摘要:
Mobile management in a cellular network utilizes the multipath-transfer control protocol (MP-TCP). A mobile device establishes a first multipath-transfer control protocol (MP-TCP) subflow to a corresponding node using a first internet protocol (IP) address corresponding to the mobile device. At least a portion of the first IP address is uniquely associated with the first coverage area. The mobile device establishes a second MP-TCP subflow using a second IP address corresponding to the mobile device while the mobile device is in an overlapped coverage area including a first portion of the first coverage area and a second portion of a second coverage area. At least a portion of the second IP address is uniquely associated with the second coverage area. The mobile node turns off the first subflow when the mobile node determines it has left the first coverage area.
摘要:
Mobile management in a cellular network utilizes the multipath-transfer control protocol (MP-TCP). A mobile device establishes a first multipath-transfer control protocol (MP-TCP) subflow to a corresponding node using a first internet protocol (IP) address corresponding to the mobile device. At least a portion of the first IP address is uniquely associated with the first coverage area. The mobile device establishes a second MP-TCP subflow using a second IP address corresponding to the mobile device while the mobile device is in an overlapped coverage area including a first portion of the first coverage area and a second portion of a second coverage area. At least a portion of the second IP address is uniquely associated with the second coverage area. The mobile node turns off the first subflow when the mobile node determines it has left the first coverage area.
摘要:
A more efficient network can be achieved using software-defined networking to configure routing tables to route data traffic to and from proper cells. User equipment address data and network device internet protocol address data can be utilized to define locators specific to a user equipment device in relation to various network devices. For instance, broadcasted network address data representative of a mobile device identifier address can be received by a first network device from the mobile device, wherein the mobile device identifier address comprises network address data related to an internet protocol address of a second network device, the first network device can determine a third network device capable of a communication with the mobile device, and the communication with the mobile device can be routed by the first network device to the third network device.
摘要:
When machine-to-machine (M2M) devices attach to a mobile communication network, the associated communication session can be treated differently than the attachment of other devices. For example, upon determining that a subscriber device that attaches to a communication network is an M2M device and has completed a given network transaction, the M2M device can be immediately detached without waiting on expiration of an inactivity timer. As another example, upon determining that a subscriber device that attaches to a communication network is an M2M device, the M2M device can be excluded from various signaling procedures such as load-balancing procedures.
摘要:
Aspects of the subject disclosure may include, for example, determining a first address of user equipment from a mobile communication network connection request and identifying that the user equipment is stationary based on comparing the first address of the user equipment in the connection request to a second address of a stationary subscriber device. A non-tunneling link is initiated between the user equipment and a stationary packet core of the mobile communication network, based on identifying that the user equipment is stationary, and the connection request is converted from a non-access stratum protocol to an authentication protocol responsive to initiating the non-tunneling link. Other embodiments are disclosed.
摘要:
When machine-to-machine (M2M) devices attach to a mobile communication network, the associated communication session can be treated differently than the attachment of other devices. For example, upon determining that a subscriber device that attaches to a communication network is an M2M device and has completed a given network transaction, the M2M device can be immediately detached without waiting on expiration of an inactivity timer. As another example, upon determining that a subscriber device that attaches to a communication network is an M2M device, the M2M device can be excluded from various signaling procedures such as load-balancing procedures.
摘要:
When machine-to-machine (M2M) devices attach to a mobile communication network, the associated communication session can be treated differently than the attachment of other devices. For example, upon determining that a subscriber device that attaches to a communication network is an M2M device has completed a given network transaction, the M2M device can be immediately detached without waiting on expiration of an inactivity timer. As another example, upon determining that a subscriber device that attaches to a communication network is an M2M device, the M2M device can be excluded from various signaling procedures such as load-balancing procedures.
摘要:
When machine-to-machine (M2M) devices attach to a mobile communication network, the associated communication session can be treated differently than the attachment of other devices. For example, upon determining that a subscriber device that attaches to a communication network is an M2M device has completed a given network transaction, the M2M device can be immediately detached without waiting on expiration of an inactivity timer. As another example, upon determining that a subscriber device that attaches to a communication network is an M2M device, the M2M device can be excluded from various signaling procedures such as load-balancing procedures.
摘要:
When machine-to-machine (M2M) devices attach to a mobile communication network, the associated communication session can be treated differently than the attachment of other devices. For example, upon determining that a subscriber device that attaches to a communication network is an M2M device and has completed a given network transaction, the M2M device can be immediately detached without waiting on expiration of an inactivity timer. As another example, upon determining that a subscriber device that attaches to a communication network is an M2M device, the M2M device can be excluded from various signaling procedures such as load-balancing procedures.
摘要:
Aspects of the subject disclosure may include, for example, determining a first address of user equipment from a mobile communication network connection request and identifying that the user equipment is stationary based on comparing the first address of the user equipment in the connection request to a second address of a stationary subscriber device. A non-tunneling link is initiated between the user equipment and a stationary packet core of the mobile communication network, based on identifying that the user equipment is stationary, and the connection request is converted from a non-access stratum protocol to an authentication protocol responsive to initiating the non-tunneling link. Other embodiments are disclosed.