycles before attempting to re-transmit.
  • FIG. 3B illustrates a graph showing multiple radio transmission slots with different time lengths, according to one embodiment. In the exemplary embodiment of FIG. 3, the frequency channels are divided into slow switching speed channels (F1 and F2), medium switching speed channels (F3 and F4) and fast switching speed channels (F5, F6, and F7). Radio transmission slots 310 in the slow switching speed channels F1 and F2 are four times as long as a single time slot. For instance, time slot 310C is characterized by frequency F2 and time slots T9, T10, T11, and T12. That is, a client device that is assigned to radio transmission slot 310C can transmit data during times T9, T10, T11, and T12. Radio transmission slots 310 in the medium switching speed channels F4 and F4 include two time slots. For instance, radio transmission slot 310B is characterized by frequency F4 and time slots T5 and T6. Radio transmission slots 310 in the fast switching channels F5, F6, and F7 include one time slot. For instance, radio transmission slot 310A is characterized by frequency F7 and time slot T10.
  • The type of channel assigned to a client device 201 may be selected based on the type of client device requesting to connect to the base station. For instance, a radio transmission slot in a fast switching channel may be assigned to a client device for which low latency is important. Conversely, a radio transmission slot in a slow switching channel may be assigned to a client device for which throughput is important. For instance, client devices transmitting VoIP messages, real time sensor data, or web browsing traffic may be assigned to a fast switching speed channel, whereas a client devices transmitting bulk files, video images, or still images may be assigned to a slow switching speed channel.
  • Additional Configuration Considerations
  • The disclosed embodiments beneficially allow for improved utilization of the bandwidth of a communication channel. Additionally, since the identity of the transmitting client device is not sent with the message, the disclosed embodiments also improve the security of the wireless transmission system.
  • Throughout this specification, plural instances may implement components, operations, or structures described as a single instance. Although individual operations of one or more methods are illustrated and described as separate operations, one or more of the individual operations may be performed concurrently, and nothing requires that the operations be performed in the order illustrated. Structures and functionality presented as separate components in example configurations may be implemented as a combined structure or component. Similarly, structures and functionality presented as a single component may be implemented as separate components. These and other variations, modifications, additions, and improvements fall within the scope of the subject matter herein.
  • Certain embodiments are described herein as including logic or a number of components, modules, or mechanisms. Modules may constitute either software modules (e.g., code embodied on a machine-readable medium or in a transmission signal) or hardware modules. A hardware module is tangible unit capable of performing certain operations and may be configured or arranged in a certain manner. In example embodiments, one or more computer systems (e.g., a standalone, client or server computer system) or one or more hardware modules of a computer system (e.g., a processor or a group of processors) may be configured by software (e.g., an application or application portion) as a hardware module that operates to perform certain operations as described herein. For instance, the processes described in FIGS. 4A and 4B may be executable by the machine illustrated in FIG. 1.
  • In various embodiments, a hardware module may be implemented mechanically or electronically. For example, a hardware module may comprise dedicated circuitry or logic that is permanently configured (e.g., as a special-purpose processor, such as a field programmable gate array (FPGA) or an application-specific integrated circuit (ASIC)) to perform certain operations. A hardware module may also comprise programmable logic or circuitry (e.g., as encompassed within a general-purpose processor or other programmable processor) that is temporarily configured by software to perform certain operations. It will be appreciated that the decision to implement a hardware module mechanically, in dedicated and permanently configured circuitry, or in temporarily configured circuitry (e.g., configured by software) may be driven by cost and time considerations.
  • The various operations of example methods described herein may be performed, at least partially, by one or more processors that are temporarily configured (e.g., by software) or permanently configured to perform the relevant operations. Whether temporarily or permanently configured, such processors may constitute processor-implemented modules that operate to perform one or more operations or functions. The modules referred to herein may, in some example embodiments, comprise processor-implemented modules.
