System, method, and base station using different security protocols on wired and wireless portions of network
DC CAFCFirst Claim
1. A method comprising:
- receiving a first packet from a wired data network in a wireless base station that is coupled to the wired data network, wherein the first packet is protected according to a first security protocol on the wired data network, and wherein a target device of the first packet communicates with a source of the first packet, at least in part, over a wireless network on which the wireless base station communicates;
processing the first packet in the wireless base station according to the first security protocol;
determining that the first packet is targeted at the target device, wherein the determining is performed by the wireless base station, and wherein the first packet comprises a header coded with address information identifying the target device; and
applying a second security protocol employed on the wireless network to the first packet, wherein the second security protocol is different from the first security protocol, and wherein the applying is performed in the wireless base station.
12 Assignments
Litigations
1 Petition
Accused Products
Abstract
A method for providing quality of service (QoS) aware, wireless point to multi-point telecommunications in a telecommunications system. The telecommunications system includes: a wireless base station coupled to a first data network; one or more host workstations coupled to the first data network; one or more subscriber customer premise equipment (CPE) stations in wireless communications with the wireless base station over a shared bandwidth using a packet-centric protocol; one or more subscriber workstations coupled to each of the subscriber CPE stations over a second network. The method includes allocating shared bandwidth among the subscriber CPE stations in a manner to optimize end-user QoS. The method includes analyzing and scheduling IP flows over the shared wireless bandwidth. This includes identifying the IP flows; characterizing the IP flows; classifying the IP flows; and prioritizing the IP flows.
-
Citations
23 Claims
-
1. A method comprising:
-
receiving a first packet from a wired data network in a wireless base station that is coupled to the wired data network, wherein the first packet is protected according to a first security protocol on the wired data network, and wherein a target device of the first packet communicates with a source of the first packet, at least in part, over a wireless network on which the wireless base station communicates; processing the first packet in the wireless base station according to the first security protocol; determining that the first packet is targeted at the target device, wherein the determining is performed by the wireless base station, and wherein the first packet comprises a header coded with address information identifying the target device; and applying a second security protocol employed on the wireless network to the first packet, wherein the second security protocol is different from the first security protocol, and wherein the applying is performed in the wireless base station. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A base station comprising:
-
a first interface configured to couple to a wired data network in use; a second interface configured to transmit and receive on a wireless network in use; and a controller coupled to the first interface and the second interface, wherein the controller is configured to process a first packet received by the first interface, wherein the controller is configured to process the first packet according to a first security protocol on the wired data network, wherein a target device of the first packet communicates with a source of the first packet, at least in part, over the wireless network, and wherein the first packet comprises a header coded with address information identifying the target device, wherein the controller is configured to determine that the first packet is targeted at the target device, and wherein the controller is configured to apply a second security protocol employed on the wireless network to the first packet, wherein the second security protocol is different from the first security protocol. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A system comprising:
-
one or more hosts coupled to a wired data network; a base station coupled to the wired data network and configured to communicate on a wireless network, wherein the base station is configured to process a first packet received from the wired data network, wherein the base station is configured to process the first packet according to a first security protocol implemented on the wired data network, wherein a target device communicates with a source of the first packet, at least in part, over the wireless network, and wherein the first packet comprises a header coded with address information identifying the target device, and wherein the base station is configured to determine that the first packet is targeted at the target device, and wherein the base station is configured to apply a second security protocol employed on the wireless network to the first packet, wherein the second security protocol is different from the first security protocol. - View Dependent Claims (19, 20, 21, 22, 23)
-
Specification