摘要:
A method and apparatus are disclosed for negotiating and managing one or more personalities in a wireless communications system. The method comprises advertising one or more supported initial protocol set identifiers. Furthermore, the method comprises selecting a starting initial protocol set identifier from the advertised initial protocol set identifiers. In addition, the method comprises establishing a session based on the selected starting initial protocol set identifier. The method also comprises establishing a connection between an access terminal and an access network based on the selected initial protocol set identifier.
摘要:
A route protocol is established whereby a mobile device can communicate to a multitude of (receiving) base stations though a tunnel created through a serving base station. A message that includes a Route Creation Header can be transmitted by the mobile device to create the tunnel. The Route Creation Header is reviewed by the receiving base station while the mobile device is in a Waiting-To-Open State. Various errors might occur with respect to the Route Creation Header. These errors can be conveyed to the mobile device by base station by setting one or more error code fields. Once the errors are resolved, another attempt to create a tunnel with base station can be made, if desired.
摘要:
A route protocol is established whereby a mobile device can communicate to a multitude of (receiving) base stations though a tunnel created through a serving base station. A message that includes a Route Creation Header can be transmitted by the mobile device to create the tunnel. The Route Creation Header is reviewed by the receiving base station while the mobile device is in a Waiting-To-Open State. Various errors might occur with respect to the Route Creation Header. These errors can be conveyed to the mobile device by base station by setting one or more error code fields. Once the errors are resolved, another attempt to create a tunnel with base station can be made, if desired.
摘要:
A method and apparatus are disclosed for negotiating and managing one or more personalities in a wireless communications system. The method comprises advertising one or more supported initial protocol set identifiers. Furthermore, the method comprises selecting a starting initial protocol set identifier from the advertised initial protocol set identifiers. In addition, the method comprises establishing a session based on the selected starting initial protocol set identifier. The method also comprises establishing a connection between an access terminal and an access network based on the selected initial protocol set identifier.
摘要:
In a communication system in which a gateway entity is linked to a plurality of infrastructure entities which in turn are operable to communicate with an access terminal, the access terminal needs first to establish a data attachment point (DAP) with one of the infrastructure entities. Handoff of the DAP from one infrastructure entity to another infrastructure entity is initiated by the access terminal. The access terminal weighs factors such as the link conditions with the various infrastructure entities, the time since the last DAP handoff, and time duration communicating with the current infrastructure entity before proceeding with the DAP handoff.
摘要:
In a communication system in which a gateway entity is linked to a plurality of infrastructure entities which in turn are operable to communicate with an access terminal, the access terminal needs first to establish a data attachment point (DAP) with one of the infrastructure entities. Handoff of the DAP from one infrastructure entity to another infrastructure entity is initiated by the access terminal. The access terminal weighs factors such as the link conditions with the various infrastructure entities, the time since the last DAP handoff, and time duration communicating with the current infrastructure entity before proceeding with the DAP handoff.
摘要:
Embodiments describe overlaying a broadcast multicast channel on top of a unicast network. Messages can be generated by protocols in a broadcast/multicast (BCMC) stack and tunneled through an IRTP of a serving access node. These messages can be transmitted on a BCMC channel and/or a unicast channel. Other messages can be generated by protocols in a unicast stack and tunneled to a B-IRTP of a BCMC Access node and transmitted on a BCMC channel to an access terminal.
摘要:
Embodiments describe overlaying a broadcast multicast channel on top of a unicast network. Messages can be generated by protocols in a broadcast/multicast (BCMC) stack and tunneled through an IRTP of a serving access node. These messages can be transmitted on a BCMC channel and/or a unicast channel. Other messages can be generated by protocols in a unicast stack and tunneled to a B-IRTP of a BCMC Access node and transmitted on a BCMC channel to an access terminal.
摘要:
Embodiments describe overlaying a broadcast multicast channel on top of a unicast network. Messages can be generated by protocols in a broadcast/multicast (BCMC) stack and tunneled through an IRTP of a serving access node. These messages can be transmitted on a BCMC channel and/or a unicast channel. Other messages can be generated by protocols in a unicast stack and tunneled to a B-IRTP of a BCMC Access node and transmitted on a BCMC channel to an access terminal.
摘要:
Embodiments describe overlaying a broadcast multicast channel on top of a unicast network. Messages can be generated by protocols in a broadcast/multicast (BCMC) stack and tunneled through an IRTP of a serving access node. These messages can be transmitted on a BCMC channel and/or a unicast channel. Other messages can be generated by protocols in a unicast stack and tunneled to a B-IRTP of a BCMC Access node and transmitted on a BCMC channel to an access terminal.