  • The one or more processors may also operate to support performance of the relevant operations in a “cloud computing” environment or as a “software as a service” (SaaS). For example, at least some of the operations may be performed by a group of computers (as examples of machines including processors), these operations being accessible via a network (e.g., the Internet) and via one or more appropriate interfaces (e.g., application program interfaces (APIs).)
  • The performance of certain of the operations may be distributed among the one or more processors, not only residing within a single machine, but deployed across a number of machines. In some example embodiments, the one or more processors or processor-implemented modules may be located in a single geographic location (e.g., within a home environment, an office environment, or a server farm). In other example embodiments, the one or more processors or processor-implemented modules may be distributed across a number of geographic locations.
  • Some portions of this specification are presented in terms of algorithms or symbolic representations of operations on data stored as bits or binary digital signals within a machine memory (e.g., a computer memory). These algorithms or symbolic representations are examples of techniques used by those of ordinary skill in the data processing arts to convey the substance of their work to others skilled in the art. As used herein, an “algorithm” is a self-consistent sequence of operations or similar processing leading to a desired result. In this context, algorithms and operations involve physical manipulation of physical quantities. Typically, but not necessarily, such quantities may take the form of electrical, magnetic, or optical signals capable of being stored, accessed, transferred, combined, compared, or otherwise manipulated by a machine. It is convenient at times, principally for reasons of common usage, to refer to such signals using words such as “data,” “content,” “bits,” “values,” “elements,” “symbols,” “characters,” “terms,” “numbers,” “numerals,” or the like. These words, however, are merely convenient labels and are to be associated with appropriate physical quantities.
  • Unless specifically stated otherwise, discussions herein using words such as “processing,” “computing,” “calculating,” “determining,” “presenting,” “displaying,” or the like may refer to actions or processes of a machine (e.g., a computer) that manipulates or transforms data represented as physical (e.g., electronic, magnetic, or optical) quantities within one or more memories (e.g., volatile memory, non-volatile memory, or a combination thereof), registers, or other machine components that receive, store, transmit, or display information.
  • As used herein any reference to “one embodiment” or “an embodiment” means that a particular element, feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment. The appearances of the phrase “in one embodiment” in various places in the specification are not necessarily all referring to the same embodiment.
  • Some embodiments may be described using the expression “coupled” and “connected” along with their derivatives. For example, some embodiments may be described using the term “coupled” to indicate that two or more elements are in direct physical or electrical contact. The term “coupled,” however, may also mean that two or more elements are not in direct contact with each other, but yet still co-operate or interact with each other. The embodiments are not limited in this context.
  • As used herein, the terms “comprises,” “comprising,” “includes,” “including,” “has,” “having” or any other variation thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, article, or apparatus that comprises a list of elements is not necessarily limited to only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Further, unless expressly stated to the contrary, “or” refers to an inclusive or and not to an exclusive or. For example, a condition A or B is satisfied by any one of the following: A is true (or present) and B is false (or not present), A is false (or not present) and B is true (or present), and both A and B are true (or present).
  • In addition, use of the “a” or “an” are employed to describe elements and components of the embodiments herein. This is done merely for convenience and to give a general sense of the invention. This description should be read to include one or at least one and the singular also includes the plural unless it is obvious that it is meant otherwise.
  • Upon reading this disclosure, those of skill in the art will appreciate still additional alternative structural and functional designs through the disclosed principles herein. Thus, while particular embodiments and applications have been illustrated and described, it is to be understood that the disclosed embodiments are not limited to the precise construction and components disclosed herein. Various modifications, changes and variations, which will be apparent to those skilled in the art, may be made in the arrangement, operation and details of the method and apparatus disclosed herein without departing from the spirit and scope defined in the appended claims.

