摘要:
A method for maintaining routing information for a wireless device includes determining, by a target communications controller, an original address of the wireless device handed over from a source communications controller, where the original address is assigned by an original communications controller. The method also includes updating, by the target communications controller, routing information associated with the wireless device using a border gateway protocol message if the original address lies within a range of addresses managed by a communications system including the target communications controller and an aggregation router, where the routing information is stored at the aggregation router.
摘要:
A method in one example has: establishing communication between two mobile terminals in a base station routing architecture network; and optimizing routing between the two mobiles terminals without requiring all traffic to traverse an anchor point in the base station routing architecture network. An IP base station transceiver architecture utilizes network controlled mobility to provide a transparent connection between a mobile terminal and an anchor point in the network. This transparency hides the mobility associated with changing IP base station transceivers from the mobile terminal and reduces over-the-air signaling.
摘要:
An exemplary method controls features and services implemented by nodes in a first communication network where nodes in a second network are not adapted to provide such control or services. A first signaling message is sent by a device in response to receipt by a recipient in the first network of a packet transmitted from an originator in another network that does not support the control and services of the first network. The first signaling message is received at a first perimeter node of the first network that in response sends second signaling messages to the other perimeter nodes. Upon the determination of the occurrence of an event by a second perimeter node, a third signaling message is sent from the second perimeter node to the recipient so that it traverses intermediate nodes in the first network utilized for carrying packets from the originator to the recipient. The third signaling message contains control information defining a service feature to be controlled by the intermediate nodes.
摘要:
Described are techniques for communicating between one or more producers and one or more consumers. A first consumer of an event queue registers for notification regarding occurrences of one or more events. A producer of the event queue posts one or more notifications to one or more consumers of the event queue regarding one or more occurrences of one or more events. Each of the consumers receive notification regarding occurrences of events for which said each consumer is registered. The first consumer retrieves posted event notifications regarding events for which said first consumer is registered. If the first consumer is executing in user space and an event notification list to which said event notifications for said first consumer are posted is located in shared memory, said first consumer retrieves said posted event notifications without proxying into kernel space.
摘要:
Described are techniques for processing a module. A module is generated for execution on a target operating system. The module includes four entry points and code portions associated with each of said four entry points. The four entry points correspond to four handlers invoked at different processing points in connection with a state associated with said module. The four handlers include a load handler, an unload handler, a start handler, and a quiesce handler. First processing is performed in connection with the module. The first processing including at least one of dynamically loading the module, dynamically unloading the module, starting module-specific processing performed by the module, and issuing a request to commence preparation for unloading the module. An appropriate one or more of the four handlers are invoked in accordance with the first processing performed.
摘要:
A communication system reduces set up time for an inter-technology handoff of a multi-mode mobile station (MS) from a source network associated with a first radio frequency (RF) technology to a target network associated with a second RF technology by pre-establishing, prior to a determination to handoff the MS, a registration state of the MS and an authentication of the MS in association with the target network and second RF technology. In order to pre-establish the registration state and authentication, the MS exchanges messaging of the second RF technology with the second network via the first network and first RF technology. To facilitate the exchange, the MS includes shims in a second protocol stack associated with the second technology, which shims intercept second protocol stack signaling and redirect the intercepted signaling to a first protocol stack of the MS, associated with the first technology, for tunneling to the source network.
摘要:
A method in one example has: establishing communication between two mobile terminals in a base station routing architecture network; and optimizing routing between the two mobiles terminals without requiring all traffic to traverse an anchor point in the base station routing architecture network. An IP base station transceiver architecture utilizes network controlled mobility to provide a transparent connection between a mobile terminal and an anchor point in the network. This transparency hides the mobility associated with changing IP base station transceivers from the mobile terminal and reduces over-the-air signaling.
摘要:
A communication system having a local network communicating with a remote network for assigning a dynamic Internet Protocol address to a communication device to enable a communication session between the communication device and an IP network The communication device sends an address request to the local network. If the local network does not selectively assign a local dynamic IP address, the address request is transmitted to a remote network to determine whether a non-local dynamic IP address from a remote pool of non-local dynamic IP addresses is able to be assigned. The communication system selectively communicates with other remote networks until a non-local dynamic IP address can be assigned to satisfy the address request. Once a non-local dynamic IP address has been assigned, the non-local dynamic IP address will be maintained for the duration of the communication session between the communication device and the IP network. If the remote pool of non-local dynamic IP addresses is able to assign a non-local dynamic IP address, then a tunnel set up request is transmitted from the local router of the local network to the remote router of the remote network to establish and OSI layer 3 tunnel to enable communications between the communication device and the IP network.
摘要:
A method, system, and program, product for managing scanning of databases in data storage system, the method comprising receiving a query request from an application server to a data storage system, scanning data stored in the data storage system and based on the query request, returning a set of data to the application server, wherein the set of data corresponds to the query request.
摘要:
Described are techniques synchronizing processing of at least two code threads. A first thread executing in user space is provided. A second thread executing in kernel space is provided. A global mutex lock is provided for synchronizing processing between said first thread and said second thread. One of said first thread and said second thread holds the global mutex lock and is identified as a current owner of the global mutex lock. The other of said first thread and said second thread requests the global mutex lock and is blocked until the current owner of the global mutex lock releases the global mutex lock. The global mutex lock is held by at most one thread at a point in time and is identified as the current owner.