摘要:
Techniques for supporting policy control and charging (PCC) functions in a wireless communication network are described. In one design, a Policy Control and Charging Rules Function (PCRF) may receive a request from a first network entity (e.g., a home agent) to establish a PCC session for a user equipment (UE) accessing the first network entity using a mobility protocol (e.g., Mobile IP). The PCRF may determine the mobility protocol used by the UE based on an IP-CAN Type parameter included in the request. The PCRF may determine PCC rules for the PCC session based on the mobility protocol and may send the PCC rules to the first network entity. The first network entity may apply the PCC rules on packets for the PCC session and may count each packet for charging. A second network entity may forward the packets but would not count these packets for charging.
摘要:
Systems and methodologies are described that facilitate tunneling within wireless communication systems. Flow identification information is dynamically generated for data flows within a communication system. This flow identification information assists in determining appropriate flow specific policies to be applied with respective data flows. The flow identification information along with the flow specific policies can be communicated to an access mechanism which transmits the data flows in accordance with the flow specific policies. Different aspects relate to using source addresses in combination with the flow identification information for identifying different IP flows originating at a plurality of sources. The flow identification information also facilitates in verifying if different flows are transmitted in accordance with appropriate rules. The generated data flows are transmitted with respective flow identification information in order to facilitate the verification process.
摘要:
In a method and apparatus for providing a flexible network architecture, an apparatus operable in a communication system comprises one or more logical entities adapted to provide a set of functions related to a connection through the communication system, wherein said logical entities are connected in series, and a subset of said functions are provided by each occurrence of said logical entities.
摘要:
Systems and methods for switching among networks (e.g., heterogeneous) and inter-working between a source access system and a target access system, by implementing tunneling from the AT to the target access system via the source access system. An inter-system handoff control component can facilitate setting tunneling by the mobile unit to the target access and/or between the source access system and the target access system—wherein signaling/packeting associated with the target system can be transferred over the source system.
摘要:
Systems and methods for switching among networks (e.g., heterogeneous) and inter-working between a source access system and a target access system, by implementing tunneling from the AT to the target access system via the source access system. An inter-system handoff control component can facilitate setting tunneling by the mobile unit to the target access and/or between the source access system and the target access system—wherein signaling/packeting associated with the target system can be transferred over the source system.
摘要:
In a method and apparatus for providing a flexible network architecture, an apparatus operable in a communication system comprises one or more logical entities adapted to provide a set of functions related to a connection through the communication system, wherein said logical entities are connected in series, and a subset of said functions are provided by each occurrence of said logical entities.
摘要:
Systems and methodologies are described that facilitate inter-system handover in a wireless communication system. Various aspects described herein provide for handover techniques that enable a target system to be prepared by a mobile device via a source system in order to minimize specific changes required to source system and/or target system. Techniques are described herein in which the radio link of a source system can be utilized to tunnel signaling messages which are in a format understood by a destination node in a target system. Further, fast inter-access handover can be facilitated by establishing a simple generic transmission tunnel between respective network nodes in source and target systems that handle intra-system mobility and providing a Layer 2 (L2) tunneling mechanism over the radio interface of each involved system technology.
摘要:
Methods, systems, and devices are described for intercepting requests from applications installed on a mobile device. The requests are system calls that establish communication channels for the mobile device. The requests are captured and held from reaching TCP/IP stack of an operating system executing on the mobile device. An intercepted request is aggregated with other intercepted requests. The aggregated requests are bundled together and released to the operating system upon the detection of a triggering event. The capture, holding, and aggregation of requests from applications occur when the mobile device is in a background mode.
摘要:
Certain aspects of the present disclosure propose methods for identifying machine to machine (M2M) devices and services. Each device may indicate its M2M functionality either for each of the services performed by the device or for all of its services to a core network. The core network may report the M2M functionality of the device to other nodes in the network that may be involved with the M2M functionality of the device.
摘要:
An apparatus and method for registration-less paging comprising establishing a mobile device identity for a mobile device in a wireless network; determining a time instance for the identified mobile device to listen to pages; sending a page from the wireless network to the identified mobile device during the determined time instance. In one example, the apparatus and method is for a network-initiated attach procedure comprising receiving a request to attach a mobile device in a wireless network; generating a paging message based on the request to attach the mobile device; sending a paging indicator to a mobile device based on the paging message during a time instance based on an agreed rule; and accepting an attach procedure from the mobile device based on the paging indicator.