摘要:
Systems and methodologies are described that facilitate obtaining an Internet Protocol (IP) address of a node with multiple IP addresses using address redirection in a wireless communication environment. A wireless communication component can retrieve a previously registered IP address corresponding to the node from an Authentication, Accounting, and Authorization/Home Subscriber Server (AAA/HSS). Further, a reverse query of a Domain Name Server (DNS) and a forward query of the DNS can be performed. The reverse query can be constructed based upon the previously registered IP address of the node and can resolve a name (e.g., string, . . . ). Further, the forward query can be formed based upon the name and can return a differing IP address of the node.
摘要:
A method, a computer program product, and an apparatus are provided. The apparatus may be equipped to obtain one or more application identifiers from one or more applications on a wireless device, generate a super identifier (SID) having elements corresponding to the one or more applications and a base that identifies one or more common properties of the one or more applications, and broadcast the SID during one or more peer discovery slots allocated for the wireless device. In another example, a UE may be equipped to receive the SID broadcast by another UE, determine a match between at least one of the one or more common properties in the base, and determine whether an element associated with one or more applications is present in the SID.
摘要:
A method, an apparatus, and a computer program product are provided in which information is exchanged through peer-to-peer communication with a second wireless device using a first radio technology. The information regards at least one additional radio technology. In addition, whether to utilize a second radio technology of the at least one additional radio technology for peer-to-peer communication with the second wireless device rather than the first radio technology is determined. Furthermore, the first radio technology is utilized to exchange control information for the second radio technology.
摘要:
Aspects describe enabling two peers that have already paired together under some circumstances to re-identify themselves under different circumstances so that the peers can bypass performing another pairing only to discover that they are already paired. A Bloom filter is constructed from an available pool of locally selected identifiers and is sent to a peer node in a first message. Upon receiving the message with the Bloom filter, peer node checks all its known identifiers. If peer node finds that one of its identifiers is a member of the Bloom filter, peer node sends a reply in order to achieve a mutual identification.
摘要:
The described aspects relate to methods and systems for enabling connectivity agreements between access terminals and access networks. The connectivity agreements may be established through user-side negotiations or third party negotiations for a connection with an access network. In addition, the described aspects relate to methods and systems for paying access networks for a connection.
摘要:
Systems and methods for quality of service control over multiple accesses, more particularly quality of service control over multiple accesses via enhanced quality of service rules. A policy rules and charging function, or similar network entity, can include an indicator in a set of quality of service rules that instructs an access gateway to either setup the quality of service resources/initiate bearer setup immediately, or store the quality of service rules until a request for the quality of service resources s received from the UE or another predetermined event occurs.
摘要:
Systems and methodologies are described that facilitate tunneling within wireless communication systems. Flow identification information is dynamically generated for data flows within a communication system. This flow identification information assists in determining appropriate flow specific policies to be applied with respective data flows. The flow identification information along with the flow specific policies can be communicated to an access mechanism which transmits the data flows in accordance with the flow specific policies. Different aspects relate to using source addresses in combination with the flow identification information for identifying different IP flows originating at a plurality of sources. The flow identification information also facilitates in verifying if different flows are transmitted in accordance with appropriate rules. The generated data flows are transmitted with respective flow identification information in order to facilitate the verification process.
摘要:
In a wireless communication system having multiple access nodes, a home agent (HA) maintains home address (HoA) for a mobile node so that an IP session can be established. As the mobile node moves within a coverage area of various access nodes, the mobile node can establish a secure relationship with a local access gateway and thereby register a local IP address, referred to as a care-of-address (CoA), with the HA. Mobile IP protocol can be established so that multiple sessions can be conducted. In maintaining policy and charging control (PCC), HA informs a policy and charging rules function (PCRF), which in turn can then send the appropriate PCC rules (e.g., IP flows and related policies) to a policy and charging enforcement function (PCEF) for a particular access gateway. Coordination necessary to associate CoA and HoA can further include filter information as to application can run on a particular interface.
摘要:
The claimed subject matter relates to assigning a home agent to a wireless terminal during authentication, authorization, and/or accounting with respect to the wireless terminal. The wireless terminal can provide identifying indicia which can be relayed to a AAA server by way of a base station. The AAA server can then determine one or more home agents that can be associated with the wireless terminal. If more than one home agent can be assigned to the wireless terminal, the base station can resolve which home agent to utilize during registration of the wireless terminal. Such determination can be important with respect to MVNOs.
摘要:
Aspects describe enabling two peers that have already paired together under some circumstances to re-identify themselves under different circumstances so that the peers can bypass performing another pairing only to discover that they are already paired. A Bloom filter is constructed from an available pool of locally selected identifiers and is sent to a peer node in a first message. Upon receiving the message with the Bloom filter, peer node checks all its known identifiers. If peer node finds that one of its identifiers is a member of the Bloom filter, peer node sends a reply in order to achieve a mutual identification.