Transferring Identifier information in a telecommunications system
First Claim
1. A method of transporting a protocol data unit (PDU) from a sender to an intended receiver in a telecommunications network comprising the steps of:
- at the sender, generating a PDU containing a data word;
encoding said data word as a function of a first identification vector without increasing the bandwidth required to transport said PDU from the sender to the receiver, wherein said first identification vector comprises a priori identification information relating to the sender and the intended receiver; and
transmitting a data frame that includes said PDU from the sender to a plurality of receivers.
12 Assignments
0 Petitions
Accused Products
Abstract
In a wireless telecommunications network, transporting identification information, such as access point identifier (AP ID) and wireless terminal identifier (WT ID) information, in each uplink and each downlink protocol data unit (PDU) being transmitted between a sender and a receiver, without increasing bandwidth requirements. This is accomplished by modifying each PDU as a function of a first identification vector, prior to transmission, wherein the first identification vector reflects, for example, the AP ID and the corresponding WT ID. At the receiver, the PDU is re-modified as a function of a second identification vector, wherein the second identification vector reflects an expected AP ID and WT ID. If the receiver is the intended recipient of the PDU, the first and second identification vectors will be the same, and the process of re-modifying the PDU merely serves to restore the original value of the PDU. The receiver can detect whether the original value of the PDU has been restored through a data integrity check, for example, one which employs a cyclic redundancy code (CRC). The result can then be used to determine whether the receiver is, in fact, the intended receiver, and whether the receiver should decode the PDU or discard it.
151 Citations
39 Claims
-
1. A method of transporting a protocol data unit (PDU) from a sender to an intended receiver in a telecommunications network comprising the steps of:
-
at the sender, generating a PDU containing a data word;
encoding said data word as a function of a first identification vector without increasing the bandwidth required to transport said PDU from the sender to the receiver, wherein said first identification vector comprises a priori identification information relating to the sender and the intended receiver; and
transmitting a data frame that includes said PDU from the sender to a plurality of receivers. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
XORing said data word and said first identification vector.
-
-
3. The method of claim 1, wherein said data word comprises a user data vector and an error detection and correction code vector.
-
4. The method of claim 3, wherein said error detection and correction code vector is a cyclic redundancy code (CRC) vector, and wherein said method further comprises the steps of:
-
generating said CRC vector as a function of said user data vector; and
generating said data word by appending said CRC vector to said user data vector.
-
-
5. The method of claim 4, wherein said first identification vector comprises a first portion and a second portion, said first portion containing said identification information relating to the sender and the intended receiver and said first portion being less than or equal in length to said CRC vector, said second portion containing a number of bits which are set equal to zero and said second portion being equal in length to said user data vector.
-
6. The method of claim 5, wherein said first portion contains a network address of the sender and the intended receiver.
-
7. The method of claim 3, wherein said error detection and error correction code is a Reed Solomon code vector.
-
8. The method of claim 1, wherein said identification information relating to the sender and the intended receiver comprises an address associated with the sender and an address associated with the intended receiver.
-
9. The method of claim 1, wherein said step of transmitting said data frame that includes said PDU from the sender to a plurality of receivers comprises the step of:
transmitting said data frame and said PDU in accordance with an asynchronous transfer mode (ATM) protocol.
-
10. The method of claim 9, wherein said identification information relating to the sender and the intended receiver comprises a connection identifier code.
-
11. The method of claim 9, wherein said identification information relating to the sender and the intended receiver comprises a packet sequence number.
-
12. The method of claim 1 further comprising the steps of:
-
at a receiver, decoding said encoded data word as a function of a second identification vector;
wherein said second identification vector comprises identification information relating to the receiver and an expected sender;
verifying the integrity of said decoded data word as a function of said user data vector and said CRC vector; and
determining whether the receiver is the intended receiver of the PDU based on the result of the decoded data word integrity verification.
-
-
13. The method of claim 12, wherein said step of decoding said encoded data word as a function of said second identification vector comprises the step of:
XORing said encoded data word with said second identification vector.
-
14. The method of claim 12, wherein said first and said second identification vectors are defined such that the step of encoding said data word as a function of said first identification vector and said step of decoding said encoded data word as a function of said second identification vector do not induce in said decoded data word a number of bit errors which exceeds a number of errors that can be detected during said step of verifying the integrity of said decoded data word as a function of said user data vector and said CRC vector.
-
15. The method of claim 14, wherein said first and said second identification vectors comprise a sequence of bits having a length L, wherein the length L is equal to the length of said data word, and wherein exactly two bit positions are set equal to “
- 1” and
the remaining L-2 bit positions are set equal to “
0”
.
- 1” and
-
16. The method of claim 14, wherein said first and said second identification vectors comprise a sequence of bits having a length L, wherein the length L is equal to the length of said data word, and wherein a first bit position is set equal to either “
- 1”
or “
0” and
exactly one of the remaining L-1 bit positions is set equal to “
1”
.
- 1”
-
17. The method of claim 14, wherein said first and said second identification vectors comprise a sequence of bits having a length L, wherein the length L is equal to the length of said data word, and wherein a first bit position is set equal to either “
- 1”
or “
0” and
exactly two of the remaining L-1 bit positions are set equal to “
1”
.
