摘要:
The exemplary embodiments of the present invention relate to methods and apparatuses (800, 900) for facilitating reduction of interference in a network. According to exemplary embodiments, an apparatus acting as a first radio base station (macro or femto) (800, 900) is configured to acquire information including a scheduling scheme indicating information on how radio resources are allocated in second radio base station (femto or macro). The information is then used by a scheduler to allocate radio resources which are disjoint the radio resources already allocated by the scheduler of second radio base station.
摘要:
Embodiments of the present invention provide a method for determining throughput and data loss between a first network element of a telecommunications network and a second network element of that network. The first and second network elements may include, but are not limited to, a radio base station, a SAE-GW, an RNC, an SGSN or a GGSN, depending on the type of telecommunications network in which the method is employed. Data is exchanged between the first and second network elements in a manner that enables each of the first and second network elements to determine a true value of throughput and/or data loss for a communication link between the first and second network elements.
摘要:
A device associated with a transport network generates a first traceroute through the transport network, and monitors a performance measure associated with the transport network. The device also compares the performance measure to a criterion, and determines degradation in the transport network when the performance measure matches the criterion. The device further generates a second traceroute through the transport network when the degradation occurs in the transport network, where the first and second traceroutes are used to determine a source of the degradation in the transport network.
摘要:
The exemplary embodiments of the present invention relate to methods and apparatuses (800, 900) for facilitating reduction of interference in a network. According to exemplary embodiments, an apparatus acting as a first radio base station (macro or femto) (800, 900) is configured to acquire information including a scheduling scheme indicating information on how radio resources are allocated in second radio base station (femto or macro). The information is then used by a scheduler to allocate radio resources which are disjoint the radio resources already allocated by the scheduler of second radio base station.
摘要:
The invention relates to a method for determining a severity of a network incident causing a network alarm in a communication network. The method comprises obtaining (201) a severity attribute associated with the network alarm, the severity attribute indicating an impact of the network incident on a communication service in the communication network, and relating (203) the severity attribute to a severity indicator from a predetermined set of severity indicators to determine the severity of the network incident.
摘要:
A method enables automatic determination that an area covered by an Access Point (AP) of a Wi-Fi Radio Access Network (RAN) overlaps with a cell of a 3rd Generation Partnership Project (3GPP) RAN. The method comprises, at an entity of the Wi-Fi RAN, obtaining a 3GPP identifier related to a user terminal that is attached to the Wi-Fi RAN and an identifier for an AP of the Wi-Fi RAN to which the terminal is attached. The method further comprises, at the entity, generating and sending a Location Service Request including the 3GPP identifier to a Location Services (LCS) Server associated with the 3GPP RAN, receiving a Location Service Response from the LCS Server that includes information identifying a cell of the 3GPP RAN in which the user terminal is located, and causing storage of an association between the identified Wi-Fi AP and the identified 3GPP cell.
摘要:
There is provided a method of determining the topology of a base station in a communications network. The base stations sends a configuration request message to a configuration node, and subsequently receives from the configuration node a configuration response message, the configuration response message including topology information relating to the base station. This topology information can be used in allowing the base station to most efficiently set up a communication with another base station.
摘要:
The present invention relates to a method and arrangements in a mobile telecommunications network including a plurality of access points (203), a plurality of 5 network gateway devices (204). The method comprising the steps of: deciding a security setting needed for a dedicated bearer signal by a network component, communicating said decision to a node needed for establishing communication, configuring or selecting by said access point (203) a secure protocol (205) as needed between said access point and said gateway devices (204), and said decision being based on one or several of the network deployment being used and/or network operator policies.
摘要:
A method of establishing a peer-to-peer IPSec security association between a pair of base stations located within the same or different radio access networks. The base stations communicate with a core network via the same or different security gateways of the core network using respective pre-established IPSec security associations. The method comprises exchanging peer-to-peer IKE security association initiation request and initiation response messages between the base stations using said pre-established security associations.
摘要:
A method of establishing a peer-to-peer IPSec security association between a pair of base stations located within the same or different radio access networks. The base stations communicate with a core network via the same or different security gateways of the core network using respective pre-established IPSec security associations. The method comprises exchanging peer-to-peer IKE security association initiation request and initiation response messages between the base stations using said pre-established security associations.