摘要:
Radio access interworking technologies allow a target network to notify a source network that a mobile device has moved from source network to target network, wherein mobile device does not need to perform notification to source network. Further, source network can provide a first subset of overhead information to mobile device and, after moving to target network, mobile device can receive a second subset of overhead information from target network. Further, mobile device can perform prehashing prior to moving to target network based on a channel list received from source network.
摘要:
Quality of service information can be used to facilitate wireless communication. A network entity, such as a terminal, as well as a network can initialize an authorization to establish a link using quality of service information. Various features can be integrated with the use of quality of service information, such as having quality of service reservation before a call and supplying a permanent identity for use in correlation.
摘要:
Access by a mobile station to a femto access point (FAP) of a wireless communication system is controlled by an enforcement point in response to mobile station authorization data provided from a storage point that is remote from the FAP. The authorization data is provided in response to FAP authentication data. The authentication data may include a FAP identifier and a message authenticator that the FAP generates by hashing shared secret information. The storage point may provide the authorization data in response to determining that the message authenticator is a hash of the shared secret information.
摘要:
Radio access interworking technologies allow a target network to notify a source network that a mobile device has moved from source network to target network, wherein mobile device does not need to perform notification to source network. Further, source network can provide a first subset of overhead information to mobile device and, after moving to target network, mobile device can receive a second subset of overhead information from target network. Further, mobile device can perform prehashing prior to moving to target network based on a channel list received from source network.
摘要:
Local IP access is provided in a wireless network to facilitate access to one or more local services. In some implementations, different IP interfaces are used for accessing different services (e.g., local services and operator network services). A list that maps packet destinations to IP interfaces may be employed to determine which IP interface is to be used for sending a given packet. In some implementations an access point provides a proxy function (e.g., a proxy ARP function) for an access terminal. In some implementations an access point provides an agent function (e.g., a DHCP function) for an access terminal. NAT operations may be performed at an access point to enable the access terminal to access local services. In some aspects, an access point may determine whether to send a packet from an access terminal via a protocol tunnel based on the destination of the packet.
摘要:
Methods, apparatus, systems and computer program products are defined that provide multiple bindings in a Mobile Internet Protocol (MIP) network environment. The multiple bindings that are established are independent of one another, such that a forward link binding is decoupled from, or otherwise does not affect, a reverse link binding and vice versa. Multiple reverse link-only bindings may be established within an active route set for an access terminal. Additionally a single primary binding may be established that provides a forward link binding and reverse link binding. At any point in time, the access terminal may maintain only one primary binding.
摘要:
Disclosed is a method for multiple EAP-based authentications in a wireless communication system. In the method, a first master session key (MSK) is generated in a first EAP-based authentication for a first-type access. A first temporal session key (TSK) is generated from the first master session key (MSK). A second EAP-based authentication is performed, using the first temporal session key (TSK), for a second-type access. First-type access and second-type access are provided after the first and second EAP-based authentications are successfully completed.
摘要:
A wireless telecommunications system includes a base station, a plurality of remote stations, a first channel for general page messages containing paging information and broadcast databurst message references, and an auxiliary channel for broadcast databurst notification indicators for the purpose of increasing standby time in remote stations configured to receive broadcast databurst messages.
摘要:
Techniques for synchronization of stored service parameters are disclosed. In one aspect, a configuration identifier is transmitted from a mobile station to a base station, and compared with an identifier generated in the base station. If the identifiers match, the configuration is used for communication. In another aspect, the identifier is generated by selecting an identifier associated with a configuration from a configuration table. In yet another aspect, the identifier is generated by computing a cyclic redundancy check (CRC) of the configuration. Various other aspects are also presented. These aspects have the benefit of preventing attempted use of unsynchronized stored service parameters and associated call setup failures and subsequent renegotiation, with the net effect of reducing call setup time and more efficient use of system resources.
摘要:
Techniques for synchronization of stored service parameters are disclosed. In one aspect, a configuration identifier is transmitted from a mobile station to a base station, and compared with an identifier generated in the base station. If the identifiers match, the configuration is used for communication. In another aspect, the identifier is generated by selecting an identifier associated with a configuration from a configuration table. In yet another aspect, the identifier is generated by computing a cyclic redundancy check (CRC) of the configuration. Various other aspects are also presented. These aspects have the benefit of preventing attempted use of unsynchronized stored service parameters and associated call setup failures and subsequent renegotiation, with the net effect of reducing call setup time and more efficient use of system resources.