摘要:
The method includes storing a gateway tunnel identifier, a base station identifier and a base station tunnel identifier; receiving, by the base station, a service request message from a device; establishing, by the base station, a radio bearer between the base station and the device in response to the service request message; receiving, by the base station, one or more first uplink data packets from the device using the radio bearer; modifying, by the base station, the one or more first uplink data packets such that the one or more first uplink data packets include the gateway tunnel identifier, the base station identifier and the base station tunnel identifier; and sending, by the base station, the modified uplink data packet to a gateway.
摘要:
Automated secure registration techniques for communication devices are provided which address the problem of allowing multiple clients to gain access to one system, and thus provide a solution to the “reverse single sign-on” problem. For example, a method for registering a group of two or more communication devices in a communication network comprises the following steps. A group challenge message is sent from a network device to the group of two or more communication devices. The network device receives one or more response messages to the group challenge respectively from one or more of the group of two or more communication devices, wherein the response message from each of the responding communication devices in the group comprises a group credential corresponding to the group.
摘要:
A method and system for selecting at a terminal at least one of a plurality of available access networks for use with a wireless application invoked at the terminal according preferences associated with the wireless application, the network service provider, the subscriber, the subscriber subscription and application content provider. The selection may be constrained by an Application Policy received from a network service provider.
摘要:
In one embodiment, the method for allocating resources in a wireless system supporting a first radio access technology (RAT) and a second RAT operating in a narrower frequency band than the first RAT includes assigning at least one physical resource block (PRB) of a plurality of PRBs of the frequency band to the second RAT. The method further includes transmitting, in a first sector, over the at least one assigned PRB using the second RAT. The method further includes transmitting, in the first sector, control signals on unassigned PRBs using the first RAT.
摘要:
Methods of reverse link power control are provided. In a first example reverse link power control process, a signal-to-interference+noise (SINR) is measured for a plurality of mobile stations. A power control adjustment is determined for each of the mobile stations based on the measured SINR for the mobile station and a fixed target SINR, the fixed target SINR being used in the determining step for each mobile station and sending the power control adjustments to the mobile stations. In a second example reverse link power control process, one or more signals are transmitted to a base station. A power control adjustment indicator indicating an adjustment to a transmission power level is received. The received power control adjustment is determined based on a measured signal-to-interference+noise ratio (SINR) for the one or more transmitted signals and a fixed target SINR threshold, the fixed target SINR threshold being used for power control adjustment of a plurality of mobile stations.
摘要:
The invention includes a method and apparatus for creating a base station neighbor list at a target base station in a wireless network including a plurality of base stations. A method includes obtaining information for creating the base station neighbor list, creating the base station neighbor list using the obtained information, and storing the base station neighbor list. The obtained information includes at least one of geographic locations of ones of the base stations, network status information associated with the wireless network, and pilot signal strength measurement feedback information. The base station neighbor list includes a subset of the base stations of the network. The base stations of the base station neighbor list may be prioritized using at least a portion of the obtained information. The base station neighbor list may be updated periodically, or in response to changes to the obtained information. The base station neighbor list is distributed from the base station to wireless user devices served by the base station for use by the wireless user devices in making handoff decisions.
摘要:
An active session mobility solution for point-to-point protocol (PPP) in accordance with the present invention provides fast and smooth handoff by reducing tunneling overhead on tunneling mechanisms, such as P-P tunneling from a serving Source (e.g., a PPP termination device) to a new serving Target (e.g., a PPP termination device). In the active session mobility solution of the present invention, PPP session can be migrated even if not all phases have been completed (e.g., LCP, PAP/CHAP completed but not IPCP and CCP). In such cases, the incomplete phases will be negotiated at the PPP of the Target PPP.
摘要:
An automated security provisioning protocol is provided for wide area network communication devices in an open device environment, such as cellular communication devices in a machine-to-machine (M2M) environment. For example, a method for performing a security provisioning protocol between a first communication device and a second communication device over at least one wide area communication network comprises the following steps from the perspective of the first communication device. The first communication device automatically uses access information not previously provisioned in the wide area communication network to gain access to the wide area communication network for an initial purpose of communicating with the second communication device. The first communication device, upon gaining access to the wide area communication network, automatically performs an authenticated key exchange operation with the second communication device over the wide area communication network and establishes a secure communication key as a result of the authenticated key exchange operation for subsequent use by the first communication device for secure communications. The wide area communication network is operated by a first entity and the second communication device is operated by a second entity.
摘要:
A wireless communication network (20) utilizes a hard handoff procedure for switching between cells serving a mobile station (40). In a disclosed example, the existing link between the mobile station (40) and a serving base station (38) is not released until a new link between a target base station (32) and a mobile station (40) is established. At the same time, however, the mobile station maintains only one base station or link within its active set at all times. The disclosed example is useful for dedicated channel and shared channel communications in CDMA systems, for example.
摘要:
A medium-access-control (MAC) scheduler, according to one embodiment of which a station of a wireless network evaluates data throughputs corresponding to three different transmission configurations for transmission of a packet over a first of that station's wireless links. The first and second of those transmission configurations have the packet encoded in the first and second tiers, respectively, of a two-tier signal. The third transmission configuration has the packet encoded as a conventional single-tier signal. For each of the first and second transmission configurations, the station selects a second of that station's wireless links for transmission of at least a second packet, with the first and second packets encoded in different respective tiers of the two-tier signal. The station varies power allocation between the first and second tiers to optimize data throughput for each of the first and second transmission configurations and selects from the first, second, and third transmission configurations one resulting in the highest data throughput.