Abstract:
Providing for distributed access point management for access to a mobile network is described herein. By way of example, an interface application maintained at a Femto cell base station (BS) can facilitate initial power up and/or acquisition for a Femto user terminal (UT). Upon start-up, a bootstrap process is utilized by the Femto cell to provision the UT with an SDL establishing at least one BS as high priority within a particular geographic area (GEO). Thus, when the Femto UT is within the GEO, the UT is more likely to acquire, camp on and/or handoff to the preferred BS. When outside the GEO, a serving access point can provision the Femto UT OTA with a custom SDL suited to another GEO having a different high priority access point. By implementing access point management at distributed access points, expensive network equipment can be mitigated or avoided.
Abstract translation:这里描述了用于访问移动网络的分布式接入点管理。 作为示例,维持在毫微微小区基站(BS)的接口应用可以有助于对于毫微微用户终端(UT)的初始加电和/或获取。 在启动时,毫微微小区利用自举进程来向UT提供在特定地理区域(GEO)内建立至少一个BS作为高优先级的SDL。 因此,当毫微微UT在GEO内时,UT更有可能获得,驻留和/或切换到首选BS。 在GEO外部,服务接入点可以为Femto UT OTA提供适合具有不同高优先级接入点的另一个GEO的自定义SDL。 通过在分布式接入点实现接入点管理,可以减轻或避免昂贵的网络设备。
Abstract:
Techniques for performing system selection based on requirements and preferences of applications are described. A terminal maintains a policy table containing applications supported by the terminal, priorities of the applications, radio technologies that can be used for each application, and priorities of the radio technologies for each application. The terminal manages policies associated with the supported applications and radio technologies, determines the most suitable radio technology for each application, and activates and deactivates radio technologies in response to events, e.g., the terminal being turned on, a call being placed, the terminal leaving the coverage of a radio technology, etc.
Abstract:
Systems and methodologies are described that effectuate establishment of an IPSec tunnel for utilization in a wireless communication environment. IPSec establishment procedures on home base stations can be used to establish IPSec tunnels between home base stations situated on open access sectors of wireless communication environments and packet data interworking function components positioned at the contiguity of secured segments of the wireless communication environments. Moreover, high rate packet data point-to-point protocol challenge-handshake authentication protocols can be directed through the IPSec tunnels to facilitate authentication of access terminals associated with the home base stations in order to facilitate further communications with components dispersed within secure areas of wireless communication environments. Further, international mobile subscriber identities (IMSI) affiliated with access terminals associated with home base stations can be used to identify packet data serving nodes with which to establish communications between home base stations and packet data serving nodes.
Abstract:
Disclosed is a method of retrieving constant values. The method comprises compiling key-value pairs into a unified regular expression, evaluating the unified regular expression against a transformed input string to match a particular key and extracting the constant value associated with that particular key. The input string in transformed by linking different tags associated with each key-value pair in the unified regular expression into a single linked tag and linking the single linked tag to the input string. Additionally, the method provides for associating the constant value in each key-value pair with an un-fixed key (i.e., a unique regular expression) as opposed to a fixed key, so that different input strings can be matched to the same key.
Abstract:
A wireless communication network limits the service areas within the network by transmitting time registration flag information in each of a plurality of network service areas. The flag information indicates whether registration for a given broadcast service currently is required for mobile stations in the service area that desire access to the broadcast service. Thus, the transmitted flag information may be used to prompt for such registrations and detecting whether any registrations are timely received in response to such prompting permits the network to timely deactivate one or more broadcast services. Each service area controls one or more service zones, each of which may include multiple member service areas and, preferably, the network activates a requested broadcast service per service zone and deactivates that service per service area. The timing of such deactivations may be made compatible with mobile stations that do not recognize transmitted registration flag information.
Abstract:
In a method for managing quality of service (QoS) resources during handoff across communication systems having different grades of QoS awareness, an access terminal (AT) determines that handoff has occurred from a QoS unaware system to a QoS aware system. The AT also determines whether there are any allocated, unrequested QoS resources. If one or more allocated, unrequested QoS resources are identified, the AT requests that the QoS aware system release the one or more allocated, unrequested QoS resources. The AT also determines whether there are any requested, unallocated QoS resources. If one or more requested, unallocated QoS resources are identified, the AT requests that the QoS aware system allocate the one or more requested, unallocated QoS resources to the application.
Abstract:
A mobile communication network includes a plurality of access nodes that can serve different roles in support of a communication session with a mobile station. An access node can serve as a connecting node that receives access requests the mobile station, as an anchor node to anchor a radio packet connection with a core network for the communication session; or as a primary node to store session information for the communication session. One or more monitoring entities monitor the availability of the access nodes and broadcast notification messages to other access nodes when an access node failure is detected. The broadcast message includes the identity of the failed access node. Other access nodes may take action to restore connections and recover session information maintained by the failed access node.
Abstract:
A mobile communication network includes a plurality of access nodes that can serve different roles in support of a communication session with a mobile station. An access node can serve as a connecting node that receives access requests the mobile station, as an anchor node to anchor a radio packet connection with a core network for the communication session; or as a primary node to store session information for the communication session. When the communication session is established, the anchor node for the communication session may select another access node to serve as the primary node. Session information can be stored at both the anchor node and primary node so that data can be delivered to the mobile station if either one of the anchor node and primary node are available.
Abstract:
In a mobile communication network, the call context for an active call is managed in a distributed manner following a cell change. When a mobile station migrates from one access node (AN) to another during the course of a call, the call state variables are transferred to the new serving AN. Additionally, a mapping table is transferred to the new serving AN indicating the location of buffered data. The mapping table reduces the amount of data that needs to be transferred to the new serving AN.
Abstract:
Disclosed is a method of retrieving constant values. The method comprises compiling key-value pairs into a unified regular expression, evaluating the unified regular expression against a transformed input string to match a particular key and extracting the constant value associated with that particular key. The input string in transformed by linking different tags associated with each key-value pair in the unified regular expression into a single linked tag and linking the single linked tag to the input string. Additionally, the method provides for associating the constant value in each key-value pair with an un-fixed key (i.e., a unique regular expression) as opposed to a fixed key, so that different input strings can be matched to the same key.