Abstract:
As part of the normal crawling process, a crawler parses a page and computes a de-tagged hash, called a fingerprint, of the page content. A lookup structure consisting of the host hash (hash of the host portion of the URL) and the fingerprint of the page is maintained. Before the crawler writes a page to a store, this lookup structure is consulted. If the lookup structure already contains the tuple (i.e., host hash and fingerprint), then the page is not written to the store. Thus, a lot of duplicates are eliminated at the crawler itself, saving CPU and disk cycles which would otherwise be needed during current duplicate elimination processes.
Abstract:
Methods and systems to facilitate mobility of devices between WWAN and WLAN systems/domains are described herein. A mobile station is registered with a preferred system/domain and a non-preferred system/domain and uses one or more public identities and one or more associated private identities to perform registrations over the preferred and non-preferred systems/domains. One or more of the associated systems/domains are further monitored for a paging signal transmitted over the network. In response to the paging signal, the mobile station transmits a paging response signal over the system/domain that facilitated transmission of the paging signal.
Abstract:
A method of coordinating broadcast parameter settings enables autonomous soft handoff by a mobile station. Any base station can initiate a broadcast parameter coordination process. The initiating base station assumes the role of an arbitrator and is responsible for determining the broadcast parameters. The broadcast parameter coordination process does not require any intervention or involvement by the PDSN or any signaling with the mobile station, except to inform the mobile station of the soft handoff sectors after the broadcast parameter coordination process is completed. The list of soft handoff sectors may be sent to the mobile station in a common overhead message.
Abstract:
Techniques for performing WLAN system scanning and selection are described. A terminal performs multiple iterations of scan to detect for WLAN systems. A scan list containing at least one WLAN system to detect for is initially determined. For each scan iteration, a scan type may be selected from among the supported scan types. The selected scan type may indicate passive scan or active scan, frequency channels to scan, etc. A scan may be performed based on the selected scan type. Signal strength measurements are obtained for access points received during the scan and used to identify detected access points. After all scan iterations are completed, candidates access points are identified based on the scan results, e.g., based on the signal strength measurements for the detected access points and a detection threshold. The best candidate access point may be selected for association by the terminal.
Abstract:
Techniques to configure quality of service (QoS) for communication are described. An access terminal configures a first QoS profile prior to a call. This QoS profile is for a set of QoS parameters that provides certain QoS. The access terminal thereafter establishes (e.g., originates or terminates) a call with an access network. If the first QoS profile is appropriate for the call, then QoS is not reconfigured. However, the access terminal may determine that a second QoS profile is to be used for the call, e.g., based on a format or a rate set supported by a remote/other terminal for the call. The access terminal would then configure the second QoS profile during the call. The access terminal may exchange data in accordance with (a) the first QoS profile before the second QoS profile is configured and activated and (b) the second QoS profile after it is configured and activated.
Abstract:
A mobile communication network includes a plurality of access nodes that can serve different roles in support of a communication session with a mobile station. An access node can serve as a connecting node that receives access requests the mobile station, as an anchor node to anchor a radio packet connection with a core network for the communication session; or as a primary node to store session information for the communication session. One or more monitoring entities monitor the availability of the access nodes and broadcast notification messages to other access nodes when an access node failure is detected. The broadcast message includes the identity of the failed access node. Other access nodes may take action to restore connections and recover session information maintained by the failed access node.
Abstract:
An approach to controlling packet forwarding in a wireless communications system that helps limit the burden placed on internal communication links while maintaining some or all of the advantages of diversity gain on the reverse link. A primary base station sends its peers a forwarding control message if a packet is successfully received. If the forwarding control message is received at the peer base stations before a timer elapses, the peer base stations refrain from forwarding their versions of the packet to the call anchor. The timer's duration may be varied as appropriate, and the forwarding control message process may be bypassed for small packets and/or certain application types.
Abstract:
A wireless communication network uses a shared packet data channel to broadcast information intended for all or a subset of the mobile stations monitoring the shared channel, based on using an associated packet data control channel to identify which shared channel transmissions comprise broadcast information rather than mobile-specific packet data traffic. For example, in a 1xEV-DV wireless communication network, a base station system can be configured to send broadcast messages on a Forward Packet Data Channel (F-PDCH) based on identifying those broadcasts via an associated Forward Packet Data Control Channel (F-PDCCH). In one such embodiment, one or more Medium Access Control (MAC) IDs are designated as broadcast identifiers. Thus, the receipt of a broadcast MAC ID in one or more timeslots of the F-PDCCH by a mobile station indicates to that mobile station that the corresponding timeslot(s) on the F-PDCH carry broadcast information rather than mobile-specific packet data traffic.
Abstract:
Noise is measured at one or more base stations in a mobile communication system during periodic silence periods. A periodic silence period is defined for at least one carrier that is independent of reverse link channel frame boundaries. The radio base stations transmits silence parameters defining the periodic silence period to mobile stations, which stop transmitting during the periodic silence periods. A time reference is provided to the mobile stations to synchronize the silence periods for all mobile stations.
Abstract:
Techniques to configure quality of service (QoS) and utilize radio resources for a call in a WLAN are described. In an aspect, a station ensures that an access point in the WLAN is suitable for receiving service prior to performing registration to receive services via the WLAN. In another aspect, the station first requests for radio resources for traffic flows, then requests for radio resources for signaling flows, and sends signaling as best effort traffic if radio resources are not granted for the signaling flows. In yet another aspect, the station aggregates QoS for multiple applications and requests for radio resources based on the aggregated QoS. In yet another aspect, the station releases extra radio resources corresponding to the difference between the QoS granted by the WLAN and the QoS proposed by a remote terminal for the call. In yet another aspect, the station requests for the same QoS or lower from a new access point during handoff.