Claims (20)

What is claimed is:
1. A method for wireless transmission of a message by a client device, the method comprising:
sending a request to a base station to connect with the base station;
receiving, from the base station in response to the request, a radio transmission slot and a digital identifier, the radio transmission slot identifying a frequency channel and a time slot to transmit a wireless signal; and
transmitting the message to the base station using the frequency channel and time slot identified by the radio transmission slot, the message including the received digital identifier.
2. The method of claim 1, wherein transmitting the message further comprises transmitting the message without an identification of the client device.
3. The method of claim 1, wherein different client devices assigned to a same radio transmission slot receive different digital identifiers from the base station.
4. The method of claim 1, wherein a length of the received digital identifier is based on a number of client devices connected to the base station.
5. The method of claim 1, further comprising retransmitting responsive to determining that a second client device transmitted a wireless signal using the frequency channel and the time slot identified by the radio transmission slot, the message to the base station using the frequency channel and time slot identified by the radio transmission slot after a random number of cycles.
6. A non-transitory computer readable storage medium configured to store instructions for wireless transmission of a message by a client device, the instructions when executed by a processor cause the processor to:
send a request to a base station to connect with the base station;
receive, from the base station in response to the request, a radio transmission slot and a digital identifier, the radio transmission slot identifying a frequency channel and a time slot to transmit a wireless signal; and
transmit the message to the base station using the frequency channel and time slot identified by the radio transmission slot, the message including the received digital identifier.
7. The non-transitory computer readable storage medium of claim 6, wherein the instructions to transmit the message further comprises instruction that when executed by the processor cause the processor to transmit the message without an identification of the client device.
8. The non-transitory computer readable storage medium of claim 6, wherein different client devices assigned to a same radio transmission slot receive different digital identifiers from the base station.
9. The non-transitory computer readable storage medium of claim 6, wherein a length of the received digital identifier is based on a number of client devices connected to the base station.
10. The non-transitory computer readable storage medium of claim 6, further comprising instructions that when executed by the processor cause the processor to retransmit responsive to determining that a second client device transmitted a wireless signal using the frequency channel and the time slot identified by the radio transmission slot, the message to the base station using the frequency channel and time slot identified by the radio transmission slot after a random number of cycles.
11. A method for wirelessly communicating with a client device, the method comprising:
receiving, from a client device, a request to transmit data;
sending, to the client device, response message including a radio transmission slot, the radio transmission slot identifying a frequency channel and a time slot to transmit a wireless signal;
receiving a wireless signal;
identifying a frequency channel and a time slot at which the wireless signal was received; and
determining that a sender of the wireless signal is the client device based on the identified frequency channel and time slot at which the wireless signal was received.
12. The method of claim 11, wherein the wireless signal encodes a message, and wherein the message does not include an identification of the sender.
13. The method of claim 12, further comprising:
sending, to the client device, a digital identifier; and
wherein the message encoded in the wireless signal includes the digital identifier.
14. The method of claim 13, wherein the determination that the sender of the wireless signal is the client device is further based on the digital identifier encoded in the wireless signal.
15. The method of claim 13, further comprising:
receiving, from a second client device, a second request to transmit data;
sending, to the second client device, a second response message including the radio transmission slot and a second digital identifier, wherein the radio transmission slot sent to the second client device is the same radio transmission slot sent to the client device, and wherein the second digital identifier sent to the second client device is different from the digital identifier sent to the client device.
16. The method of claim 13, further comprising:
receiving, from a second client device, a second request to transmit data;
sending, to the second client device, a second response message including a second radio transmission slot and the digital identifier, wherein the second radio transmission slot sent to the second client device is different than the radio transmission slot sent to the client device, and wherein the digital identifier sent to the second client device is the same digital identifier sent to the client device.
17. The method of claim 13, wherein a length of the digital identifier is based on a number of client devices connected.
18. A non-transitory computer readable storage medium configured to store instruction for wirelessly communicating with a client device, the instructions when executed by a processor cause the processor to:
receive, from a client device, a request to transmit data;
send, to the client device, response message including a radio transmission slot, the radio transmission slot identifying a frequency channel and a time slot to transmit a wireless signal;
receive a wireless signal;
identify a frequency channel and a time slot at which the wireless signal was received; and
determine that a sender of the wireless signal is the client device based on the identified frequency channel and time slot at which the wireless signal was received.
19. The non-transitory computer readable storage medium of claim 18, further comprising instruction that when executed by the processor cause the processor to send, to the client device, a digital identifier; and wherein the signal encodes a message, the message encoded in the wireless signal includes the digital identifier and does not include an identification of the sender, and wherein the determination that the sender of the wireless signal is the client device is further based on the digital identifier encoded in the wireless signal.
20. The non-transitory computer readable storage medium of claim 19, further comprising instruction that when executed by the processor cause the processor to:
receive, from a second client device, a second request to transmit data;
send, to the second client device, a second response message including the radio transmission slot and a second digital identifier, wherein the radio transmission slot sent to the second client device is the same radio transmission slot sent to the client device, and wherein the second digital identifier sent to the second client device is different from the digital identifier sent to the client device;
receive, from a third client device, a second request to transmit data;
send, to the third client device, a third response message including a third radio transmission slot and the digital identifier, wherein the third radio transmission slot sent to the third client device is different than the radio transmission slot sent to the client device, and wherein the digital identifier sent to the third client device is the same digital identifier sent to the client device.
US14/821,646 2014-08-07 2015-08-07 Radio Transmitter Identification and Congestion Control Abandoned US20160044682A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US14/821,646 US20160044682A1 (en) 2014-08-07 2015-08-07 Radio Transmitter Identification and Congestion Control

