Abstract:
Noise is measured at one or more base stations in a mobile communication system during periodic silence periods. A periodic silence period is defined for at least one carrier that is independent of reverse link channel frame boundaries. The radio base stations transmits silence parameters defining the periodic silence period to mobile stations, which stop transmitting during the periodic silence periods. A time reference is provided to the mobile stations to synchronize the silence periods for all mobile stations.
Abstract:
Provisioning and access control for communication nodes involves assigning identifiers to sets of nodes where the identifiers may be used to control access to restricted access nodes that provide certain services only to certain defined sets of nodes. In some aspects provisioning a node may involve providing a unique identifier for sets of one or more nodes such as restricted access points and access terminals that are authorized to receive service from the restricted access points. Access control may be provided by operation of a restricted access point and/or a network node. In some aspects, provisioning a node involves providing a preferred roaming list for the node. In some aspects, a node may be provisioned with a preferred roaming list through the use of a bootstrap beacon.
Abstract:
Provisioning and access control for communication nodes involves assigning identifiers to sets of nodes where the identifiers may be used to control access to restricted access nodes that provide certain services only to certain defined sets of nodes. In some aspects provisioning a node may involve providing a unique identifier for sets of one or more nodes such as restricted access points and access terminals that are authorized to receive service from the restricted access points. Access control may be provided by operation of a restricted access point and/or a network node. In some aspects, provisioning a node involves providing a preferred roaming list for the node. In some aspects, a node may be provisioned with a preferred roaming list through the use of a bootstrap beacon.
Abstract:
Providing for distributed access point management for access to a mobile network is described herein. By way of example, an interface application maintained at a Femto cell base station (BS) can facilitate initial power up and/or acquisition for a Femto user terminal (UT). Upon start-up, a bootstrap process is utilized by the Femto cell to provision the UT with an SDL establishing at least one BS as high priority within a particular geographic area (GEO). Thus, when the Femto UT is within the GEO, the UT is more likely to acquire, camp on and/or handoff to the preferred BS. When outside the GEO, a serving access point can provision the Femto UT OTA with a custom SDL suited to another GEO having a different high priority access point. By implementing access point management at distributed access points, expensive network equipment can be mitigated or avoided.
Abstract translation:这里描述了用于访问移动网络的分布式接入点管理。 作为示例,维持在毫微微小区基站(BS)的接口应用可以有助于对于毫微微用户终端(UT)的初始加电和/或获取。 在启动时,毫微微小区利用自举进程来向UT提供在特定地理区域(GEO)内建立至少一个BS作为高优先级的SDL。 因此,当毫微微UT在GEO内时,UT更有可能获得,驻留和/或切换到首选BS。 在GEO外部,服务接入点可以为Femto UT OTA提供适合具有不同高优先级接入点的另一个GEO的自定义SDL。 通过在分布式接入点实现接入点管理,可以减轻或避免昂贵的网络设备。
Abstract:
Techniques for performing system selection based on requirements and preferences of applications are described. A terminal maintains a policy table containing applications supported by the terminal, priorities of the applications, radio technologies that can be used for each application, and priorities of the radio technologies for each application. The terminal manages policies associated with the supported applications and radio technologies, determines the most suitable radio technology for each application, and activates and deactivates radio technologies in response to events, e.g., the terminal being turned on, a call being placed, the terminal leaving the coverage of a radio technology, etc.
Abstract:
Systems and methodologies are described that effectuate establishment of an IPSec tunnel for utilization in a wireless communication environment. IPSec establishment procedures on home base stations can be used to establish IPSec tunnels between home base stations situated on open access sectors of wireless communication environments and packet data interworking function components positioned at the contiguity of secured segments of the wireless communication environments. Moreover, high rate packet data point-to-point protocol challenge-handshake authentication protocols can be directed through the IPSec tunnels to facilitate authentication of access terminals associated with the home base stations in order to facilitate further communications with components dispersed within secure areas of wireless communication environments. Further, international mobile subscriber identities (IMSI) affiliated with access terminals associated with home base stations can be used to identify packet data serving nodes with which to establish communications between home base stations and packet data serving nodes.
Abstract:
Disclosed is a method of retrieving constant values. The method comprises compiling key-value pairs into a unified regular expression, evaluating the unified regular expression against a transformed input string to match a particular key and extracting the constant value associated with that particular key. The input string in transformed by linking different tags associated with each key-value pair in the unified regular expression into a single linked tag and linking the single linked tag to the input string. Additionally, the method provides for associating the constant value in each key-value pair with an un-fixed key (i.e., a unique regular expression) as opposed to a fixed key, so that different input strings can be matched to the same key.
Abstract:
A wireless communication network limits the service areas within the network by transmitting time registration flag information in each of a plurality of network service areas. The flag information indicates whether registration for a given broadcast service currently is required for mobile stations in the service area that desire access to the broadcast service. Thus, the transmitted flag information may be used to prompt for such registrations and detecting whether any registrations are timely received in response to such prompting permits the network to timely deactivate one or more broadcast services. Each service area controls one or more service zones, each of which may include multiple member service areas and, preferably, the network activates a requested broadcast service per service zone and deactivates that service per service area. The timing of such deactivations may be made compatible with mobile stations that do not recognize transmitted registration flag information.
Abstract:
In a method for managing quality of service (QoS) resources during handoff across communication systems having different grades of QoS awareness, an access terminal (AT) determines that handoff has occurred from a QoS unaware system to a QoS aware system. The AT also determines whether there are any allocated, unrequested QoS resources. If one or more allocated, unrequested QoS resources are identified, the AT requests that the QoS aware system release the one or more allocated, unrequested QoS resources. The AT also determines whether there are any requested, unallocated QoS resources. If one or more requested, unallocated QoS resources are identified, the AT requests that the QoS aware system allocate the one or more requested, unallocated QoS resources to the application.
Abstract:
A mobile communication network includes a plurality of access nodes that can serve different roles in support of a communication session with a mobile station. An access node can serve as a connecting node that receives access requests the mobile station, as an anchor node to anchor a radio packet connection with a core network for the communication session; or as a primary node to store session information for the communication session. One or more monitoring entities monitor the availability of the access nodes and broadcast notification messages to other access nodes when an access node failure is detected. The broadcast message includes the identity of the failed access node. Other access nodes may take action to restore connections and recover session information maintained by the failed access node.