摘要:
An access point is configured based on acquired information. An access point may be configured based on the configuration(s) of at least one other access point. An identifier to be transmitted by an access point may be selected based on the identifier(s) transmitted by at least one other access point. An access point may configure itself with assistance from a configuration server. For example, the access point may send information such as the location of the access point to a configuration server and the configuration server may respond with a list of neighboring access points for that access point. A configuration server may provide configuration information to an access point based on the location of the access point. A configuration server also may direct an access point to a different configuration server.
摘要:
Seamless communication handoff is achieved by establishing a protocol tunnel to route leftover packets between network access nodes during the handoff. For example, in a mobile IP-based system, a mobile node may perform a handoff from a first access node that is associated with a first routing node to a second access node that is associated with a second routing node. To prevent the loss of any packets that may be in route for delivery to or from the first routing node during the handoff, the mobile node establishes a protocol tunnel with the first access node via the second access node. On the forward-link, packets being delivered from the first routing node are routed over the protocol tunnel to the second access node and then to the mobile node. On the reverse-link, packets being sent to the first routing node are routed over the protocol tunnel from the mobile node to the second access node and then to the first routing node. In conjunction with these operations, the mobile node concurrently maintains separate IP interfaces for the routing nodes. In addition, steps are taken to ensure that packets are routed to the appropriate IP interface during the handoff.
摘要:
Systems and methods for switching among heterogeneous networks and inter-working between a source access system and a target access system. An inter-system handoff control component can facilitate setting an IP tunneling by the mobile unit, wherein IP addresses for inter-working security gateway and Radio Access Network of the target access system can be identified. The inter-system handoff control component can then implement tunneling between the source system and the target system, wherein signaling/packeting associated with the target system can be transferred over the source system.
摘要:
In a converged communication network, IP data packet services are provided by a core network to access terminals via radio access nodes (RAN). By positioning accounting report triggering closer to the usage, accuracy and comprehensive of accounting is achieved, which can also reduce overhead burdens on the core network. Additional responsibility is given to an access gateway (AGW) between an enhanced base station (eBS) of the RAN and the core network that can reduce the volume and increase the accuracy of accounting message traffic to an authentication, authorization and accounting (AAA) server of the core network. The AGW informs the eBS of accounting rules to be used in making air link records that are merged and formatted in accordance with an accounting protocol for sending to the AAA server, to address duration and volume based accounting needs, postpaid and prepaid accounting types, and user, service and flow based accounting categories.
摘要:
In a communication system in which a mobile station accessing the main network via a plurality of base stations, the mobile station can freely select any of the base stations as a forward link (FL) serving station. In addition, the mobile station can also freely select another or the same base station as a reverse link (RL) serving station. The mobile station has stored in its memory a plurality of routes corresponding to the plurality of base stations, with each route dedicatedly assigned to a particular base station. During handoff of one base station to another as either the FL or the RL serving station, exchanged data packets are processed in the respective routes of the base stations involved.
摘要:
In a communication system in which a gateway entity is linked to a plurality of infrastructure entities which in turn are operable to communicate with an access terminal, the access terminal needs first to establish a data attachment point (DAP) with one of the infrastructure entities. Handoff of the DAP from one infrastructure entity to another infrastructure entity is initiated by the access terminal. The access terminal weighs factors such as the link conditions with the various infrastructure entities, the time since the last DAP handoff, and time duration communicating with the current infrastructure entity before proceeding with the DAP handoff.
摘要:
Systems and methods are provided that facilitate active queue management of internet-protocol data packets generated in a data packet switched wireless network. Queue management can be effected in a serving base station as well as in an access terminal, and the application that generates the data packets can be executed locally or remotely to either the base station or access terminal. Management of the generated data packets is effected via a marking/dropping of data packets according to an adaptive response function that can be deterministic or stochastic, and can depend of multiple communication generalized indicators, which include packet queue size, queue delay, channel conditions, frequency reuse, operation bandwidth, and bandwidth-delay product. Historical data related to the communication generalized indicators can be employed to determine response functions via thresholds and rates for marking/dropping data packets.
摘要:
Systems and methodologies are described herein that facilitate congestion control in a wireless communication system. As described herein, an access network and associated terminals can utilize a token bucket access control mechanism, through which respective terminals can be allotted access tokens and/or other units for access to the access network. For example, upon requesting access to a given network, a user of the network can determine whether sufficient access tokens have been accumulated, based on which the request can be selectively allowed or denied. As further described herein, multiple token bucket mechanisms can be utilized, which can correspond to respective packet flows or the like. Additionally, token bucket access control can be implemented as described herein in cooperation with conventional access persistence functionality. Further aspects described herein facilitate the adjustment of token bucket parameters for network access control based on network loading.
摘要:
Beacon transmissions by access points (e.g., femtocells) are controlled in an attempt to increase the number of beacons seen by the access terminals in the vicinity of the access points. In some aspects, interference between beacons is reduced by, for example, scheduling beacon transmissions of neighboring access points at different times. In some aspects, beacon transmissions are scheduled in a manner (e.g., allocated in substantially contiguous timeslots and/or allocated to different frequencies) that enables access terminals to acquire all relevant beacons in a relatively short time frame.
摘要:
Access control techniques enable an access terminal to obtain service through an access point. In some aspects, access control techniques may be used to enable a user (e.g., an owner) of an access point to control whether an access terminal obtains service through the access point. For example, a user may temporarily disable access control at an access point to enable access points that register with the access point while access control is disabled to thereafter be allowed to obtain service through the access point. As another example, a shared secret may be provided to an access terminal whereby, upon presenting the shared secret to an access point, the access terminal is allowed to obtain service through the access point.