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201461999818P 2014-08-07 2014-08-07
US201461999821P 2014-08-07 2014-08-07
US14/821,646 US20160044682A1 (en) 2014-08-07 2015-08-07 Radio Transmitter Identification and Congestion Control

Publications (1)

Publication Number Publication Date
US20160044682A1 true US20160044682A1 (en) 2016-02-11

Family

ID=55268475

Family Applications (2)

Application Number Title Priority Date Filing Date
US14/821,646 Abandoned US20160044682A1 (en) 2014-08-07 2015-08-07 Radio Transmitter Identification and Congestion Control
US14/821,648 Expired - Fee Related US9788198B2 (en) 2014-08-07 2015-08-07 Protecting radio transmitter identity

Family Applications After (1)

Application Number Title Priority Date Filing Date
US14/821,648 Expired - Fee Related US9788198B2 (en) 2014-08-07 2015-08-07 Protecting radio transmitter identity

Country Status (1)

Country Link
US (2) US20160044682A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20240072920A1 (en) * 2022-08-30 2024-02-29 Texas Instruments Incorporated Optimizing node location in a battery management system

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170289504A1 (en) * 2016-03-31 2017-10-05 Ants Technology (Hk) Limited. Privacy Supporting Computer Vision Systems, Methods, Apparatuses and Associated Computer Executable Code
US20190207776A1 (en) * 2017-12-29 2019-07-04 Futurewei Technologies, Inc. Session management for communications between a device and a dtls server
US11381999B2 (en) * 2019-05-10 2022-07-05 Qualcomm Incorporated Multi-link aggregation link management

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050026597A1 (en) * 2003-08-01 2005-02-03 Samsung Electronics Co., Ltd. Method for retransmitting a radio resource control connection request message in mobile communication system capable of providing a multimedia broadcast/multicast service
US20080165709A1 (en) * 2007-01-05 2008-07-10 Soliman Samir S Method and apparatus for supporting communication in pico networks
US20150105113A1 (en) * 2012-04-09 2015-04-16 Lg Electronics Inc. Method for d2d terminal transmitting and receiving data in wireless communication system supporting device-to-device communication

