摘要:
A method for maintaining routing information for a wireless device includes determining, by a target communications controller, an original address of the wireless device handed over from a source communications controller, where the original address is assigned by an original communications controller. The method also includes updating, by the target communications controller, routing information associated with the wireless device using a border gateway protocol message if the original address lies within a range of addresses managed by a communications system including the target communications controller and an aggregation router, where the routing information is stored at the aggregation router.
摘要:
A subscriber unit: sends a media flow to a correspondent host; receives, from the correspondent host, an indication of a level of congestion in the communication network; compares the level of congestion to a congestion threshold (TH1) during a first time interval, wherein TH1 is determined based on an assigned priority level for the media flow, and terminates the media flow and enters a sleep mode state when, after expiration of the first time interval, the level of congestion exceeds TH1; while in the sleep mode state, the subscriber unit compares a level of congestion in the communication network to a congestion threshold (TH2), and exits the sleep mode state and resumes the media flow when the level of congestion remains below TH2 for the duration of a second time interval.
摘要:
An apparatus in one example may have a functionality of a policy decision function divided into two parts; one part representing a home network application function and the other part representing visited network bearer resources and local policies. The one part of the policy decision function supports communications with the application function, and represents the home network and application in a request for QoS control to the visited network. The other part of the policy decision function supports visited network interactions with a policy enforcement function, and represents visited network local policy related to resource utilization and roaming agreement-based policy.
摘要:
A highly available shared file system is described for use in computing environments. A floating network address can be associated with any one of a plurality of servers. The floating network address is associated with a first server. An area of data on a storage device is made available by the first server to be accessed by the other servers. The other servers then refer to the floating network address to access the area of data through the first server. If the first server becomes unavailable, the floating network address is transferred from the first server to a second server. The area of data is then made available by the second server to be accessed by the other servers. The other servers continue to access the area of data through the second server by referring to the floating network address.
摘要:
A method for maintaining routing information for a wireless device includes determining, by a target communications controller, an original address of the wireless device handed over from a source communications controller, where the original address is assigned by an original communications controller. The method also includes updating, by the target communications controller, routing information associated with the wireless device using a border gateway protocol message if the original address lies within a range of addresses managed by a communications system including the target communications controller and an aggregation router, where the routing information is stored at the aggregation router.
摘要:
A method in one example has: establishing communication between two mobile terminals in a base station routing architecture network; and optimizing routing between the two mobiles terminals without requiring all traffic to traverse an anchor point in the base station routing architecture network. An IP base station transceiver architecture utilizes network controlled mobility to provide a transparent connection between a mobile terminal and an anchor point in the network. This transparency hides the mobility associated with changing IP base station transceivers from the mobile terminal and reduces over-the-air signaling.
摘要:
An exemplary method controls features and services implemented by nodes in a first communication network where nodes in a second network are not adapted to provide such control or services. A first signaling message is sent by a device in response to receipt by a recipient in the first network of a packet transmitted from an originator in another network that does not support the control and services of the first network. The first signaling message is received at a first perimeter node of the first network that in response sends second signaling messages to the other perimeter nodes. Upon the determination of the occurrence of an event by a second perimeter node, a third signaling message is sent from the second perimeter node to the recipient so that it traverses intermediate nodes in the first network utilized for carrying packets from the originator to the recipient. The third signaling message contains control information defining a service feature to be controlled by the intermediate nodes.
摘要:
A communication system reduces set up time for an inter-technology handoff of a multi-mode mobile station (MS) from a source network associated with a first radio frequency (RF) technology to a target network associated with a second RF technology by pre-establishing, prior to a determination to handoff the MS, a registration state of the MS and an authentication of the MS in association with the target network and second RF technology. In order to pre-establish the registration state and authentication, the MS exchanges messaging of the second RF technology with the second network via the first network and first RF technology. To facilitate the exchange, the MS includes shims in a second protocol stack associated with the second technology, which shims intercept second protocol stack signaling and redirect the intercepted signaling to a first protocol stack of the MS, associated with the first technology, for tunneling to the source network.
摘要:
A method in one example has: establishing communication between two mobile terminals in a base station routing architecture network; and optimizing routing between the two mobiles terminals without requiring all traffic to traverse an anchor point in the base station routing architecture network. An IP base station transceiver architecture utilizes network controlled mobility to provide a transparent connection between a mobile terminal and an anchor point in the network. This transparency hides the mobility associated with changing IP base station transceivers from the mobile terminal and reduces over-the-air signaling.
摘要:
A communication system having a local network communicating with a remote network for assigning a dynamic Internet Protocol address to a communication device to enable a communication session between the communication device and an IP network The communication device sends an address request to the local network. If the local network does not selectively assign a local dynamic IP address, the address request is transmitted to a remote network to determine whether a non-local dynamic IP address from a remote pool of non-local dynamic IP addresses is able to be assigned. The communication system selectively communicates with other remote networks until a non-local dynamic IP address can be assigned to satisfy the address request. Once a non-local dynamic IP address has been assigned, the non-local dynamic IP address will be maintained for the duration of the communication session between the communication device and the IP network. If the remote pool of non-local dynamic IP addresses is able to assign a non-local dynamic IP address, then a tunnel set up request is transmitted from the local router of the local network to the remote router of the remote network to establish and OSI layer 3 tunnel to enable communications between the communication device and the IP network.