Abstract:
A communication device executes multiple applications that generate application data. The communication device determines application labels that individually identify the executing applications. The communication device inserts the application data in layer three communication payloads and inserts the application labels in layer three communication headers to individually associate the executing applications with their layer three communication headers and their application data. The communication device inserts the layer three communication headers and the layer three communication payloads in layer two communication payloads. The communication device transfers the layer two communication payloads with layer two headers. In some examples, the communication device inserts the application labels in the layer two communication headers to individually associate the executing applications with their layer two communication headers and their application data.
Abstract:
Ways of allocating an identifier to a mobile device are disclosed. One method includes receiving a request that requests an address be assigned to the mobile device, considering factors in connection with determining a mobile IP (MIP) address to be assigned to the mobile device, determining the MIP address based on the factors, and conveying the MIP address to the mobile device.
Abstract:
A wireless relay uses multiple wireless backhaul options. In the relay, a wireless access point exchanges user data with wireless user devices including a visitor device. The wireless access point exchanges the user data with Relay Equipment (RE) in the wireless relay. The RE exchanges the user data with a home wireless communication network. The RE detects a loss of performance for the home wireless communication network, and initiates a backhaul connection through the visitor wireless user device and a visitor wireless communication network. The wireless access point exchanges additional user data with the wireless user devices. The wireless access point exchanges the additional user data with the RE. The RE exchanges the additional user data with the home wireless communication network over the backhaul connection through the visitor wireless user device and the visitor wireless communication network.
Abstract:
A wireless relay controls wireless scanning in a wireless data communication network. The wireless relay performs a 360-degree wireless signal scan, and attaches to a source wireless access point responsive to the wireless signal scan. The wireless relay reports results from the wireless signal scan to a relay information server responsive to the attachment. The wireless relay receives attachment data from the relay information server responsive to the reporting. If the wireless relay loses connectivity to the source wireless access point, then the wireless relay determines reattachment attributes based on the attachment data, and performs another wireless signal scan based on the reattachment attributes.
Abstract:
A Long-Term Evolution (LTE) communication system to facilitate updating network topology information when a mobile wireless repeater changes its attachment comprises a network topology server, a former macro LTE base station to which the mobile wireless repeater was previously attached, and a new macro LTE base station to which the mobile wireless repeater is presently attached. The network topology is server configured to receive updated attachment information transmitted from the mobile wireless repeater and transfer an attachment scan instruction for delivery to the former macro LTE base station and the new macro LTE base station. The former and new macro LTE base stations are configured to determine network attachment information for one or more network wireless repeaters and transfer the network attachment information for delivery to the network topology server. The network topology server is further configured to receive the network attachment information and update a network topology map.
Abstract:
A computer-implemented method, computer-readable media, and wireless device that automatically determines whether an application requires a virtual input mechanism are provided. The wireless device includes a virtual machine and database. The virtual machine executes the application and parses code associated with the application to determine whether a virtual input mechanism is necessary. The database stores metadata that indicates whether the type of input needed for the application is touch or key.
Abstract:
A method, server, and media are provided for providing parallel multimedia conferences. A multimedia conference server enables a user to participate in several multimedia conferences simultaneously. The server receives a request to establish parallel multimedia conferences from a user. In turn, the server generates a data stream for the content of the each of the multimedia conferences associated with the user. The data stream may include transcriptions and notifications for the user. The multimedia conference server transmits the data stream and notifications to the user.
Abstract:
Embodiments disclosed herein provide systems and methods to provide wireless network application access to a wireless device via an untrusted access node. In a particular embodiment, a method provides receiving communications directed to an application system within a wireless communication network from a wireless communication device via a wireless access node external to the wireless communication network. The method further provides determining whether the communications are authorized for the application system based on a signature included in the communications, wherein the signature comprises a unique identifier generated at the wireless communication device that corresponds to an identity of the wireless communication device and an identity of an integrated circuit within that wireless communication device that is associated with a subscriber of the wireless communication network. Upon determining that the communications are authorized, the method provides transferring the communications to the application system.
Abstract:
Systems, methods, and software for transferring text messages are provided herein. A method includes indicating to a wireless communication device a temporary address number, receiving an instruction from a user of the wireless communication device to transfer a text message to a destination number using the temporary address number instead of a device number of the wireless communication device. The method also includes transferring the text message for delivery to the destination number, receiving a response text message from the destination number indicating the temporary address number as a response destination number, and transferring the response text message for delivery to the routing node associated with the temporary address number. The method also includes translating the response destination number of the response text message into the device number of the wireless communication device, and transferring the response text message for delivery to the wireless communication device using the device number.
Abstract:
Embodiments disclosed herein provide systems and methods for orchestrating application updates over a wireless communication network. In a particular embodiment, a method provides registering a first application with an update controller and, in response to registering the first application, determining first network data update parameters for the first application and determining network constraints on application data updates over a wireless communication network. The method further provides determining when the first application is allowed to request data updates based on the first network data update parameters and the network constraints and notifying the first application of when the first application is allowed to request data updates over the wireless communication network.