摘要:
Embodiments disclosed herein relate to methods and systems for reporting and compiling connection failures in wireless communication systems. In an embodiment, when an access terminal experiences a connection failure (e.g., an unintended one), the access terminal may generate a connection failure record associated with the event, and send a message containing the connection failure record to an access network it has since established the connection. The access network may send a message containing a connection failure report acknowledgement (ACK) message to the access terminal, upon reception of the connection failure report message. The network operators may use the connection failure records thus compiled to identify problematic spots in the system and improve the quality of service.
摘要:
Methods and apparatus are presented to support the mobile Internet Protocol (mobile IP) across different air interface standards. In particular, mechanisms are provided that will allow a mobile device to selectively force a Point-to-Point Protocol (PPP) session resynchronization when the mobile device moves from the support of one air interface standard to another.
摘要:
To access a first communication system, a terminal determines a transmission time for an access probe, an expected response time from the system, and a protected time interval based on the transmission time and/or expected response time. The terminal determines a starting time for sending the access probe such that the protected time interval does not overlap a tune-away interval in which the terminal is to monitor anther frequency/air-interface. This starting time may be set initially to the end of a prior access probe plus a pseudo-random wait duration and may be advanced forward or moved backward in time, if needed, by a time duration selected such that the protected time interval does not overlap the tune-away interval.
摘要:
Access terminal identification management providing a minimum distance between subnets before reusing subnet identifiers. Mobility criteria evaluation determines when to reassign an access terminal identifier. In one embodiment, the mobility criteria is whether any member of the active set for the access terminal belongs to an originating subnet. In an alternate embodiment, the criteria is whether the access terminal has traveled more than a minimum distance from the originating subnet. When a mobility criteria is violated, the access network assigns a new identifier. In one embodiment, the access terminal identifier is a long code mask based on a subnet identifier. Identifier management applies when crossing sector boundaries in a cellular system, and serves to reduce the ambiguity of mapping CC values to full UATI values, and to avoid overlapping assignments.
摘要:
Techniques for efficient storage and retrieval of Preferred Roaming Lists are disclosed. In one aspect, PRL entries are stored in two tables. One table contains records that are common to two or more PRL entries. Another table stores any information that is unique to a PRL entry, as well as an indicator of which common record is associated with it. The common record is concatenated with the unique information to generate the uncompressed PRL entry. Various other aspects of the invention are also presented. These aspects have the benefit of reducing the memory requirements for storing a PRL. In addition, time required to download the compressed PRL is reduced.
摘要:
Embodiments disclosed herein relate to a new set of radio link protocols (RLPs) configured to provide for efficient data transmission in a multi-link communication system. In an embodiment, an upper-layer packet is segmented into link-layer packets to be transmitted over a plurality of communication links, each including a first sequence number in accordance with a predetermined order. A second sequence number is further added to each link-layer packet to be transmitted for the first time. The second sequence number is configured to be in a sequence space associated with a particular communication link, and may be used for detection of missing packets.
摘要:
Techniques to forward unsolicited messages from an (IS-2000) CDMA radio network via an HDR radio network to an access terminal. A session is first established between the access terminal and the HDR radio network. During session establishment or thereafter, the access terminal indicates to the HDR radio network an interest in receiving unsolicited messages from the CDMA radio network. The access terminal typically also registers with the CDMA radio network. Thereafter, unsolicited messages can be sent from a mobile station controller (MSC) to the HDR and CDMA radio networks, or sent from the MSC to the CDMA radio network, which then forwards the messages to the HDR radio network. The HDR radio network encapsulates the unsolicited messages and sends the encapsulated messages to the access terminal. The forwarding of unsolicited messages allows the CDMA radio network to communicate with an access terminal.
摘要:
Operating a communication device in a half-duplex mode using only overhead channels; and substantially free running a timing reference obtained during reception to allow a timing reference value to drift during transmission.
摘要:
Embodiments disclosed herein relate to providing dynamic assignment of home agent and home address in wireless communications, such that a mobile node away from home may receive local access services from a visited network. In an embodiment, a mobile node accesses a visited network. The visited network authenticates the mobile node with its home network. The visited network then assigns a visited home agent and a home address for the mobile node. The mobile node subsequently performs secure binding with the visitor home agent. The mobile node proceeds with communications using the visitor home agent and home address.
摘要:
Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updated key is encrypted using the broadcast key and provided periodically to a user. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key. One embodiment provides link layer content encryption. Another embodiment provides end-to-end encryption.