Abstract:
A switching and management infrastructure of a mobile communications network is connected to a gateway node by a standard interface initially defined to be used in an other packet-mode communication network, in order to provide a packet-mode connection to an external communication network. As a consequence, the protocols and signaling messages already defined and developed for this standard interface can be used for activating, deactivating and updating a logical packet data context between the infrastructure and the gateway packet node as well as to tunnel data packets therebetween. Also standard gateway packet node and all the existing interworking function thereof can be used for providing packet data services and interworking for the mobile network. Thereby the need for developing and defining a special packet data routing and interworking for the mobile network will be avoided or minimized. On the other hand, the packet data services and protocols as well as the mobility management already developed for the switching and management infrastructure can be utilized.
Abstract:
A method for improved application of unreliable transfer mechanisms. An application uses application data delivered in data packets that become accessible from a peer entity via at least two packet data transmission mechanisms. The application is configured with a predefined operational range for a predefined application-specific characteristic. If the predefined application-specific characteristic exceeds the predefined operational range, the packet data transmission mechanism is changed. The mechanism facilitates maintaining an application-specific service level even if unreliable transmission mechanisms are applied.
Abstract:
A recovery scheme where a base station monitors state of interoperation with a primary exchange. When the primary exchange becomes unavailable, active services may be lost, but the base station sends an activation request message to a secondary exchange that has access to base station configuration information of the base station. The secondary exchange uses the base station configuration information to activate the base station, and user terminals in the base station cell may begin to registrate to the system. Recovery capability of communications can be achieved with optimized use of network resources.
Abstract:
A method for improved application of unreliable transfer mechanisms. An application uses application data delivered in data packets that become accessible from a peer entity via at least two packet data transmission mechanisms. The application is configured with a predefined operational range for a predefined application-specific characteristic. If the predefined application-specific characteristic exceeds the predefined operational range, the packet data transmission mechanism is changed. The mechanism facilitates maintaining an application-specific service level even if unreliable transmission mechanisms are applied.
Abstract:
A recovery scheme where a base station monitors state of interoperation with a primary exchange. When the primary exchange becomes unavailable, active services may be lost, but the base station sends an activation request message to a secondary exchange that has access to base station configuration information of the base station. The secondary exchange uses the base station configuration information to activate the base station, and user terminals in the base station cell may begin to registrate to the system. Recovery capability of communications can be achieved with optimised use of network resources.
Abstract:
An information system that comprises a data source that transmits a data item to a group of database instances using a packet-switched communication protocol in which retransmission of the data item to a data base instance is independent from reception of an acknowledgement to the transmitted data item from the database instance. Adatabase instance receives the data item from the data source, stores it as a present data item and opens access to the present data item. A data consumer queries information on the present data item from the database instance and is provided with means to detect whether the information included in a response to the query is valid or not. If the information is not valid, the data consumer initiates a new query from another destination.