摘要:
A method of communication involves sending a request from a first network entity (e.g., a femto convergence server) to a second network entity (e.g., a home subscriber server) for user data relating to an access point, receiving a response to the request, wherein the response identifies at least one application server, and sending registration status information to the identified at least one application server.
摘要:
Systems, methods, devices, and computer program products are described for supporting macrocell-to-femtocell hand-ins of active macro communications for mobile access terminals. An out-of-band (OOB) link is used to detect that an access terminal is in proximity of a femtocell (e.g., using an OOB radio integrated with the femtocell or in a common subnet with the femtocell). Having detected the access terminal in proximity to the femtocell, an OOB presence indication is communicated to a femto convergence system disposed in a core network in communication with the macro network to effectively pre-register the access terminal with the femto-convergence system. When the femto convergence system receives a handoff request from the macro network implicating the pre-registered access terminal, it is able to reliably determine the appropriate target femtocell to use for the hand-in according to the pre-registration, even where identification of the appropriate target femtocell would otherwise be unreliable.
摘要:
Seamless communication handoff is achieved by establishing a protocol tunnel to route leftover packets between network access nodes during the handoff. For example, in a mobile IP-based system, a mobile node may perform a handoff from a first access node that is associated with a first routing node to a second access node that is associated with a second routing node. To prevent the loss of any packets that may be in route for delivery to or from the first routing node during the handoff, the mobile node establishes a protocol tunnel with the first access node via the second access node. On the forward-link, packets being delivered from the first routing node are routed over the protocol tunnel to the second access node and then to the mobile node. On the reverse-link, packets being sent to the first routing node are routed over the protocol tunnel from the mobile node to the second access node and then to the first routing node. In conjunction with these operations, the mobile node concurrently maintains separate IP interfaces for the routing nodes. In addition, steps are taken to ensure that packets are routed to the appropriate IP interface during the handoff.
摘要:
Systems and methodologies are described herein that facilitate congestion control in a wireless communication system. As described herein, an access network and associated terminals can utilize a token bucket access control mechanism, through which respective terminals can be allotted access tokens and/or other units for access to the access network. For example, upon requesting access to a given network, a user of the network can determine whether sufficient access tokens have been accumulated, based on which the request can be selectively allowed or denied. As further described herein, multiple token bucket mechanisms can be utilized, which can correspond to respective packet flows or the like. Additionally, token bucket access control can be implemented as described herein in cooperation with conventional access persistence functionality. Further aspects described herein facilitate the adjustment of token bucket parameters for network access control based on network loading.
摘要:
Systems and methods for identifying an address of a femto node during handoff of an access terminal from a femto node to a macro node. In one embodiment, the femto node assigns a unique identifier to the access terminal. The access terminal passes the unique identifier to the macro node. The macro node partitions the unique identifier to determine the address of the femto node. In another embodiment, the femto node registers its address with a domain name system. The macro node queries the domain name system to obtain the address of the femto node. In another embodiment, the macro node sends the unique identifier to a proxy. The proxy partitions the unique identifier to determine the address of the femto node.
摘要:
Multiple protocol tunnels (e.g., IPsec tunnels) are deployed to enable an access terminal that is connected to a network to access a local network associated with a femto access point. A first protocol tunnel is established between a security gateway and the femto access point. A second protocol tunnel is then established in either of two ways. In some implementations the second protocol tunnel is established between the access terminal and the security gateway. In other implementations the second protocol tunnel is established between the access terminal and the femto access point, whereby a portion of the tunnel is routed through the first tunnel.
摘要:
Ambiguity (e.g., confusion) associated with access point identifiers may be resolved by querying candidate target access points and/or by using historical records indicative of one or more access points that the access point has previously accessed. For example, messages may be sent to access points that are assigned the same identifier to cause the access points to monitor for a signal from an access terminal that received the identifier from a target access point. The target access point may then be identified based on any responses that indicate that a signal was received from the access terminal In some aspects the access points subject to being queried may be selected using a tiered priority. In addition, it may be determined based on prior handoffs of a given access terminal that when that access terminal reports a given identifier, the access terminal usually ends up being handed-off to a particular access point. Accordingly, a mapping may be maintained for that access terminal that maps the identifier to that access point so that the mapping may be used to resolve any future confusion associated with the use of that identifier by that access terminal.
摘要:
Techniques for enhanced backhaul flow control are provided. In an exemplary embodiment, a backhaul control system is described that comprises a base station controller (BSC), a backhaul network, and a base transceiver station (BTS). Each is responsive to data and messaging transmitted and received. In one aspect, the BTS includes a queue and a controller. The amount of data in a queue is adjusted by a controller based upon calculating a target queue size value. The controller non-uniformly adjusts the amount of data in a queue based upon a target queue size value which is based upon communication system parameters. The target queue size and amount of data in a queue is adjusted so as to reduce buffer underrun, decrease system latency, and increase communication system throughput.
摘要:
Methods, apparatus, systems and computer program products are defined that provide for in-order deliver of data packets during hand-off. The aspects provide for in-order delivery at Forward Link Serving eBS/Data Attachment Point (FLSE/DAP) switch and Reverse Link Serving eBS/Data Attachment Point (RLSE/DAP) switch. As such, present aspects provide for significant improvement in the throughput of applications, such as applications relying on Transmission Control Protocol (TCP), during handoff, in such networks as Ultra Mobile Broadband (UMB) and the like.
摘要:
The disclosure relates to video rate adaptation techniques that may use information from a medium access control (MAC) layer and radio link protocol (RLP) layer. The techniques may greatly reduce video delay by adjusting video encoding rate. For real-time video telephony (VT) applications, these techniques may provide graceful quality degradation and improve user experience, especially when the channel conditions degrade.