- 1”
-
18. The method of claim 1 further comprising the step of:
selecting said first identifier code as a function of said identification information relating to the sender and the intended receiver, from amongst a plurality of identifier codes stored in a lookup table, wherein said plurality of identifier codes were generated by an algorithm.
-
19. The method of claim 1, wherein said data frame comprises a broadcast data field and a plurality of PDUs, and wherein said broadcast data field includes a list of the plurality of PDUs and information relating to the intended receiver of each of said plurality of PDUs.
-
20. The method of claim 19 further comprising the steps of:
-
at a receiver, decoding the data words associated with each of said plurality of PDUs as a function of each of a plurality of second identification vectors which are derived from said list in said broadcast data field and the information relating to the intended receiver of each of said plurality of PDUs;
verifying the integrity of said decoded data words as a function of the user data vectors and CRC vectors associated with each data word; and
verifying the integrity of said broadcast data field based on the data integrity verification of said decoded data words.
-
-
21. The method of claim 20, wherein said step of verifying the integrity of said broadcast data field comprises the step of:
comparing a number of PDUs which fail the integrity verification with a predefined number of PDU integrity verification failures.
-
22. A method for determining whether a receiver is an intended receiver of a protocol data unit (PDU) transmitted to the receiver from a sender in a telecommunications network, said method comprising the steps of:
-
receiving said PDU, wherein said PDU comprises a user data vector and a cyclic redundancy code (CRC) vector, and wherein said user data vector and said CRC vector have been modified at the sender, without increasing the bandwidth required to transmit the PDU from the sender to the intended receiver, as a function of a first identification vector which contains identification information relating to the sender and the intended receiver;
re-modifying said user data vector and said CRC vector as a function of a second identification vector which contains identification information relating to the receiver and an expected sender;
verifying the integrity of said PDU as a function of said re-modified user data vector and said re-modified CRC vector; and
determining whether the receiver is the intended receiver based on the result of the PDU integrity verification. - View Dependent Claims (23, 24, 25, 26, 27)
dividing a CRC generator polynomial into said re-modified user data vector using modulus-2 division.
-
-
24. The method of claim 23, wherein said step of determining whether the receiver is the intended receiver comprises the steps of:
-
determining whether the modulus-2 division resulted in a zero remainder; and
if the modulus-2 division did result in a zero remainder, determining that the receiver is the intended receiver.
-
-
25. The method of claim 24, wherein said first and said second identification vectors are equivalent if the receiver is the intended receiver.
-
26. The method of claim 23, wherein said step of determining whether the receiver is the intended receiver comprises the steps of:
-
determining whether the modulus-2 division resulted in a non-zero remainder; and
if the modulus-2 division did result in a non-zero remainder, determining that the receiver is not the intended receiver.
-
-
27. The method of claim 26 further comprising said step of:
discarding said PDU if it is determined that the receiver is not the intended receiver.
-
28. A method of transporting a protocol data unit (PDU) from a sender to an intended receiver in a telecommunications network, wherein said PDU contains a user data vector, said method comprising the steps of:
-
appending a first identification vector to said user data vector;
generating a cyclic redundancy code (CRC) vector based on said user data vector and said appended, first identification vector;
appending said CRC vector to said user data vector;
removing said appended, first identification vector from said user data vector; and
transmitting said PDU, including said user data vector and said appended CRC vector. - View Dependent Claims (29, 30, 31, 32, 33, 34)
generating control data to be transmitted prior to said PDU, wherein said control data defines said network address.
-
-
31. The method of claim 30, wherein said control data defines said network address is an access point identifier code.
-
32. The method of claim 30, wherein said control data defines said network address is a wireless terminal identifier code.
-
33. The method of claim 30, wherein said control data defines said network address is an access point identifier code and a wireless terminal identifier code.
-
34. The method of claim 28 further comprising the steps of:
-
at a receiver, appending a second identification vector to said user data vector;
generating a CRC generator polynomial from said CRC vector;
verifying the integrity of said PDU by dividing said CRC generator polynomial into said user data vector and said appended, second identification vector; and
determining whether the receiver is the intended receiver based on the result of the PDU integrity verification.
-
-
35. In a telecommunications network, a method of determining whether a receiver is an intended receiver of a protocol data unit (PDU) transmitted from a sender, wherein said PDU comprises a user data vector and a cyclic redundancy code (CRC) vector, and wherein said CRC vector was derived at the sender as a function of said user data vector and a first identification vector that was appended to said user data vector only for the purpose of deriving said CRC vector, said method comprising the steps of:
-
at the receiver, generating a CRC generator polynomial based on said CRC vector;
appending a second identification vector to said user data vector;
dividing said CRC generator polynomial into a data word comprising said user data vector and said appended, second identification vector;
determining whether the receiver is the intended receiver based on the result of the division. - View Dependent Claims (36, 37, 38, 39)
determining whether the division resulted in a zero remainder; and
if the division did result in a zero remainder, determining that the receiver is the intended receiver.
-
-
38. The method of claim 35, wherein said step of determining whether the receiver is the intended receiver comprises the step of:
-
determining whether the division resulted in a non-zero remainder; and
if the division did result in a non-zero remainder, determining that the receiver is not the intended receiver.
-
-
39. The method of claim 38 further comprising said step of:
discarding said PDU if it is determined that the receiver is not the intended receiver.
Specification