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010037453A1 (en) * 1998-03-06 2001-11-01 Mitty Todd Jay Secure electronic transactions using a trusted intermediary with non-repudiation of receipt and contents of message
FI107487B (en) * 1999-03-08 2001-08-15 Nokia Mobile Phones Ltd Procedure for encrypting data transmission in a radio system
US6532220B1 (en) * 1999-08-27 2003-03-11 Tachyon, Inc. System and method for efficient channel assignment
JP4839554B2 (en) * 2000-10-19 2011-12-21 ソニー株式会社 Wireless communication system, client device, server device, and wireless communication method
US7227951B2 (en) * 2001-11-06 2007-06-05 Ntt Docomo, Inc. Enhanced ANSI X9.17 pseudorandom number generators with forward security
US20060031936A1 (en) * 2002-04-04 2006-02-09 Enterasys Networks, Inc. Encryption security in a network system
US7720485B2 (en) * 2006-07-14 2010-05-18 Qualcomm Incorporated Methods and apparatus related to assignment in a wireless communications system
US7839824B2 (en) * 2007-07-31 2010-11-23 Beceem Communications Inc. Allocation of periodically distributed frames of wireless communication
US8442432B2 (en) * 2008-11-10 2013-05-14 Viasat, Inc. Terminal mode assignment for a satellite communications system
WO2010148022A1 (en) * 2009-06-16 2010-12-23 Viasat, Inc. Dynamic bandwidth resource allocation for satellite downlinks
US8315224B2 (en) * 2010-01-22 2012-11-20 General Electric Company Methods and systems for reuse of radio resources in medical telemetry networks
US8422448B2 (en) * 2010-08-09 2013-04-16 Alcatel Lucent Group call control in a wireless broadband communication network
US8982842B2 (en) * 2012-11-16 2015-03-17 Tektronix, Inc. Monitoring 3G/4G handovers in telecommunication networks
US9391953B2 (en) * 2014-07-23 2016-07-12 Motorola Solutions, Inc. Method, device, and system for notifying mobile stations participating in a non-LLE call of new LLE call

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050026597A1 (en) * 2003-08-01 2005-02-03 Samsung Electronics Co., Ltd. Method for retransmitting a radio resource control connection request message in mobile communication system capable of providing a multimedia broadcast/multicast service
US20080165709A1 (en) * 2007-01-05 2008-07-10 Soliman Samir S Method and apparatus for supporting communication in pico networks
US20150105113A1 (en) * 2012-04-09 2015-04-16 Lg Electronics Inc. Method for d2d terminal transmitting and receiving data in wireless communication system supporting device-to-device communication

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20240072920A1 (en) * 2022-08-30 2024-02-29 Texas Instruments Incorporated Optimizing node location in a battery management system
US12155462B2 (en) * 2022-08-30 2024-11-26 Texas Instruments Incorporated Optimizing node location in a battery management system

Also Published As

Publication number Publication date
US9788198B2 (en) 2017-10-10
US20160044503A1 (en) 2016-02-11

Similar Documents

Publication Publication Date Title
KR102519409B1 (en) Method and Apparatus for Multipath Media Delivery
US20150326524A1 (en) Address resolution in software-defined networks
US10212213B1 (en) Techniques for managing a remote web client from an application on a mobile device
CN112261094B (en) Message processing method and proxy server
US20170048904A1 (en) Wireless Data Transmission System
CN111567011B (en) Method for improving QoE of video service and web service using cross-layer information
US11516302B2 (en) Network service discovery
Tomar et al. Cmt-sctp and mptcp multipath transport protocols: A comprehensive review
US9781156B2 (en) Detection and mitigation of denial-of-service attacks in wireless communication networks
US20160044682A1 (en) Radio Transmitter Identification and Congestion Control
US10812484B2 (en) Leak-proof classification for an application session
CN114338574A (en) Instant messaging method, management node and system
US10887641B2 (en) Techniques to dynamically configure a sender bitrate for streaming media connections
US9438439B2 (en) Dynamic optimization of advertisement packets
US20140282788A1 (en) System for controlling video distribution in response to a request on reduced video data traffic and a method therefor
CN107645570A (en) Client loading method and device
CN117579903A (en) Data flow control method, device, electronic device and storage medium
US20180183719A1 (en) Method and device for data transmission
CN103916489A (en) Method and system for resolving single-domain-name multi-IP domain name
US11595432B1 (en) Inter-cloud attack prevention and notification
US20150256637A1 (en) Terminal, message distribution system, message distribution method, and computer-readable medium
US10469378B2 (en) Protocol to query for historical network information in a content centric network
US9071954B2 (en) Wireless optimized content delivery network
WO2016039671A2 (en) Aggregate energy consumption across a network
US9667728B2 (en) Controller offloading

Legal Events

Date Code Title Description
AS Assignment

Owner name: SIGNAL LABORATORIES, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:DJAKOVIC, VLADAN;BRINTON, JOEL DANIEL;VIVALDI MORSE, BENJAMIN JOSEPH;SIGNING DATES FROM 20160429 TO 20160518;REEL/FRAME:038768/0762

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION