摘要:
Embodiments disclosed herein relate to a new set of radio link protocols (RLPs) configured to provide for efficient data transmission in a multi-link communication system. In an embodiment, an upper-layer packet is segmented into link-layer packets to be transmitted over a plurality of communication links, each including a first sequence number in accordance with a predetermined order. A second sequence number is further added to each link-layer packet to be transmitted for the first time. The second sequence number is configured to be in a sequence space associated with a particular communication link, and may be used for detection of missing packets.
摘要:
A method and an apparatus granting a terminal, which requests a communication with a network access server using a session of a standard for packet data transmission designated by an identifier, use of the requested session, when a security association between the access terminal and the network access server is verified.
摘要:
Embodiments disclosed herein relate to methods and systems for reporting and compiling connection failures in wireless communication systems. In an embodiment, when an access terminal experiences a connection failure (e.g., an unintended one), the access terminal may generate a connection failure record associated with the event, and send a message containing the connection failure record to an access network it has since established the connection. The access network may send a message containing a connection failure report acknowledgement (ACK) message to the access terminal, upon reception of the connection failure report message. The network operators may use the connection failure records thus compiled to identify problematic spots in the system and improve the quality of service.
摘要:
Access terminal identification management providing a minimum distance between subnets before reusing subnet identifiers. Mobility criteria evaluation determines when to reassign an access terminal identifier. In one embodiment, the mobility criteria is whether any member of the active set for the access terminal belongs to an originating subnet. In an alternate embodiment, the criteria is whether the access terminal has traveled more than a minimum distance from the originating subnet. When a mobility criteria is violated, the access network assigns a new identifier. In one embodiment, the access terminal identifier is a long code mask based on a subnet identifier. Identifier management applies when crossing sector boundaries in a cellular system, and serves to reduce the ambiguity of mapping CC values to full UATI values, and to avoid overlapping assignments.
摘要:
Methods and apparatus for authorizing an access terminal (AT) requesting a service provided by an entity in an access network are disclosed. After being authorized for a communication session with the access network, the AT addresses an inquiry to a domain name server (DNS) for a contact of a service selector (SS) administering the desired service. A controller in the access network (BSC/PCF) routs the inquiry to and returns a response from the DNS. The AT then addresses a service query containing the AT's capabilities to the SS. The BSC/PCF directs attributes allowing the SS to authorize the service. Upon the SS's acknowledgement of the attributes, the BSC/PCF forwards to the SS the service query. Upon authorization, the SS notifies the BSC/PCF, and if the AT is authorized, selects in accordance with the AT's capabilities an appropriate service provider (SP) to provide the service.
摘要:
Method and System for Utilization of an Outer Decoder in a Broadcast Services Communication System is described. Information to be transmitted is provided to a systematic portion of a plurality of transmit buffers and encoded by an outer decoder communicatively coupled to the transmit buffer. The resulting redundant bits are provided to a parity portion of each transmit buffer. The content of the transmit buffers, is multiplexed and encoded by an inner decoder to improve protection by adding redundancy. The receiving station recovers the transmitted information by an inverse process. Because a decoding complexity depends on the size of a systematic portion of the transmit buffer, reasoned compromise between a systematic portion size and number of transmit buffers yields decreased decoding complexity.
摘要:
A cryptosync design comprising (1) a channel identifier indicative of a particular channel via which a data packet is sent, (2) an extended time stamp indicative of a time value associated with the data packet, and (3) a counter indicative of a packet count associated with the data packet. The lengths of the extended time stamp and counter fields and the time unit for the extended time stamp are parameters that may be configured for each channel. At the sender, the extended time stamp for the cryptosync may be obtained from the System Time maintained by the sender. The counter value for the cryptosync may be provided by a counter that is maintained for the channel by the sender. The sender may include a time stamp and/or the counter value, if they are needed to derive the cryptosync at the receiver, in a header of the data packet.
摘要:
Techniques for efficient storage and retrieval of Preferred Roaming Lists are disclosed. In one aspect, PRL entries are stored in two tables. One table contains records that are common to two or more PRL entries. Another table stores any information that is unique to a PRL entry, as well as an indicator of which common record is associated with it. The common record is concatenated with the unique information to generate the uncompressed PRL entry. Various other aspects of the invention are also presented. These aspects have the benefit of reducing the memory requirements for storing a PRL. In addition, time required to download the compressed PRL is reduced.
摘要:
Operating a communication device in a half-duplex mode using only overhead channels; and substantially free running a timing reference obtained during reception to allow a timing reference value to drift during transmission.