摘要:
Methods and apparatus for proxying of devices and services using overlay networks. A method for operating a proxy includes obtaining meta-data associated with at least one of a device and a service, generating a searchable index of the meta-data, and publishing the searchable index on the overlay network as at least one of a distributed index and a centralized index. Another method includes receiving a request from a device or a service using a non overlay protocol to receive at least one of data and services from the overlay network, searching an index of meta-data on the overlay network based on the request, identifying a node associated with the at least one of data and services based on the index, establishing a direct connection with the node, and obtaining the at least one of data and services using the direct connection.
摘要:
Methods and apparatus for proxying of devices and services using overlay networks. A method for operating a proxy includes obtaining meta-data associated with at least one of a device and a service, generating a searchable index of the meta-data, and publishing the searchable index on the overlay network as at least one of a distributed index and a centralized index. Another method includes receiving a request from a device or a service using a non overlay protocol to receive at least one of data and services from the overlay network, searching an index of meta-data on the overlay network based on the request, identifying a node associated with the at least one of data and services based on the index, establishing a direct connection with the node, and obtaining the at least one of data and services using the direct connection.
摘要:
A multi-party commitment method is provided whereby a joining node uses contributions provided by contributor nodes in a peer-to-peer overlay network to generate a node identifier. The joining node generates a first contribution and sends a join request to an introducer node (or a plurality of contributor nodes), where the join request seeks to obtain one or more contributions for generating the node identifier within an identifier space of the overlay network. A hash of the first contribution may be included as part of the join request. In response, the joining node may receive a plurality of contributions, wherein the contributions are bound to each other and the first contribution by a prior external multi-node commitment operation. The joining node can then generate its node identifier as a function of the first contribution and the received contributions. Consequently, collusion between nodes and malicious manipulation during ID generation can be frustrated.
摘要:
A multi-party commitment method is provided whereby a joining node uses contributions provided by contributor nodes in a peer-to-peer overlay network to generate a node identifier. The joining node generates a first contribution and sends a join request to an introducer node (or a plurality of contributor nodes), where the join request seeks to obtain one or more contributions for generating the node identifier within an identifier space of the overlay network. A hash of the first contribution may be included as part of the join request. In response, the joining node may receive a plurality of contributions, wherein the contributions are bound to each other and the first contribution by a prior external multi-node commitment operation. The joining node can then generate its node identifier as a function of the first contribution and the received contributions. Consequently, collusion between nodes and malicious manipulation during ID generation can be frustrated.
摘要:
Systems and methodologies are described that facilitate supporting multiple access modes for a base station in a wireless communication environment. The base station can leverage hybrid, closed, or open access mode. A whitelist of a mobile device that successfully registers on the base station can be selectively updated to include a CSG ID of the base station. For example, the CSG ID of the base station can be added to the whitelist when the base station operates in closed access mode, while adding the CSG ID can be skipped when the base station operates in hybrid access mode. According to another example, the CSG ID can be selectively added based upon a received accept cause value. Additionally or alternatively, a CSG ID and an access mode indicator can be transmitted from a base station to a network node for implementing access control and/or paging optimization at the network node.
摘要:
Apparatus and methods are disclosed for reducing or eliminating searches by a UE for its home PLMN when the mobile station is roaming in a network not in the vicinity of the home PLMN. That is, the UE may be provisioned with information about its home PLMN. For example, some embodiments can comprise a neighbor database indicating neighbor relationships between PLMNs and the home PLMN. This can enable a UE to determine whether the home PLMN is likely to be nearby when it is visiting a different PLMN. Forgoing a PLMN home search reduces processing and can aid in conserving power resources. Other aspects, embodiments, and features are also claimed and described.
摘要:
Various arrangements for managing wireless network communication are described. Two cells using different radio access technologies (RATs), such as a 3G cell and a 4G cell, may provide overlapping coverage. A first cell using a first RAT, under certain circumstances, may be permitted to enter a powered down state such that less power is consumed. User equipment may communicate with the cell using the second RAT as the preferred network and only communicate with the cell using the first RAT when a service available through the first RAT but not the second RAT has been requested. Upon a request from the second cell, the first cell may enter a powered up state.
摘要:
In an address updating scheme, a server accesses clients with intermittent connectivity by using addresses specified in a local client address list. The clients are responsible for updating the list whenever the address of the client changes as a result of intermittent client connectivity or other conditions.
摘要:
Techniques for supporting eCalls are described. In an aspect, an eCall indicator may be used to indicate an eCall being established. In one design, a terminal may generate a message including an eCall indicator and may send the message to originate an eCall. The eCall indicator may indicate (i) whether or not a call is an eCall or (ii) whether an eCall is initiated automatically by the terminal or manually by a user. In another aspect, a terminal may avoid sending signaling for mobility management and connection management to wireless networks except for eCalls and designated calls. The terminal may avoid performing location updating, performing registration, responding to paging requests, etc. The terminal may exchange signaling with a wireless network for an eCall initiated by the terminal. After the eCall is initiated, the terminal may perform location updating with the wireless network and call establishment for the eCall.
摘要:
Electronically creating a schedule plan of events which replicates one or more previously scheduled events. A source date range is acquired into a memory of a machine A set of previously scheduled events within the source date range is identified. A target date range is received through a user interface. At least a portion of the previously scheduled events is assigned to a date within the received target date range to create the schedule plan. The schedule plan is posted to a calendar. Another method creates a schedule plan on the basis of one or more search criteria used for identifying any match from a database. At least a portion of any matches are assigned a time slot within a target date range of a calendar program.